Author: ProHoster

Väterchen Frost or six sign for Habr

One dank and snowless December, somewhere far from Spartakovsky Lane, one Russian, but as if the German Grandfather Frost thought about going for a visit and checking the strength of international ties? After all, the end of the year is the best time to send out unexpected news and check the accuracy of addresses! 1. We jump into the “basement” of the desktop version of Habr, find “About […]

How to beat a soulless random in roguelike games

Dying in the game for the 30th time, you can’t help but wonder: has the game designer thought of everything and hasn’t he screwed up the balance? It is not always possible to adapt to unexpected changes, especially when they are created by procedural generation. The following is material that examines the role of chance in roguelike games and the genre as a whole - what the consequences of ill-conceived randomness systems are and what, in the author’s opinion, […]

How do I teach Python to kids?

My main work is related to data and programming in R, but in this article I want to talk about my hobby, which even brings in some income. I have always been interested in telling and explaining things to friends, classmates and fellow students. It’s also always been easy for me to find a common language with children, I don’t know why. In general, I believe that education [...]

The Geneva project develops an engine to automate traffic censorship bypass

Researchers from the University of Maryland, as part of the Geneva project, attempted to create an engine to automate the determination of methods used to censor access to content. Manually trying to sort out possible flaws in deep packet inspection (DPI) systems is a rather difficult and time-consuming process; Geneva tried to use a genetic algorithm to evaluate the features of DPI, identify errors in the implementation and develop an optimal strategy […]

ProtonVPN open-sourced all of their apps

On January 21, the ProtonVPN service opened the source codes of all remaining VPN clients: Windows, Mac, Android, iOS. The sources of the Linux console client were open source from the very beginning. Recently, the Linux client was completely rewritten in Python and acquired many new features. Thus, ProtonVPN became the first VPN provider in the world to open source all client applications on all platforms and undergo a full independent code audit […]

Release of GNU Mes 0.22, a self-contained distribution toolkit

The release of the GNU Mes 0.22 toolkit is presented, providing a bootstrap process for GCC and allowing for a closed-loop rebuilding cycle from source code. The toolkit solves the problem of verified initial assembly of the compiler in distributions, breaking the chain of cyclical rebuilding (building the compiler requires executable files of an already built compiler, and binary assemblies of the compiler are a potential source of hidden bookmarks, which does not allow […]

Weston Composite Server 8.0 Release

A stable release of the composite server Weston 8.0 has been published, developing technologies that contribute to the emergence of full support for the Wayland protocol in Enlightenment, GNOME, KDE and other user environments. Weston's development aims to provide a high-quality code base and working examples for using Wayland in desktop environments and embedded solutions, such as platforms for automotive infotainment systems, smartphones, TVs and other consumer devices. […]

7 vulnerabilities in the Plone content management system

For the free content management system Plone, written in Python using the Zope application server, patches have been published to eliminate 7 vulnerabilities (CVE identifiers have not yet been assigned). The problems affect all current releases of Plone, including the 5.2.1 release released a few days ago. The issues are planned to be fixed in future releases of Plone 4.3.20, 5.1.7, and 5.2.2, and hotfix is ​​suggested until they are published. […]

The work of an analogue of AirDrop for Android was first shown on video

Some time ago it became known that Google is working on an analogue of AirDrop technology, which allows iPhone users to transfer files without using third-party software. Now a video has been published on the Internet that clearly demonstrates the operation of this technology, called Nearby Sharing. For a long time, Android users had to use third-party apps to transfer files between […]

Critical vulnerabilities in medical devices for patient monitoring

CyberMDX has released information about six vulnerabilities affecting various GE Healthcare medical devices designed to monitor the condition of patients. Five vulnerabilities are assigned the maximum severity level (CVSSv3 10 out of 10). The vulnerabilities have been codenamed MDhex and are mainly related to the use of previously known pre-installed credentials used across the entire series of devices. CVE-2020-6961 – delivery to […]