Author: ProHoster

What to do if mailings are already in Spam: 5 practical steps

Image: Unsplash When dealing with mailing lists, there can be surprises. A common situation: everything worked fine, but suddenly the open rate of emails dropped sharply, and the postmasters of the mail systems began to signal that your mailing lists were in Spam. What to do in such a situation and how to get out of "Spam"? Step 1. Checking for compliance with a number of criteria First of all, it is necessary to […]

Pet (fantasy story)

Usually we write in our blogs about the features of various complex technologies or talk about what we are working on ourselves, share insights. But today we want to offer you something special. In the summer of 2019, the famous author of science fiction works, Sergey Zhigarev, wrote two stories for the Selectel and RBC literary project, but only one was included in the final edition. The second is like […]

Deploying Applications Easily and Naturally on Tarantool Cartridge (Part 1)

We have already talked about Tarantool Cartridge, which allows you to develop distributed applications and package them. There is nothing left: learn how to deploy and manage these applications. Don't worry, we've thought of everything! We have put together all the best practices for working with Tarantool Cartridge and wrote an ansible role that will decompose the package into servers, launch instances, unite them into a cluster, […]

NetHack 3.6.3

The NetHack development team is pleased to announce the release of version 3.6.3 of NetHack, a PC RPG that is one of the founders of the roguelike genre and the oldest game still in development. The game is a very complex, dynamic and unpredictable labyrinth world in which the player fights various creatures, trades, develops and advances downwards in order to […]

How I visited Urban Tech 2019. Report from the scene

Urban Tech Moscow is a hackathon with a prize fund of 10 rubles. 000 commands, 000 hours of code and 250 pizza slices. As it was firsthand in this article. Straight to the point and all right. Applying How the recruitment went was a mystery to us. We are a group of guys from a small town and one […]

Cockos Reaper 6

A major update to the Reaper 6 digital workstation is being developed by Cockos, a one-man company at the moment. The previous release was notable for building the program for Linux, and the new release continues to explore the market for Linux-based platforms. Assemblies are supplied in tarballs, accompanied by installation scripts, and do not depend on a distribution-specific package format. Installation images are prepared for […]

Habra detective and festive mood

Have you heard the phrase “often comments are much more useful than the article itself”? On Habré, it meets quite regularly. Mostly it is about additional technical details, a view from the point of view of another technology, or simply alternative opinions. But today I'm not interested in technical comments at all. The fact is that recently on Habré registration was opened in the “Club of Anonymous […]

NetHack 3.6.3 game release

After 6 months of development, the NetHack development team has prepared the release of the legendary roguelike game NetHack 3.6.3. This release contains mostly bug fixes (over 190) as well as over 22 improvements to the game, including those suggested by the community. In particular, compared to the previous release, the work of the curses interface on all platforms has been significantly improved. Also improved work in MS-DOS (especially on virtual […]

How not to get into a US university

Hello! In view of the recent growing interest in education abroad, and specifically in higher education in the USA, I would like to share my experience of applying for a bachelor’s degree to several American universities. Since I did not achieve the goal I set for myself, I will tell you from the dark side of the issue - an analysis of the mistakes that an applicant can make and how to […]

Vulnerability that allows wedging into TCP connections made through VPN tunnels

An attack technique (CVE-2019-14899) has been published that allows packets to be spoofed, modified, or substituted in TCP connections forwarded through VPN tunnels. The problem affects Linux, FreeBSD, OpenBSD, Android, macOS, iOS and other Unix-like systems. Linux supports the rp_filter (reverse path filtering) mechanism for IPv4, turning it on in “Strict” mode neutralizes this problem. The method allows for packet substitution at the level of TCP connections passing inside an encrypted […]

Release of Proxmox VE 6.1, a distribution kit for organizing the work of virtual servers

Proxmox Virtual Environment 6.1 was released, a specialized Linux distribution based on Debian GNU/Linux, aimed at deploying and maintaining virtual servers using LXC and KVM and capable of replacing products such as VMware vSphere, Microsoft Hyper-V and Citrix XenServer . The size of the installation iso image is 776 MB. Proxmox VE provides the tools to deploy a complete virtualization […]

W3C makes WebAssembly a recommended standard

The W3C has announced that WebAssembly has become a recommended standard. WebAssembly provides browser-independent, universal, low-level intermediate code for running applications compiled from various programming languages. WebAssembly is positioned as a more promising and cross-browser portable technology for creating high-performance web applications. WebAssembly can be used to solve problems that require high performance, such as video encoding, audio processing, […]