Blog Archives
Search Blog Archives
Category Archives: Programming Languages
Python Tkinter/TK Library for Quick User Interfaces
Quite a while back, I used to use Tkinter/TK library quite often. Here’s a blog I wrote back in 2012 showcasing a XenServer client that connects to a Citrix XenServer or XenServer pool; the client can also perform management tasks … Continue reading
Stop Credential Stuffing Attacks with Cloudflare Bot Management
Cloudflare Bot Management can better detect and help mitigate malicious bots using multiple detection mechanisms like heuristics, behavioral analysis/anomaly detection, machine learning, and finger printing against a massive global volume of data. My colleague and I recently discussed and showed … Continue reading
Posted in Cloudflare, Cloudflare, Cloudflare, Cloudflare Webinars, Networking, Perl, Programming Languages, Security, Tech Events, Technology, Virtualization and Cloud Computing
Tagged ahmed, anomaly detection, behavioral analysis, better Internet, Bot Management, botmanagement, bots, CAPTCHA, CAPTCHAs, Cloudflare, Cloudflare Bot Management, Cloudflare Managed Challenge, Cloudflare traffic sequence, Cloudflare WAF, credential stuffing, finger printing, heuristics, humair, Humair Ahmed, machine learning, Managed Challenge, price scraping, security, WAF, Webinar
Leave a comment
Webinar Recording: The newest approach: Stopping bots without CAPTCHAs [Video]
Had a great turnout for bot management webinar. Watch the recording to see how Cloudflare is moving the Internet away from CAPTCHAs and see it in action. Follow me on Twitter: @Humair_Ahmed
Posted in Cloudflare, Cloudflare, Cloudflare, Cloudflare Webinars, Networking, Perl, Security, Technology, Virtualization and Cloud Computing
Tagged ahmed, anomaly detection, behavioral analysis, better Internet, Bot Management, botmanagement, bots, CAPTCHA, CAPTCHAs, Cloudflare, Cloudflare Bot Management, Cloudflare Managed Challenge, Cloudflare WAF, credential stuffing, credential stuffing attack, finger printing, heuristics, humair, Humair Ahmed, machine learning, Managed Challenge, security, WAF, Webinar
Leave a comment
Automation Leveraging NSX REST API Guide
I also published this blog post about automation leveraging the NSX REST API on the VMware NSX Network Virtualization Blog on June 21, 2016. The full blog post is provided below and can also be seen on the VMware NSX … Continue reading
Posted in APIs/SDKs, Java, Labs, Networking, Perl, Programming Languages, Python, Technology, Virtualization and Cloud Computing, VMware, VMware, VMware NSX REST API
Tagged Ansible, automation, cloud management tools, cURL, Go, Java, Network Virtualization, NSX, NSX automation, NSX network virtualization, NSX REST API, NSX REST API Guide, NSX-V, perl, Postman, PowerShell, programming language frameworks, Python, REST Client, REST client libraries, VMware NSX, VMware NSX network virtualization, VMware NSX-V, VMware vRealize Orchestrator, VMware vRO, vRealize Orchestrator, vRO
Leave a comment
Monitoring VMware NSX SpoofGuard with REST API and Perl
I also published this blog post about monitoring VMware NSX SpoofGuard with REST API and Perl on the VMware NSX Network Virtualization Blog on June 17, 2016. The full blog post is provided below and can also be seen on … Continue reading
Posted in Labs, Network Architecture, Network Security, Networking, Perl, Programming Languages, Technology, Virtualization and Cloud Computing, VMware, VMware
Tagged Active IP Addresses, Automating VMware NSX Security, Comprehensive Perl Archive Network, CPAN, Data::Validate::IP, Data::Validate::IP library, IP Address Spoofing, IP Addresses Pending Review, IP spoofing, NSX, NSX REST API, NSX REST API and Perl, NSX SpoofGuard, perl, Perl REST client, Perl REST client module/library, REST API, REST API and Perl, REST:Client, REST:Client library, REST:Client module, SpoofGuard, SpoofGuard Active IP Addresses, SpoofGuard Active Virtual NICs, SpoofGuard IP Addresses, SpoofGuard IP Addresses Pending Review, SpoofGuard states, spoofing, vmware, VMware NSX, XML, XML:Simple, XMLin
Leave a comment
Automating Security Group and Policy Creation with NSX REST API and Python
My latest post on the VMware NSX Network Virtualization Blog, Automating Security Group and Policy Creation with NSX REST API, describes using NSX REST API with some code for a simple yet realistic use case focused around security where automation … Continue reading
Posted in Labs, Network Security, Networking, Programming Languages, Python, Technology, Virtualization and Cloud Computing, VMware, VMware
Tagged Automating Security Group and Policy Creation, CSV, CSV file, Network Virtualization, NSX, NSX 6.2.2, NSX REST API, NSX Security Groups, NSX Security Groups from CSV file, Python, python cvs library, python requests library, REST, Security Groups, Security Groups from CSV file, vmware, VMware NSX, VMware NSX 6.2.2
Leave a comment
Automating VMware NSX Security Rules Creation with Splunk and Python
If you haven’t already, checkout my post on the VMware Network Virtualization blog where I describe and show a demo of how Splunk can be used to monitor the VMware NSX distributed firewall (DFW), and, with a little Python code, … Continue reading
Posted in Labs, Network Security, Networking, Programming Languages, Python, Security, Technology, Virtualization and Cloud Computing, VMware, VMware, VMware
Tagged automating VMware NSX security rules creation with Splunk and Python, monitor the NSX DFW, monitor the NSX distributed firewall, monitor the VMware NSX DFW, monitor the VMware NSX distributed firewall, Network Virtualization, Network Virtualization blog, NSX, NSX App for Splunk, NSX automation, NSX DFW, NSX DFW logging, NSX Distributed Firewall, NSX Distributed Firewall logging, NSX REST API, NSX REST API Python, Python, REST API, Splunk, Spunk NSX, Spunk NSX integration, vmware, VMware Network Virtualization blog, VMware NSX, VMware NSX App for Splunk, VMware NSX automation, VMware NSX DFW, VMware NSX DFW logging, VMware NSX Distributed Firewall, VMware NSX Distributed Firewall logging, VMware NSX REST API
1 Comment