Author: ProHoster

iPhone owners may lose the ability to store an unlimited number of photos in Google Photos for free

After the announcement of the Pixel 4 and Pixel 4 XL smartphones, it became known that their owners will not be able to save an unlimited number of uncompressed photos in Google Photos for free. Previous Pixel models provided this feature. Moreover, according to online sources, users of the new iPhone can still store an unlimited number of photos in the Google Photos service, since smartphones […]

Attackers use infected Tor browser for surveillance

ESET specialists have uncovered a new malicious campaign aimed at Russian-speaking users of the World Wide Web. Cybercriminals have been distributing an infected Tor browser for several years, using it to spy on victims and steal their bitcoins. The infected web browser was distributed through various forums under the guise of the official Russian-language version of Tor Browser. The malware allows attackers to see which websites the victim is currently visiting. In theory they […]

Russia begins development of advanced hybrid power plants for the Arctic

The Ruselectronics holding, part of the state corporation Rostec, has begun the creation of autonomous combined power plants for use in the Arctic zone of Russia. We are talking about equipment that can generate electricity based on renewable sources. In particular, three autonomous energy modules are being designed, including in various configurations an electrical energy storage device based on lithium-ion batteries, a photovoltaic generating system, a wind generator and (or) a floating […]

The unreleased Diablo artbook will include illustrations from the fourth part of the series

The German publication GameStar announced that on page 27 of the next issue of its magazine it will publish an advertisement for an art book dedicated to Diablo. The product description says that the book contains drawings from four parts of the series. And it seems that this is not a typo, because in the list of games the name Diablo IV is clearly visible. A page for the art book has already appeared on the Amazon service, on which the release date is […]

“Learning process in IT and not only”: technological competitions and events of ITMO University

We are talking about the events that will take place in our country in the next two months. At the same time, we are sharing competitions for those who are undergoing training in technical and other specialties. Photo: Nicole Honeywill / Unsplash.com Competitions Student Olympiad “I’m a Professional” When: October 2 – December 8 Where: online The goal of the “I’m a Professional” Olympiad is to test not only [...]

Modernization of the informatics class in a Russian school on Malinka: cheap and cheerful

There is no sadder story in the world than Russian IT education in the average school. Introduction The educational system in Russia has many different problems, but today I will look at a topic that is not discussed very often: IT education in school. In this case, I will not touch on the topic of personnel, but will just conduct a “thought experiment” and try to solve the problem of equipping a classroom […]

Release of MirageOS 3.6, a platform for running applications on top of a hypervisor

The MirageOS 3.6 project has been released, allowing the creation of operating systems for one application, in which the application is delivered as a self-contained “unikernel” that can be executed without the use of operating systems, a separate OS kernel and any layers. The OCaml language is used to develop applications. The project code is distributed under the free ISC license. All the low-level functionality inherent to the operating system is implemented in the form of a library attached to […]

Release of Pacman 5.2 package manager

A release of the Pacman 5.2 package manager used in the Arch Linux distribution is available. Among the changes we can highlight: Support for delta updates has been completely removed, allowing only changes to be downloaded. The feature has been removed due to the discovery of a vulnerability (CVE-2019-18183) that allows arbitrary commands to be launched in the system when using unsigned databases. For an attack, it is necessary for the user to download files prepared by the attacker with a database and delta update. Delta update support […]

Detailed video comparison of models and animations of Warcraft III Reforged with the original RTS

Recently, more and more information has been appearing about the upcoming re-release of Warcraft III. This is the Russian voice acting of Warcraft III: Reforged, and illustrations from the game, and an excerpt of the gameplay, and 50 minutes of gameplay. Now, several comparison videos of Warcraft III Reforged have appeared on the Internet, comparing the character models and animations with the original game. In published on the channel [...]

AMD Almost Beats Ryzen 9 3900X Shortage in US Stores

The Ryzen 9 3900X processor, presented in the summer, with 12 cores distributed between two 7-nm crystals, was difficult to buy in many countries until the fall, since there were clearly not enough processors for this model for everyone. The most interesting thing is that before the appearance of the 16-core Ryzen 9 3950X, this processor is considered the formal flagship of the Matisse line, and there are a sufficient number of enthusiasts willing to […]

Monitoring + load testing = predictability and no failures

The VTB IT department several times had to deal with emergency situations in the operation of systems, when the load on them increased many times over. Therefore, there was a need to develop and test a model that would predict peak load on critical systems. To do this, the bank’s IT specialists set up monitoring, analyzed data and learned to automate forecasts. What tools helped predict the load and did they succeed […]

Android clicker subscribes users to paid services

Doctor Web has discovered a clicker Trojan in the official catalog of Android applications that is capable of automatically subscribing users to paid services. Virus analysts have identified several modifications of this malicious program, named Android.Click.322.origin, Android.Click.323.origin and Android.Click.324.origin. To hide their true purpose and also reduce the likelihood of detection of the Trojan, attackers used several techniques. First, they built the clicker into harmless applications - cameras […]