Chaos Computer Club public
[search 0]
Mai Mult
Download the App!
show episodes
 
Loading …
show series
 
sirgoofy spricht in diesem Petit Foo über die Interaktion mit der Polizei. Bestimmt habt ihr schon mal das Credo "Don't Talk to the Police" gehört. sirgoofy erläutert den Hintergrund dazu und erklärt worauf man bei der Interaktion mit der Polizei achten sollte - sowohl als Zeuge als auch als Beschuldigter.about this event: https://chaospott.de/…
  continue reading
 
sirgoofy spricht in diesem Petit Foo über die Interaktion mit der Polizei. Bestimmt habt ihr schon mal das Credo "Don't Talk to the Police" gehört. sirgoofy erläutert den Hintergrund dazu und erklärt worauf man bei der Interaktion mit der Polizei achten sollte - sowohl als Zeuge als auch als Beschuldigter.about this event: https://chaospott.de/…
  continue reading
 
sirgoofy spricht in diesem Petit Foo über die Interaktion mit der Polizei. Bestimmt habt ihr schon mal das Credo "Don't Talk to the Police" gehört. sirgoofy erläutert den Hintergrund dazu und erklärt worauf man bei der Interaktion mit der Polizei achten sollte - sowohl als Zeuge als auch als Beschuldigter.about this event: https://chaospott.de/…
  continue reading
 
sirgoofy spricht in diesem Petit Foo über die Interaktion mit der Polizei. Bestimmt habt ihr schon mal das Credo "Don't Talk to the Police" gehört. sirgoofy erläutert den Hintergrund dazu und erklärt worauf man bei der Interaktion mit der Polizei achten sollte - sowohl als Zeuge als auch als Beschuldigter.about this event: https://chaospott.de/…
  continue reading
 
In diesem Petit Foo geht es darum, wie man den neuen Beamer an die Decke bekommt, ohne dass er wieder herunter fällt. Es geht also um Dübel. sirgoofy erklärt, welche Arten von Dübeln es gibt und wann welche verwendet werden. Und er erklärt, wie man vor der Erfindung des Plastikdübels Haken an der Wand befestigt hat.about this event: https://chaospo…
  continue reading
 
In diesem Petit Foo geht es darum, wie man den neuen Beamer an die Decke bekommt, ohne dass er wieder herunter fällt. Es geht also um Dübel. sirgoofy erklärt, welche Arten von Dübeln es gibt und wann welche verwendet werden. Und er erklärt, wie man vor der Erfindung des Plastikdübels Haken an der Wand befestigt hat.about this event: https://chaospo…
  continue reading
 
In diesem Petit Foo geht es darum, wie man den neuen Beamer an die Decke bekommt, ohne dass er wieder herunter fällt. Es geht also um Dübel. sirgoofy erklärt, welche Arten von Dübeln es gibt und wann welche verwendet werden. Und er erklärt, wie man vor der Erfindung des Plastikdübels Haken an der Wand befestigt hat.about this event: https://chaospo…
  continue reading
 
In diesem Petit Foo geht es darum, wie man den neuen Beamer an die Decke bekommt, ohne dass er wieder herunter fällt. Es geht also um Dübel. sirgoofy erklärt, welche Arten von Dübeln es gibt und wann welche verwendet werden. Und er erklärt, wie man vor der Erfindung des Plastikdübels Haken an der Wand befestigt hat.about this event: https://chaospo…
  continue reading
 
We are building **Das SCHIFF**, a Kubernetes Cluster as a Service platform for Deutsche Telekom. Das SCHIFF is used by internal teams to deploy network functions like 5G core and other applications on bare-metal.Due to the complexity in telecom networks we opted to build a host-centered design with BGP-EVPN to each Kubernetes host.I would like to s…
  continue reading
 
We are building **Das SCHIFF**, a Kubernetes Cluster as a Service platform for Deutsche Telekom. Das SCHIFF is used by internal teams to deploy network functions like 5G core and other applications on bare-metal.Due to the complexity in telecom networks we opted to build a host-centered design with BGP-EVPN to each Kubernetes host.I would like to s…
  continue reading
 
We are building **Das SCHIFF**, a Kubernetes Cluster as a Service platform for Deutsche Telekom. Das SCHIFF is used by internal teams to deploy network functions like 5G core and other applications on bare-metal.Due to the complexity in telecom networks we opted to build a host-centered design with BGP-EVPN to each Kubernetes host.I would like to s…
  continue reading
 
We are building **Das SCHIFF**, a Kubernetes Cluster as a Service platform for Deutsche Telekom. Das SCHIFF is used by internal teams to deploy network functions like 5G core and other applications on bare-metal.Due to the complexity in telecom networks we opted to build a host-centered design with BGP-EVPN to each Kubernetes host.I would like to s…
  continue reading
 
