The Vulnerability of our Wi-Fi


Researchers Vanhoef and Frank Piessens, from the University of Leuven, identified a series of vulnerabilities that affect Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access (WPA2). These vulnerabilities are protocol-level vulnerabilities that affect a number of industry implementations of the standard in wireless infrastructure devices and wireless clients. The paper is available through the following link: PDF.


Wi-Fi Protected Access (WPA, more commonly WPA2) handshake traffic can be manipulated to induce nonce and session key reuse, resulting in key reinstallation by a wireless access point (AP) or client. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames. These vulnerabilities are referred to as Key Reinstallation Attacks or “KRACK” attacks. Continue reading “The Vulnerability of our Wi-Fi”

Scrum Free Workshop – Maximize benefit of Scrum with DevOps Practices

Scrum with DevOps Practices Workshop

Free Workshop

DevOps has become a buzzword in past few years and demand for same is growing day by day. Same time it is also creating a lot confusion about usages of DevOps terminology. Some says it is about culture or other focus more on tools and automation. But rarely people talks about DevOps as process or framework. Same way, adoption of Scrum is growing and not only in Software but beyond software development.

People always refer Scrum as process framework not practice or tools. Our workshop is going to cover about how to use Scrum as process framework and take advantages of self-organizing to build DevOps culture, but at the same time how to use DevOps automation and tools to amplifying feedback loop and bring better empiricism in product development.

What are the learning objectives of the workshop?

  • Why we need Scrum as process framework?
  • Where DevOps practices fit in Scrum?
  • Why we need to stay focused on building self-organizing team?
  • What practices of DevOps bring best of Scrum?
  • How DevOps tools help in faster feedback loop?

Grab the opportunity now and learn from the expert. Seats are limited, get over and sign up now before it is all taken up. Click here to register.

Ready to explore both Agile Scrum and DevOps training and certification? Hit em links below:

Agile Scrum training and certification

DevOps training and certification


Red Hat – Deploying in a public cloud environment

Red Hat - Deploying in a public cloud environment

Run your workloads efficiently, securely, and under control. 

Public cloud environments are here to stay. They promise nearly unlimited capacity, potentially attractive costs stemming from large-scale infrastructures and associated operational best practices, and a pay-as-you-go pricing model that can make up-front server purchases a thing of the past. But, especially for enterprises, effectively and safely using public cloud environments involves more than whipping out a credit card and clicking some buttons on a website.

Many different considerations go into developing a cloud strategy that meets these objectives — and then implementing, operating, and developing the associated applications. However, based on a wide range of conversations with customers, partners, analysts, and others, the following are some of the most important steps to take in order to make the best use of public cloud environments as part of a broader hybrid IT strategy:
• Take a business-based approach to risk
• Understand legal and regulatory compliance
• Consider portability
• Establish a trusted software supply chain
• Enable hybrid cloud policy and management
• Adopt consistent operational approaches
• Maintain control over services and workloads Continue reading “Red Hat – Deploying in a public cloud environment”

Wave energy – Renewable Energy

Futuristic flowers for wave power

A sustainable future powered by the sea could soon be a reality.

The endless motion of the ocean is a great resource, and we’ve seen some creative methods to try to tap into that energy.

Although wave energy-harvesting systems are often just presented as concept that may someday see actual use, one was deployed in Hawaii in Kaneohe Bay in July 2015 to provide power to the municipal grid. Built by Northwest Energy Innovations, the Azura device will remain in operation for a 12-month assessment period, with an eye toward eventual commercialization.

The pilot project is being conducted with the support of the US Department of Energy, the US Navy, and the University of Hawaii. The university will be in charge of data collection and analysis, while the other two groups will use that data in their “ongoing efforts to validate wave energy technology and advance the marine renewable energy industry.”

The constant crashing of the waves represents an essentially limitless amount of energy. Current techniques to tap into it include; Azura in Hawaii, which uses a 360-degree rotating float mechanism; a system of buoys attached to a jetty in Gibraltar that rise and fall with the waves; a proposed system from UC Berkeley that would absorb that energy by carpeting the seafloor; and an “artificial blowhole” in development in Australia that captures energy from air displaced by waves. Continue reading “Wave energy – Renewable Energy”

Red Hat OpenStack Platform — A cost-effective private cloud for your business

Red Hat

The cloud is more than a marketing concept. Cloud computing is an intentional, integrated architecture comprising a suite of tools that help automate your business operations on a service-provider’s infrastructure, your infrastructure, or a hybrid combination of both.

A private cloud solution uses the accessibility and redundancy advantages of the public cloud, but on your business’s own infrastructure. The advantages gained are greater control over your data with a level of auditing that meets enhanced security needs for financial records, medical records, and other highly sensitive data. As the private cloud tends toward vendor-agnostic open source solutions, vendor lock-in is avoided and interoperability is enhanced.

Whether you’re moving all your business processes to a private cloud or you’re simply looking for a way to lighten your technology load, Red Hat OpenStack Platform is the most cost-effective and customer-friendly implementation of OpenStack on the market today. It has the stability and support you have come to expect from Red Hat Enterprise Linux, the technical
innovation brought by the open source community and the OpenStack Foundation, and a broad partner ecosystem from hardware and software vendors to hosting companies to household name integrators.

A private cloud solution takes advantage of the economy, redundancy, and massive scalability of the public cloud, but brings it into the network you own and control. Because it’s built from the ground up on open standards, you will never find yourself locked into a vendor’s product line and subject to that single vendor’s pricing scheme.

More than 100 vendors have joined Red Hat’s OpenStack efforts and provide technologies and services that are certified to work with Red Hat OpenStack Platform. Red Hat offers training and certifications that ensure your technical team has the knowledge to support your private cloud implementation. And through corporate cloud offerings, Red Hat brings virtualization and management tools that integrate seamlessly with Red Hat OpenStack Platform. This frees your technical team to focus on providing critical support for your business needs. Continue reading “Red Hat OpenStack Platform — A cost-effective private cloud for your business”