Author: ProHoster

HP Pavilion Gaming Desktop: Gaming PC with Intel Core i7-9700 Processor

HP has timed the announcement of the new Pavilion Gaming Desktop coded TG2019-01t to coincide with the annual international exhibition gamescom 0185. The device, as reflected in the name, belongs to the gaming class. The PC is housed in an elegant black case with green backlighting. Dimensions are 307 × 337 × 155 mm. The basis is the Intel Core i7-9700 processor (ninth generation Core). This eight-core chip […]

Futuristic Human wireless headphones turn into a portable Bluetooth speaker

After nearly five years in development, Seattle tech startup Human has released wireless headphones, promising superior audio quality with 30mm drivers, 32-point touch controls, digital assistant integration, real-time foreign language translation, 9 hours of battery life, and range 100 feet (30,5 m). An array of four microphones forms an acoustic beam for […]

How to set up PVS-Studio in Travis CI using the PSP emulator as an example

Travis CI is a distributed web service for building and testing software that uses GitHub as source code hosting. In addition to the above operating scenarios, you can add your own thanks to the extensive configuration options. In this article we will configure Travis CI to work with PVS-Studio using the PPSSPP code example. Introduction Travis CI is a web service for building and […]

Not Scanning Alone, or How to Build a Vulnerability Management Process in 9 Steps

On July 4th we held a large seminar on vulnerability management. Today we are publishing a transcript of the speech of Andrey Novikov from Qualys. He will tell you what steps you need to go through to build a vulnerability management workflow. Spoiler: we will only reach the halfway point before scanning. Step #1: Determine the maturity level of your vulnerability management processes At the very beginning, you need to understand at what […]

Google bans dessert names from Android releases

Google has announced that it will end the practice of assigning the names of sweets and desserts to Android platform releases in alphabetical order and will switch to regular digital numbering. The previous scheme was borrowed from the practice of naming internal branches used by Google engineers, but caused a lot of confusion among users and third-party developers. Thus, the currently developed release of Android Q is now officially […]

The Unix operating system is 50 years old

In August 1969, Ken Thompson and Denis Ritchie of the Bell Laboratory, dissatisfied with the size and complexity of the Multics OS, after one month of hard work, presented the first working prototype of the Unix operating system, created in assembly language for the PDP-7 minicomputer. Around this time, the high-level programming language Bee was developed, which a few years later evolved into […]

Release of the CUPS 2.3 printing system with a change in the license for the project code

Almost three years after the formation of the last significant branch, Apple introduced the release of the free printing system CUPS 2.3 (Common Unix Printing System), used in macOS and most Linux distributions. The development of CUPS is completely controlled by Apple, which in 2007 absorbed the company Easy Software Products, which created CUPS. Starting with this release, the license for the code has changed [...]

Flow protocols as a tool for monitoring the security of an internal network

When it comes to monitoring the security of an internal corporate or departmental network, many associate it with controlling information leaks and implementing DLP solutions. And if you try to clarify the question and ask how you detect attacks on the internal network, then the answer will, as a rule, be a mention of intrusion detection systems (IDS). And what was the only […]

Cisco Training 200-125 CCNA v3.0. Day 22 CCNA Version XNUMX: Continue learning RIP

I already said that I will be updating my video tutorials to CCNA v3. Everything you learned in previous lessons is fully relevant to the new course. If the need arises, I will include additional topics in new lessons, so you can rest assured that our lessons are aligned with the 200-125 CCNA course. First, we will fully study the topics of the first exam 100-105 ICND1. […]

The modder improved the textures of the Dust 2 map from Counter-Strike 1.6 with the help of a neural network

Recently, fans often use neural networks to improve old cult projects. This includes Doom, Final Fantasy VII, and now a bit of Counter-Strike 1.6. The author of the YouTube channel 3kliksphilip used artificial intelligence to increase the resolution of the textures of the Dust 2 map, one of the most popular locations in the old competitive shooter from Valve. The modder recorded a video demonstrating the changes. […]

Corsair K57 RGB keyboard can connect to PC in three ways

Corsair has expanded its range of gaming-grade keyboards by announcing the full-size K57 RGB Wireless Gaming Keyboard. The new product can connect to a computer in three different ways. One of them is wired, via a USB interface. In addition, Bluetooth wireless communication is supported. Finally, the company's ultra-fast SlipStream wireless technology (2,4 GHz band) is implemented: it is claimed that in this mode the delay […]