- Packet Capture
- Posts
- PACKET CAPTURE / Week of November 18-22, 2024
PACKET CAPTURE / Week of November 18-22, 2024

FYI
| ![]() |
JOB ALERTS
Current postings from the Packet Pushers Slack Group
Network Developer at Oracle
Network Developer at Oracle (yes, another position available!)
Network and Voice Operations Engineer at Indiana University Health
NEW PODCASTS
EP 504 | NOVEMBER 18, 2024Cisco Updates Licensing, Branding with Wi-Fi 7; Google Cloud To Require MFATake a Network Break! This week we cover Cisco's Wi-Fi 7 launch; in addition to new APs, Cisco also updates its branding and rolls out "simplified" licensing that bundles features you might not want. Google warns that MFA will be required for Google Cloud in early 2025, Palo Alto Networks warns of a critical bug in its Panorama management console, and more tech news. | LISTEN NOW |
SPONSORED | NOVEMBER 18, 2024MinIO Optimizes Object Storage for AI Infrastructure (Sponsored)Today on the Tech Bytes podcast we welcome back sponsor MinIO to talk about how AI is altering the data infrastructure landscape, and why organizations are looking to build AI infrastructure on-prem. We also dig into MinIO’s AIStor, a software-only, distributed object store that offers simplicity, scalability, and performance for AI infrastructure and other high-performance storage use cases. We’ll talk about unique features in AIStor, including the ability to extract contextual data from image objects. Our guest is Ugur Tigli, CTO at MinIO. | LISTEN NOW |
EP 089 | NOVEMBER 19, 2024Return to the Office: What’s Next?Some high-profile companies like Amazon are mandating all employees return to the office, full time. Justifications, when given, mostly revolve around productivity and innovation. We say, whoa there! The data don't back up the idea that hybrid and remote work hurt productivity (kind of the opposite) or innovation, and the real justifications likely lie elsewhere. We're digging into that, and what you should do if one of these mandates hits you! | LISTEN NOW |
EP 040 | NOVEMBER 19, 2024Personal Privacy ToolsSurveillance is a fact of life with modern technology. Today's episode covers common tools for more private communication and Web browsing. We dig into the end-to-end encryption capabilities of Signal and WhatsApp, look at the capabilities and limits of their "disappearing message" features, and discuss what information law enforcement can access from these tools. We also look at the pros and cons of personal VPNs and Tor. | LISTEN NOW |
EP 079 | NOVEMBER 20, 2024From Network Monitoring to Observability: Make the Leap for Better NetOpsToday’s Network Automation Nerds is a special cross-over episode with Total Network Operations and host Scott Robohn. We take a deep dive into network observability with the authors of the book Modern Network Observability: Davide Flores, Christian Adell, and Josh VanDeraa.We talk about how to integrate diverse data sources, the tools required, and how observability can lead to more proactive network management. We also talk about how to build a modular observability stack, and how observability supports your network automation efforts. The conversation also touches on the need for continuous learning and adaptability. | LISTEN NOW |
EP 004 | NOVEMBER 21, 2024Essential Topics in Networking: Ethernet, NAT, and MoreWhat are the most essential topics to understand for a new networkers? Ethan Banks and Holly Metlitzky address a listener’s question about foundational topics, covering what a network is, the differences between packet-switched and circuit-switched networks, and the nature of the internet as a "network of networks." They discuss the importance of Internet Protocol (IP), Ethernet, Wi-Fi, and Network Address Translation (NAT). Plus bonus material on entry-level certifications. | LISTEN NOW |
EP 008 | NOVEMBER 21, 2024How to Hire Top PerformersHiring is never an easy process. On today’s Technically Leadership podcast, guest Brian Hogan and host Laura Santamaria talk about how to set up a fair and structured interview process, including the use of rubrics to evaluate candidates consistently. Brian discusses the challenges of assessing cultural fit and the subjective nature of defining a top performer. He also shares strategies for effective onboarding. | LISTEN NOW |
EP 009 | NOVEMBER 22, 2024From Network Monitoring to Observability: Make the Leap for Better NetOpsToday’s Total Network Operations is a special cross-over episode with Network Automation Nerds and host Eric Chou. We take a deep dive into network observability with the authors of the book Modern Network Observability: Davide Flores, Christian Adell, and Josh VanDeraa.We talk about how to integrate diverse data sources, the tools required, and how observability can lead to more proactive network management. We also talk about how to build a modular observability stack, and how observability supports your network automation efforts. The conversation also touches on the need for continuous learning and adaptability. | LISTEN NOW |
EP 759 | NOVEMBER 22, 2024Deploying the BGP Monitoring Protocol (BMP) at ISP ScaleOn today's Heavy Networking, we talk with Bart Dorlandt, a network automation solutions architect. An ISP approached Bart with a use case for the BGP Monitoring Protocol (BMP). We discuss what BMP is good for, how it works, and the solution Bart built. We dive into the architecture he designed, the challenges he ran into in dealing with millions of records, why Kafka was essential, and more.| LISTEN NOW |
NEW VIDEO BYTES
LATEST BLOG POSTS
SPONSORED | NOVEMBER 18, 2024
Strengthening Remote Protocol Security: Prisma Access Browser’s Integrated Approach to SSH and RDP
The following sponsored blog post was written by Nicole Moreno, Product Marketing Manager at Palo Alto Networks. We thank Palo Alto Networks for being a sponsor.
Several months ago CISA (Cybersecurity and Infrastructure Security Agency) reported that threat actors exploited multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. In this case, attackers were able to gain unauthorized access to critical enterprise systems. Despite deploying tools to detect advanced threats, the attackers were able to bypass authentication mechanisms, execute arbitrary commands with elevated privileges, and even establish root-level persistence. | READ NOW