In contrast to the usual dual-stack procedure, IPv6-Mostly can actually save IPv4 addresses. This is achieved by combining a DHCPv4 option (RFC8925) in conjunction with an IPv6 RA extension (RFC8781) and NAT64/DNS64.I will show how to configure the DHCP server as well as the router and, if necessary, how to configure the clients. We also rolled out…
  continue reading
 
In contrast to the usual dual-stack procedure, IPv6-Mostly can actually save IPv4 addresses. This is achieved by combining a DHCPv4 option (RFC8925) in conjunction with an IPv6 RA extension (RFC8781) and NAT64/DNS64.I will show how to configure the DHCP server as well as the router and, if necessary, how to configure the clients. We also rolled out…
  continue reading
 
In contrast to the usual dual-stack procedure, IPv6-Mostly can actually save IPv4 addresses. This is achieved by combining a DHCPv4 option (RFC8925) in conjunction with an IPv6 RA extension (RFC8781) and NAT64/DNS64.I will show how to configure the DHCP server as well as the router and, if necessary, how to configure the clients. We also rolled out…
  continue reading
 
In contrast to the usual dual-stack procedure, IPv6-Mostly can actually save IPv4 addresses. This is achieved by combining a DHCPv4 option (RFC8925) in conjunction with an IPv6 RA extension (RFC8781) and NAT64/DNS64.I will show how to configure the DHCP server as well as the router and, if necessary, how to configure the clients. We also rolled out…
  continue reading
 
This talk focuses on control plane data plane testing aka how long it takes to translate BGP Control Plane events into a new Data plane entry. This is an important metric to look at in the context of your peering edge.Noneabout this event: https://pretalx.com/denog15/talk/SWKMYC/De către Tobias Heister
  continue reading
 
This talk focuses on control plane data plane testing aka how long it takes to translate BGP Control Plane events into a new Data plane entry. This is an important metric to look at in the context of your peering edge.Noneabout this event: https://pretalx.com/denog15/talk/SWKMYC/De către Tobias Heister
  continue reading
 
This talk focuses on control plane data plane testing aka how long it takes to translate BGP Control Plane events into a new Data plane entry. This is an important metric to look at in the context of your peering edge.Noneabout this event: https://pretalx.com/denog15/talk/SWKMYC/De către Tobias Heister
  continue reading
 
This talk focuses on control plane data plane testing aka how long it takes to translate BGP Control Plane events into a new Data plane entry. This is an important metric to look at in the context of your peering edge.Noneabout this event: https://pretalx.com/denog15/talk/SWKMYC/De către Tobias Heister
  continue reading
 
When you want to provide telecommunication services to customers you need to provide a good set of functions/services to them. Most commonly those services are ~~IP-based~~, I mean of cource IP6-based.These functions are commonly provided by vendors which are pre-selected by long negotiations.In these, all requirements are marked as fulfilled at th…
  continue reading
 
When you want to provide telecommunication services to customers you need to provide a good set of functions/services to them. Most commonly those services are ~~IP-based~~, I mean of cource IP6-based.These functions are commonly provided by vendors which are pre-selected by long negotiations.In these, all requirements are marked as fulfilled at th…
  continue reading
 
When you want to provide telecommunication services to customers you need to provide a good set of functions/services to them. Most commonly those services are ~~IP-based~~, I mean of cource IP6-based.These functions are commonly provided by vendors which are pre-selected by long negotiations.In these, all requirements are marked as fulfilled at th…
  continue reading
 
When you want to provide telecommunication services to customers you need to provide a good set of functions/services to them. Most commonly those services are ~~IP-based~~, I mean of cource IP6-based.These functions are commonly provided by vendors which are pre-selected by long negotiations.In these, all requirements are marked as fulfilled at th…
  continue reading
 
Are you managing your network infrastructure using NetBox?Do you need to manually create Letters of Authorization (LOAs)?Not anymore! You can let Bulk Loagen create them automatically from the data in NetBox.Bulk Loagen is a small service running alongside NetBox that generated PDFs on-demand with the technical information fetched from NetBox.Nonea…
  continue reading
 
Are you managing your network infrastructure using NetBox?Do you need to manually create Letters of Authorization (LOAs)?Not anymore! You can let Bulk Loagen create them automatically from the data in NetBox.Bulk Loagen is a small service running alongside NetBox that generated PDFs on-demand with the technical information fetched from NetBox.Nonea…
  continue reading
 
Are you managing your network infrastructure using NetBox?Do you need to manually create Letters of Authorization (LOAs)?Not anymore! You can let Bulk Loagen create them automatically from the data in NetBox.Bulk Loagen is a small service running alongside NetBox that generated PDFs on-demand with the technical information fetched from NetBox.Nonea…
  continue reading
 
