Author: ProHoster

[Supercomputing 2019]. Multi-cloud storage as an area of ​​application for the new Kingston DC1000M drives

Imagine that you are launching an innovative medical business - individual selection of drugs based on analysis of the human genome. Each patient has 3 billion gene pairs, and a regular server on x86 processors will take several days to calculate. You know that you can speed up the process on a server with an FPGA processor that parallelizes calculations across thousands of threads. He will perform genome calculations […]

Vivo iQOO Neo 855 Racing Edition: powerful smartphone with Snapdragon 855 Plus chip

The Chinese company Vivo has announced a high-performance smartphone iQOO Neo 855 Racing Edition, running the Android Pie operating system. The device is equipped with a 6,38-inch AMOLED display. A panel with Full HD+ resolution and an aspect ratio of 19,5:9 is used. A fingerprint scanner is built directly into the screen area. The “heart” of the new product is the Snapdragon 855 Plus processor. This chip combines eight cores […]

Is the era of ARM servers coming?

SynQuacer E-Series motherboard for a 24-core ARM server on an ARM Cortex A53 processor with 32 GB of RAM, December 2018 For many years, ARM processors with a reduced instruction set (RISC) have dominated the mobile device market. But they never managed to break into data centers, where Intel and AMD still reign with the x86 instruction set. Periodically there are […]

How to use MySQL without a password (and security risks)

They say that the best password is the one you don't have to remember. In the case of MySQL, this is possible thanks to the auth_socket plugin and its version for MariaDB - unix_socket. Both of these plugins are not new at all; they have been discussed a lot in this blog, for example in the article on how to change passwords in MySQL 5.7 using the auth_socket plugin. […]

The turnout failed: we bring AgentTesla to clean water. Part 2

We continue our series of articles devoted to malware analysis. In the first part, we told how Ilya Pomerantsev, a malware analysis specialist at CERT Group-IB, conducted a detailed analysis of a file received by mail from one of the European companies and discovered the AgentTesla spyware there. In this article, Ilya provides the results of a step-by-step analysis of the main AgentTesla module. Agent Tesla - […]

Real summation of Internet channels - OpenMPTCPRouter

Is it possible to combine several Internet channels into one? There are a lot of misconceptions and myths around this topic, even experienced network engineers often do not know that this is possible. In most cases, link aggregation is erroneously referred to as NAT balancing or failover. But real summation allows you to run one single TCP connection simultaneously over all Internet channels, for example, a video broadcast […]

IGF 2019. Internet falling apart?

IGF 2019 has ended in Berlin. A week of dense debates of experts from all over the planet Earth under the flags of the UN about Internet Governance. All multistakeholders of the Internet came to IGF, who today make the Internet, use the Internet, squeeze the Internet and protect this very Internet on different continents. At the annual Forum, a large number of topical issues were raised that are now worrying all […]

How to connect to a corporate VPN on Linux using openconnect and vpn-slice

Want to use Linux at work, but your corporate VPN doesn't? Then this article may help, although it is not accurate. I want to warn you in advance that I do not understand network administration issues well, so it is possible that I did everything wrong. On the other hand, it is possible that I will be able to write the manual in such a way that it will be understood by ordinary people, so […]

Solving a Simple Linear Regression Equation

The article discusses several ways to determine the mathematical equation of a simple (pair) regression line. All methods of solving the equation considered here are based on the least squares method. We denote the methods as follows: Analytical solution Gradient descent Stochastic gradient descent For each of the methods for solving the equation of a straight line, the article presents various functions, which are mainly divided into those written without […]

Habr-analysis: what users order as a gift from Habr

Did you notice that it's already December on the calendar? You are probably almost ready to celebrate, you bought gifts, participated in Habra-ADM and stocked up on tangerines. Naturally, every Habra-user wants not only to give, but also to receive something for the new year. And since each of us is quite picky, we often order gifts for ourselves. Including we […]

Exim 4.93 release

The Exim 4.93 mail server was released, which included the results of work over the past 10 months. New features: Added $tls_in_cipher_std and $tls_out_cipher_std variables containing the names of the cipher suites corresponding to the name from the RFC. New flags have been added to control the display of message identifiers in the log (set via the log_selector setting): “msg_id” (enabled by default) with the message identifier and “msg_id_created” with the generated […]

Release of cluster FS Luster 2.13

The release of the Luster 2.13 cluster file system has been published, used in the majority (~60%) of the largest Linux clusters containing tens of thousands of nodes. Scalability on such large systems is achieved through a multi-component architecture. The key components of Luster are metadata processing and storage servers (MDS), management servers (MGS), object storage servers (OSS), object storage (OST, supports running on top of ext4 and ZFS) and clients. […]