Author: ProHoster

ASUS unveils ROG Strix Scope TKL Deluxe mechanical gaming keyboard

ASUS has introduced a new Strix Scope TKL Deluxe keyboard in the Republic of Gamers series, which is built on mechanical switches and is designed for use with gaming systems. ROG Strix Scope TKL Deluxe is a keyboard without a number pad, and in general, according to the manufacturer, has 60% less volume compared to full-size keyboards. IN […]

NVIDIA adds ray tracing support to GeForce Now cloud gaming service

At gamescom 2019, NVIDIA announced that its streaming gaming service GeForce Now now includes servers that use graphics accelerators with hardware ray tracing acceleration. It turns out that NVIDIA has created the first streaming game service with support for real-time ray tracing. This means that anyone can now enjoy ray tracing […]

You can now build Docker images in werf using a regular Dockerfile

Better late than never. Or how we almost made a serious mistake by not having support for regular Dockerfiles to build application images. We will talk about werf - a GitOps utility that integrates with any CI/CD system and provides management of the entire application lifecycle, allowing you to: collect and publish images, deploy applications in Kubernetes, delete unused images using special policies. […]

Updates to free libraries for working with Visio and AbiWord formats

The Document Liberation project, founded by LibreOffice developers to move tools for working with various file formats into separate libraries, presented two new releases of libraries for working with Microsoft Visio and AbiWord formats. Thanks to their separate delivery, the libraries developed by the project allow you to organize work with various formats not only in LibreOffice, but also in any third-party open project. For example, […]

IBM, Google, Microsoft and Intel formed an alliance to develop open data protection technologies

The Linux Foundation announced the founding of the Confidential Computing Consortium, aimed at developing open technologies and standards related to secure in-memory processing and confidential computing. The joint project has already been joined by companies such as Alibaba, Arm, Baidu, Google, IBM, Intel, Tencent and Microsoft, which intend to jointly develop technologies for data isolation […]

Users will be able to interact with LG smart appliances using voice

LG Electronics (LG) announced the development of a new mobile application, ThinQ (formerly SmartThinQ), for interacting with smart home devices. The main feature of the program is support for voice commands in natural language. This system uses Google Assistant voice recognition technology. Using common phrases, users will be able to interact with any smart device connected to the Internet via Wi-Fi. […]

Every third Russian lost money as a result of telephone fraud

A study conducted by Kaspersky Lab suggests that almost every tenth Russian has lost a large amount of money as a result of telephone fraud. Typically, telephone scammers act on behalf of a financial institution, say a bank. The classic scheme of such an attack is as follows: attackers call from a fake number or from a number that previously really belonged to the bank, introduce themselves as its employees and […]

Russian developer who discovered vulnerabilities on Steam was mistakenly denied an award

Valve reported that Russian developer Vasily Kravets was mistakenly denied an award under the HackerOne program. According to The Register, the studio will fix the discovered vulnerabilities and will consider issuing an award to Kravets. On August 7, 2019, security specialist Vasily Kravets published an article about Steam local privilege escalation vulnerabilities. This allows anyone harmful […]

Telegram, who's there?

Several months have passed since the launch of our secure call to owner service. Currently, 325 people are registered on the service. A total of 332 objects of ownership are registered, of which 274 are cars. The rest is all real estate: doors, apartments, gates, entrances, etc. Frankly speaking, not very much. But during this time, some significant things have happened in our immediate world, [...]

Vulnerability allowing exit from isolated QEMU environment

Details of a critical vulnerability (CVE-2019-14378) in the SLIRP handler, which is used by default in QEMU to establish a communication channel between the virtual network adapter in the guest system and the network backend on the QEMU side, have been disclosed. The problem also affects virtualization systems based on KVM (in Usermode) and Virtualbox, which use the slirp backend from QEMU, as well as applications using network […]

ShIoTiny: Nodes, Links, and Events or Features of Drawing Programs

Main points or what this article is about The topic of the article is visual programming of the ShIoTiny PLC for a smart home, described here: ShIoTiny: small automation, Internet of things or “six months before vacation.” Concepts such as nodes, connections, events, as well as the features of loading and executing a visual program on the ESP8266, which is the basis of the ShIoTiny PLC, are very briefly discussed. Introduction or […]

ShIoTiny: Wet Room Ventilation (Sample Project)

Main points or what this article is about We continue the series of articles about ShIoTiny - a visually programmable controller based on the ESP8266 chip. This article describes, using the example of a ventilation control project in a bathroom or other room with high humidity, how the program for ShIoTiny is built. Previous articles in the series. ShIoTiny: small automation, Internet of things or “for […]