Author: ProHoster

Speed ​​up OpenVPN for $9.99* or embed Orange Pi One into a router

Some of us do not use the Internet without a VPN for one reason or another: someone needs a dedicated IP, and it is easier and cheaper to buy a VPS with two IPs than buying an address from a provider, someone wants to access all websites, and not only permitted on the territory of the Russian Federation, others need IPv6, but the provider does not provide it... Most often […]

New IT infrastructure for Russian Post data center

I am sure that all Habr readers have at least once ordered goods from online stores abroad and then went to receive parcels at a Russian Post office. Can you imagine the scale of this task, from the point of view of organizing logistics? Multiply the number of buyers by the number of their purchases, imagine a map of our vast country, and on it there are more than 40 thousand post offices... By the way, in […]

Speeding up OpenVPN on an Openwrt router. Alternative version without soldering iron and hardware extremism

Hello everyone, I recently read an old article about how you can speed up OpenVPN on a router by moving the encryption to a separate piece of hardware that is soldered inside the router itself. I have a similar case to the author - TP-Link WDR3500 with 128 megabytes of RAM and a poor processor that is completely unable to cope with tunnel encryption. However, I categorically go into the router with a soldering iron [...]

Very Attacked Person: find out who is the main target of cybercriminals in your company

Today for many Khabrovsk residents is a professional holiday - the day of personal data protection. And so we would like to share an interesting study. Proofpoint has prepared a study on attacks, vulnerabilities and personal data protection in 2019. Its analysis and analysis is under the cut. Happy holiday, ladies and gentlemen! The most intriguing thing about the Proofpoint study is the new term […]

Finding Order in IT Chaos: Organizing Your Own Development

Each of us (I really hope so) has ever thought about how to effectively organize our development in one area or another. This issue can be approached from different angles: someone is looking for a mentor, others attend educational courses or watch educational videos on YouTube, while others delve into information garbage, trying to find crumbs of valuable information. […]

How to set up a Chinese Levitron

In this article we will look at the electronic content of such devices, the operating principle and the configuration method. Until now, I have come across descriptions of finished factory products, very beautiful, and not very cheap. In any case, with a quick search, prices start at ten thousand rubles. I offer a description of a Chinese kit for self-assembly for 1.5 thousand. First of all, it is necessary to clarify [...]

Does automation kill?

“Excessive automation was a mistake. To be precise - my mistake. People are undervalued." Elon Musk This article may look like bees against honey. It’s really strange: we’ve been automating business for 19 years and suddenly on Habré we’re declaring in full force that automation is dangerous. But this is at first glance. Too much is bad in everything: medicines, sports, [...]

Wireguard is included in the Linux kernel

Wireguard is a simple and secure VPN protocol whose main developer is Jason A. Donenfeld. For a long time, the kernel module that implements this protocol was not accepted into the main branch of the Linux kernel, since it used its own implementation of cryptographic primitives (Zinc) instead of the standard crypto API. Recently, this obstacle was eliminated, including due to improvements adopted in the crypto API. […]

Mnemonics: exploring methods to increase brain memory

Good memory is often an innate characteristic of some people. And therefore, there is no point in competing with genetic “mutants”, exhausting yourself with training, including memorizing poems and inventing associative stories. Since everything is written in the genome, you can’t jump over your head. Indeed, not everyone can build memory palaces like Sherlock and visualize any sequence of information. If you have tried the basic techniques listed in […]

Thunderbird development transferred to MZLA Technologies Corporation

The developers of the Thunderbird email client announced the transfer of project development to a separate company, MZLA Technologies Corporation, which is a subsidiary of the Mozilla Foundation. Until now, Thunderbird was under the auspices of the Mozilla Foundation, which oversaw financial and legal issues, but the infrastructure and development of Thunderbird were separated from Mozilla and the project developed in isolation. The transfer to a separate unit is due […]

TrafficToll 1.0.0 release - programs for restricting network traffic of applications in Linux

The other day, TrafficToll 1.0.0 was released - a rather useful console program that allows you to limit bandwidth (shaping) or completely block network traffic for individually selected applications in Linux. The program allows you to limit the incoming and outgoing speed both for each interface and for each process separately (even while it is running). The closest analogue of TrafficToll is the well-known proprietary […]