This is a selection of thematic materials written by our experts: articles on combating botnets, provider errors when deploying infrastructure, as well as quantum networks and eSIM.
/ Unsplash / Leon SeibertNetworking
- IPv6 Implementation: FAQ for Internet Service Providers
We analyze the issues that telecom operators may have when migrating to IPv6. For example, before upgrading a network, you need to make sure whether a higher-level provider supports a new generation protocol. Here is a list of operators providing IPv6. We will also talk about problems with outdated hardware (including client hardware), legislative aspects and difficulties when working with the IPv4 + IPv6 model.
- Providing free Wi-Fi under the law
This is a guide to deploying Wi-Fi hotspots at airports, restaurants, shopping malls and other public places. We note what to look for in order not to break the law. Also here you will find recommendations for choosing equipment and a case with the implementation of a wireless network by one of our customers.
- Internet to the village - we are building a radio relay Wi-Fi network
In our country there are places with a low Internet speed, or, in general, without access to the network. Large operators are gradually laying optics to remote villages, but this is expensive. It’s cheaper for small providers to build a wireless relay Wi-Fi network. The article tells how to approach the issue from the legal and technical side. In particular, we consider two common models of radio relay networks: point-to-point and point-to-multipoint.
Information Security
- Spam through routers: what is known about one of the most active botnets
A year ago, information security experts discovered a botnet that attacked 400 thousand routers. The malware “bombarded” devices with the BroadCom UPnP function activated using TCP ports 5431 and 1900. This article is about infection mechanisms and virus tools. We also provide a complete list of vulnerable devices.
- DDOS and 5G: thicker “pipe” - more problems
DDoS is the scourge of the Internet of things. The explosive proliferation of IoT devices (their number will exceed 75 billion by 2025) opens up more opportunities for hackers to carry out such attacks. In the article we will talk about two methods of protecting the networks of Internet providers: budget and not very.
Future technology today
- Prospects for quantum networks: who engages in them and why
We are discussing quantum projects that domestic and foreign engineers are working on. We are writing about the work of physicists from the Russian Quantum Center, Moscow State University, Russian Railways, as well as world institutes from America, Europe and Asia.
/ Unsplash / Umberto- eSIM: evil or panacea?
ESIM technology was standardized back in 2016. But she began to go out to the masses quite recently. For example, in Russia, the mobile operator received its first permission to work with eSIM only this week. In this article, we consider the capabilities of electronic "sims" and analyze the reasons that slow down the spread of technology - including cyber risks.
- Who implements IPv6, and what hinders its development
IPv4 addresses are gradually depleted . However, the IT industry is in no hurry to switch to IPv6 - the new protocol supports only 15% of sites. In this article, we discuss the reasons for the slow spread of IPv6. For example, there is an opinion that the high cost of migration is to blame, and someone is convinced that the technology has already become obsolete.
miscellanea
/ Unsplash / Erwan HesryOther digests on our blog: