Enjoy another issue of NetEqualizer News! This month, we invite you to take our NetGladiator Hacking Challenge, preview features in our now live 5.8 Software Update for NetEqualizer, announce the FlyAway Contest winner, and ask our Library customers to take a short survey. As always, feel free to pass this along to others who might be interested in NetEqualizer News.
A message from Art…
We love it when we hear back from you – so if you have a story you would like to share with us of how we have helped you, let us know. Email me directly here. I would love to hear from you!
Case Study: A Successful BotNet-Based Attack
Not sure where you stand? Think your sites are good to go? Either way, take our NetGladiator Hacking Challenge below!
NetGladiator Hacking Challenge
Give us $1,000 to try and ethically hack your website(s). If we find something, we’ll give you a detailed report of what we found and how to fix it. We can then discuss security controls and appliances that will help you immensely going forward. If we don’t find anything, we’ll credit the $1,000 back to your account.
It’s that simple.
Contact us today to schedule an assessment:
NetGladiator is currently looking for value-added resellers. If you are interested in becoming a reseller of our security appliance, contact us at:
And the FlyAway Contest Winner Is…
The time has come to announce this round’s winner.
And the winner is… Bill Vader of Fairmont Area Schools. Congratulations, Bill!
Please contact us within 30 days (by June 7, 2012) at:
to claim your prize!
In 2012, we are targeting Libraries as part of our NetEqualizer Marketing programs, and we need your help to figure out where to best spend our time and money. We are asking for your feedback on the NetEqualizer, as well as your input on proposed marketing ideas, as we believe that this will help us to develop effective marketing programs to reach your Library peers.
If you have not already responded, please take 5-10 minutes to fill out our brief survey (we appreciate your response by Friday, May 18th, please). The questions are easy – you cannot get them wrong!
We really appreciate your time and feedback!
Now you can dynamically allocate bandwidth, by giving priority or taking away bandwidth on the fly for domains like NetFlix, YouTube, or Hulu. This is done by entering in the name servers that you want prioritized or restricted.
This is a clean solution, as we are able to do this without violating Net Neutrality because we don’t use deep packet inspection (DPI).
We also have added in the ability to add priority hosts by entire subnet instead of just IP address. This feature is useful if you need to prioritize a section of your network, for example, a subnet where your video streaming servers are hosted.
VLAN Masking is an extension of our masking feature. Masks enable you to mark traffic to be ignored by the NetEqualizer, and are used primarily to exclude local traffic that you do not want equalized.
Advanced Quota API
The 5.8 Software Update is Quota API ready. The new Quota API tool allows you to more easily manage bandwidth caps for users by providing a much cleaner and efficient interface.
We are now shipping with 750 gigabyte SSD drives to enhance our caching in the NetEqualizer. This means we have the capability to hold more content and store larger videos. We also cache some smaller, more popular web pages to allow those sites to be loaded very quickly.
As always, the 5.8 Software Update will be available at no charge to customers with valid NetEqualizer Software Subscriptions (NSS).
Do We Really Need SSL?
By Art Reisman – CTO – APconnections
I know that perception is reality, and sometimes it is best to accept it, but when it comes to security, FUD, I get riled up.
For example, last year I wrote about the un-needed investment surrounding the IPV4 demise, and, as predicted, the IPv6 push turned out to be mostly vendor hype motivated by a desire to increase equipment sales. Today, I am here to dispel the misplaced fear around the concept of having your data stolen in transit over the Internet. I am referring to the wire between your residence and the merchant site at the other end. This does not encompass the security of data once it is stored on disk drive at its final location, just the transit portion.
To get warmed up, let me throw out some analogies.
Do you fear getting carjacked going 75 mph on the interstate?
Most likely not, but I bet you do lock your doors when stopped.
Do you worry about encrypting your cell phone conversations?
Not unless you are on security detail in the military.
As with my examples, somebody stealing your credit card while it is in transit, although possible, is highly impractical; there are just better ways to steal your data…
Photo Of The Month
Hiking, Biking and Spiritual Vortexes
Immediately upon arrival, it’s not difficult to see why Sedona, AZ is such an enchanting place. Even though we are spoiled by the natural beauty of Colorado, the backdrop that Northern Arizona provides is a close rival. While Boulder, CO and the surrounding mountains boast some of the best road biking in the world, the trail system in this unique area is king when it comes to mountain biking. The picture above was taken by one of our staff members on a recent trek.