Author: ProHoster

Microsoft SMS Organizer app for Android will get rid of spam in messages

Microsoft has developed a new application called SMS Organizer for the Android mobile platform, which is designed to automatically sort incoming messages. Initially, this software was only available in India, but today there are reports that users from some other countries can download SMS Organizer. The SMS Organizer app uses machine learning technology to automatically sort incoming […]

gamescom 2019: Disintegration trailer looks like a mix of Halo and X-COM

A month ago, publishing house Private Division and studio V1 Interactive presented the sci-fi shooter Disintegration. It should be released next year on PlayStation 4, Xbox One and PC. And during the opening of the gaming exhibition gamescom 2019, the creators showed a more complete trailer for this project, which this time includes excerpts of the gameplay. It turns out that the vehicle from the first video […]

MemeTastic 1.6 is a mobile application for creating memes based on templates

MemeTastic is a simple meme generator for Android. Completely free of advertising and 'watermarks'. Memes can be created from template images placed in the /sdcard/Pictures/MemeTastic folder, images shared by other applications and images from the gallery, or take a photo with your camera and use this photo as a template. The application does not require network access to operate. Convenience […]

VLC 3.0.8 media player update with security fixes

A corrective release of the VLC 3.0.8 media player has been presented, which eliminates accumulated errors and eliminates 13 vulnerabilities, including three problems (CVE-2019-14970, CVE-2019-14777, CVE-2019-14533) that can lead to the execution of an attacker’s code when trying to playback of specially designed multimedia files in MKV and ASF formats (write buffer overflow and two problems with accessing memory after it is freed). Four […]

Release of new stable branch Tor 0.4.1

The release of the Tor 0.4.1.5 toolkit, used to organize the operation of the anonymous Tor network, has been presented. Tor 0.4.1.5 is recognized as the first stable release of the 0.4.1 branch, which has been in development for the past four months. The 0.4.1 branch will be maintained as part of the regular maintenance cycle - updates will be discontinued after 9 months or 3 months after the release of the 0.4.2.x branch. Long Time Support (LTS) is provided […]

Malicious code detected in rest-client and 10 other Ruby packages

In the popular rest-client gem package, with a total of 113 million downloads, malicious code substitution (CVE-2019-15224) was detected, which downloads executable commands and sends information to an external host. The attack was carried out by compromising the rest-client developer account in the rubygems.org repository, after which the attackers published releases 13-14 on August 1.6.10 and 1.6.13, which included malicious changes. Before malicious versions of them are blocked […]

THQ Nordic Resurrects Helicopter Simulator Comanche on PC

The gaming exhibition Gamescom 2019 in Cologne turned out to be rich in announcements. For example, during a live broadcast, the publishing house THQ Nordic announced the revival of the once famous helicopter simulator Comanche and showed a short video with excerpts of the gameplay of this interesting project. The trailer promises intense multiplayer dogfights with a focus on completing objectives. One of the most interesting details revealed by the teaser […]

How to solve the problems of aggregator sites using residential proxies

Image: Pexels For e-commerce aggregator sites, maintaining up-to-date information is critical. Otherwise, their main advantage disappears - the ability to see the most relevant data in one place. In order to solve this problem, it is necessary to use web scraping techniques. Its meaning is that a special software is created - a crawler, which bypasses the necessary sites from the list […]

Cisco Training 200-125 CCNA v3.0. Day 20 Static Routing

Today we'll talk about static routing and look at three topics: what static routing is, how it's configured, and what its alternative is. You see the network topology, which includes a computer with an IP address of 192.168.1.10, connected via a switch to a gateway, or router. For this connection, the router port f0/0 with the IP address 192.168.1.1 is used. The second port of this router […]

DevOps Deflope open mic, stories about Skyeng and Nvidia infrastructure and more

Hello, next Tuesday warm lamp gatherings are planned at Taganka: Artem Naumenko will be there with a story about infrastructure as a product, Vitaly Dobrovolsky with a report on balancing the Kafka cluster and the hosts of a specialized podcast with a still secret topic for discussion. We are also expecting a special guest from the northern capital - Vitaly Levchenko, organizer of the St. Petersburg SRE party. UPD. Locations in […]

How I put things in order in a project where there is a forest of direct hands (tslint settings, prettier, etc)

Hello again. Sergey Omelnitsky is in touch. Today I will share with you one of my headaches, namely, what to do when a project is written by many multi-level programmers using the example of an Angular application. It so happened that for a long time I worked only with my team, where we had long agreed on the rules of formatting, commenting, indentations, etc. Got used to it [...]

How the world's largest video surveillance systems work

In previous posts we talked about simple video surveillance systems in business, but now we will talk about projects in which the number of cameras is in the thousands. Often the difference between the most expensive video surveillance systems and the solutions that small and medium-sized businesses can already use is scale and budget. If there are no restrictions on the cost of the project, you can directly [...]