Network Digest: 20 expert materials on protocols, standards and information security
In this compilation, we have included fresh posts prepared by specialists from VAS Experts. The main topics of the collection are network protocols, 5G and information security.
Under the cat, you will also find a number of recommendations for building networks of telecom operators.
It will be a new application for mobile devices SoniControl, which is able to “catch” acoustic cookies and block them. We talk about the principles of the system and here are some basic ways to protect gadgets from ultrasonic interference.
In April, the Bitdefender team discovered an updated version of the acclaimed IoT botnet Hide and Seek. Hackers implemented a custom P2P protocol and a number of other features, “teaching” the malware to remain on the device even after it was rebooted. We tell how the virus works and how to protect against it.
The subject of the article is how and how you can restrict access to the network. Let's talk about the advantages and disadvantages of DPI, and also explain why this system in the provider's network can be more effective than packet filters, proxy servers, or managed switches combined.
In November 2016, the All-China People’s Assembly approved a new cyber security law (here you can read the unofficial translation of the law ), which came into force in June last year. This post is about what tools China uses to ensure information security in the country - talking about all sorts of classifications and laws.
Continuation of the material on the history of information security in China. It is dedicated to content filtering technology - “The Great Chinese Firewall”. Let us dwell on the principles of its work: mechanisms for intercepting DNS and content filtering.
How did it happen that IPv4 addresses began to dry up? Why was implementing IPv6 harder than expected? Should I switch to IPv6 at all? The material will answer these questions and evaluate the benefits of the new protocol.
The International Telecommunication Union has developed a draft document for migration from IPv4 to IPv6. However, engineers, Internet registrars and other members of the IT community did not like the plan due to a number of drawbacks of the proposed model: from potential problems with network security to reducing the service life of the protocol. In the post - more about the arguments in favor of the inapplicability of the plan and the possible reasons for the slow implementation of IPv6.
Free IPv4 addresses have been terminated “for sure now” since 2011. This time, the last unallocated block was given by the RIPE registrar. We understand the situation: how did it happen, what can be done about it and why is IPv6 the only worthy replacement for IPv4.
Here we offer to evaluate the experience of implementing IPv6 in companies around the world: how the new protocol is transferred in China, what difficulties they encountered in Yandex, etc. In addition, let us tell you how IPv6 is used in home and production networks and what prevents simply take and implement a new protocol.
We are talking about obstacles that do not allow to deploy 5G early: the lack of frequencies, money, fiber, and so on. Also, let's see what “positions” are occupied by different countries and companies in the 5G race.
Despite the fact that after the abolition of the rules of net neutrality in the US, half a year has already passed, the opponents of this decision are not going to give up. The article will answer the main question: is there a chance that net neutrality will still stand against the FCC? We will describe the course of the struggle of individual states for maintaining net neutrality on their territory and the successes of concerned citizens, companies and human rights organizations in the battle with the FCC.
For some reason, few people think about the potential threat to 5G networks and IoT devices - DDoS attacks. In this material we tried to correct it and argued that the introduction of these technologies will require more advanced protection methods than they are now. We also offered possible solutions to the problem of DDoS attacks for service providers: traffic clearing centers (more expensive) and integrated systems (cheaper).
Overview of the new Wi-Fi standard EasyMesh: how the technology works, why it was developed, and to whom it can be useful. We are also talking about the situation with the ecosystem of mesh-networks in general.
In this material we explain in simple words how to design and implement a free Wi-Fi network using Hotspot technology, in accordance with the legislation of the Russian Federation. As an example, we will give a case with the implementation of authorization in Wi-Fi on SCAT DPI in the network of one of our clients.
This approach will make sure that the packet has passed along a given route and has not been replaced or modified. We are talking about the mechanisms of the Proof of Transit, the proposed methods of ensuring packet security and criticism from the community.
The new approach involves not unloading the entire registry, but only the changes made. The material discusses the advantages of the delta method and other methods that simplify the unloading process. Share what methods of unloading we use in VAS Experts.