Author: ProHoster

WSJ: Huawei can already do without American chips

US tech companies have received permission to extend their partnership with Chinese smartphone and telecommunications equipment maker Huawei Technologies, but it may be too late. According to The Wall Street Journal, the Chinese company is now creating smartphones without using chips of American origin. Unveiled in September, the Huawei Mate 30 Pro phone with a curved display, competing with the Apple iPhone 11, […]

50 years ago the Internet was born in room No. 3420

This is the story of the creation of the ARPANET, the revolutionary forerunner of the Internet, as told by participants. Arriving at the Bolter Hall Institute at the University of California at Los Angeles (UCLA), I climbed the stairs to the third floor in search of room No. 3420. And then I went into it. From the corridor she didn't seem anything special. But 50 years ago, on October 29, 1969, […]

$11 million invested in intelligent cybersecurity platform

The issue of security is acute for every company working with data. Modern tools allow attackers to successfully imitate the activities of an ordinary user. And security mechanisms do not always recognize and stop unauthorized access attempts. The result is information leaks, theft of funds from bank accounts, and other troubles. The Spanish company Buguroo proposed its solution to this problem, using deep learning […]

Debugging software deployment with strace

My main job is, for the most part, deploying software systems, which means I spend a lot of time trying to answer questions like this: The developer has this software working, but it doesn’t work for me. Why? Yesterday this software worked for me, but today it doesn’t. Why? This is a kind of debugging that is slightly different from regular software debugging. […]

A bunch of OpenVPN on Windows Server and Mikrotik with the migration of this goodness to Linux

Hello! Every business sooner or later suddenly needs remote access. Almost every IT specialist faces the need to organize remote access to their networks in an enterprise. For me, like many others, this need hit me like “yesterday.” After analyzing all the pros and cons, as well as sifting through tons of information and poking around a little in theory, I decided to proceed with the installation. […]

How we at CYAN tamed terabytes of logs

Hello everyone, my name is Alexander, I work at CIAN as an engineer and am involved in system administration and automation of infrastructure processes. In the comments to one of the previous articles, we were asked to tell where we get 4 TB of logs per day and what we do with them. Yes, we have a lot of logs, and a separate infrastructure cluster has been created to process them, which […]

What happens with connections inside and outside the VPN tunnel

Real articles are born from letters to Tucha technical support. For example, we were recently approached by a client with a request to clarify what happens during connections inside the VPN tunnel between the user’s office and the cloud environment, as well as during connections outside the VPN tunnel. Therefore, the entire text below is an actual letter that we sent to one of our clients in response to […]

How attackers can read your Telegram correspondence. And how to stop them

At the end of 2019, several Russian entrepreneurs contacted the Group-IB cybercrime investigation department who were faced with the problem of unauthorized access by unknown persons to their correspondence in the Telegram messenger. The incidents occurred on iOS and Android devices, regardless of which federal cellular operator the victim was a client of. The attack began with the user receiving a message in the Telegram messenger […]

SCADA on Raspberry: myth or reality?

Winter Is Coming. Programmable logic controllers (PLCs) are gradually being replaced by embedded personal computers. This is due to the fact that the power of computers allows one device to incorporate the functionality of a programmable controller, a server, and (if the device has an HDMI output) also an automated operator workstation. Total: Web server, OPC part, database and workstation in a single housing, and […]

Architect of high loads. New course from OTUS

Attention! This article is not engineering and is intended for readers who are in search of Best Practice on HighLoad and fault tolerance of web applications. Most likely, if you are not interested in learning, this material will not be of interest to you. Let’s imagine a situation: some online store launched a promotion with discounts, you, like millions of other people, also decided to buy yourself a very important [...]