Are you managing your network infrastructure using NetBox?Do you need to manually create Letters of Authorization (LOAs)?Not anymore! You can let Bulk Loagen create them automatically from the data in NetBox.Bulk Loagen is a small service running alongside NetBox that generated PDFs on-demand with the technical information fetched from NetBox.Nonea…
  continue reading
 
Reeling under the blows of the Russian assault on Ukraine and the ever-increasing threats to networks and utilities, the European regulatory regime for critical infrastructures is undergoing profound changes. Both cyber and physical security of essential service providers are covered by the recent EU directives NIS 2 and CER, with several additiona…
  continue reading
 
Reeling under the blows of the Russian assault on Ukraine and the ever-increasing threats to networks and utilities, the European regulatory regime for critical infrastructures is undergoing profound changes. Both cyber and physical security of essential service providers are covered by the recent EU directives NIS 2 and CER, with several additiona…
  continue reading
 
Reeling under the blows of the Russian assault on Ukraine and the ever-increasing threats to networks and utilities, the European regulatory regime for critical infrastructures is undergoing profound changes. Both cyber and physical security of essential service providers are covered by the recent EU directives NIS 2 and CER, with several additiona…
  continue reading
 
Reeling under the blows of the Russian assault on Ukraine and the ever-increasing threats to networks and utilities, the European regulatory regime for critical infrastructures is undergoing profound changes. Both cyber and physical security of essential service providers are covered by the recent EU directives NIS 2 and CER, with several additiona…
  continue reading
 
Time is a common good, yet hardly any thought is given to its handling or its synchronisation in particular.Time synchronisation is used in various areas: from own networks to trading transactions in the financial sector. Depending on the type of application, it requires high accuracy.Today's solutions are mostly based on satellites (e.g. GNSS, GPS…
  continue reading
 
Time is a common good, yet hardly any thought is given to its handling or its synchronisation in particular.Time synchronisation is used in various areas: from own networks to trading transactions in the financial sector. Depending on the type of application, it requires high accuracy.Today's solutions are mostly based on satellites (e.g. GNSS, GPS…
  continue reading
 
Time is a common good, yet hardly any thought is given to its handling or its synchronisation in particular.Time synchronisation is used in various areas: from own networks to trading transactions in the financial sector. Depending on the type of application, it requires high accuracy.Today's solutions are mostly based on satellites (e.g. GNSS, GPS…
  continue reading
 
Time is a common good, yet hardly any thought is given to its handling or its synchronisation in particular.Time synchronisation is used in various areas: from own networks to trading transactions in the financial sector. Depending on the type of application, it requires high accuracy.Today's solutions are mostly based on satellites (e.g. GNSS, GPS…
  continue reading
 
The BNG Blaster (https://github.com/rtbrick/bngblaster) is an open-source network tester that has evolved significantly since my last presentation at DENOG13 two years ago. Beyond its initial capabilities with various access protocols, it has been enhanced to support all major routing protocols, including BGP, ISIS, OSPF, and LDP.In this presentati…
  continue reading
 
The BNG Blaster (https://github.com/rtbrick/bngblaster) is an open-source network tester that has evolved significantly since my last presentation at DENOG13 two years ago. Beyond its initial capabilities with various access protocols, it has been enhanced to support all major routing protocols, including BGP, ISIS, OSPF, and LDP.In this presentati…
  continue reading
 
The BNG Blaster (https://github.com/rtbrick/bngblaster) is an open-source network tester that has evolved significantly since my last presentation at DENOG13 two years ago. Beyond its initial capabilities with various access protocols, it has been enhanced to support all major routing protocols, including BGP, ISIS, OSPF, and LDP.In this presentati…
  continue reading
 
The BNG Blaster (https://github.com/rtbrick/bngblaster) is an open-source network tester that has evolved significantly since my last presentation at DENOG13 two years ago. Beyond its initial capabilities with various access protocols, it has been enhanced to support all major routing protocols, including BGP, ISIS, OSPF, and LDP.In this presentati…
  continue reading
 
As vehicles get more and more connected, their networks grow larger and more complex. This talk gives an introduction to automotive networks. It covers bus systems for automotive use cases and shows different network architectures used in road vehicles.Noneabout this event: https://pretalx.com/denog15/talk/QBPHUK/…
  continue reading
 
As vehicles get more and more connected, their networks grow larger and more complex. This talk gives an introduction to automotive networks. It covers bus systems for automotive use cases and shows different network architectures used in road vehicles.Noneabout this event: https://pretalx.com/denog15/talk/QBPHUK/…
  continue reading
 
Loading …

Ghid rapid de referință