Author: ProHoster

Video: The first 14 minutes of Borderlands 3 gameplay

Not long ago, Gearbox Software announced that the expected co-op shooter Borderlands 3 was going to press. On the occasion of the imminent launch, a recording of the first minutes of the upcoming project, built around joint shootings and collecting various weapons and other items, was published. The shooter begins in the same way as Borderlands or Borderlands 2 - the Zhelezyaka robot introduces the player to the […]

The new Chrome has a mode that will "darken" any site

“Dark mode” in applications is no longer surprising. This feature is available in all current operating systems, browsers, and many mobile and desktop applications. But many websites still do not support this feature. But it seems that this is not necessary. Developers from Google have added a flag to the Canary browser version that activates the corresponding design on different […]

Information disappointment

Legitimized by forces legitimized for this (and, as will be seen, temporarily) mainstreamness and capricious, legitimized by the same hand, marginality are eternal historical cohabitants and allies, alternately intercepting the notorious free will (which, moreover, this freedom is often denied) – must base their relationships on the principle of dominance, and nothing else – after all, it contains the arch-key […]

Matrix: 20 years later

This year, science fiction fans are celebrating the 20th anniversary of the premiere of The Matrix trilogy. By the way, did you know that the film was seen in the USA in March, but it only reached us in October 1999? A lot has been written and said on the topic of Easter eggs embedded inside. I was interested in comparing what was shown in the film with what […]

Synthing v1.2.1

Syncthing is a program for synchronizing files between two or more devices. The latest version fixes the following bugs: When creating a new file, the fs event was not generated. Closing the nil channel when sending a stop signal to the client. The web interface was showing an incorrect RC build description when updates were disabled. The status value was changed while the folder was not yet running. Suspending the folder was throwing an error. […]

ClamAV free antivirus package update 0.101.3

Cisco has introduced a corrective release of the free antivirus package ClamAV 0.101.3, which eliminates a vulnerability that allows a denial of service to be initiated through the transmission of a specially designed zip archive attachment. The problem is a variant of a non-recursive zip bomb, which requires a lot of time and resources to unpack. The essence of the method is to place data in the archive, allowing to achieve the maximum degree of compression for the zip format - [...]

Found a method to detect incognito browsing in Chrome 76

In Chrome 76, a loophole in the implementation of the FileSystem API was closed, which allows you to determine the use of incognito mode from a web application. Starting with Chrome 76, instead of blocking access to the FileSystem API, which was used as a sign of Incognito mode activity, the browser no longer restricts the FileSystem API, but cleans up changes made after the session. As it turned out, the new implementation has shortcomings that allow, as before, [...]

Asynchronous programming in JavaScript (Callback, Promise, RxJs )

Hi all. Sergey Omelnitsky is in touch. Not long ago I hosted a stream on reactive programming, where I talked about asynchrony in JavaScript. Today I would like to take notes on this material. But before we start the main material, we need to make an introductory note. So let's start with definitions: what is a stack and a queue? A stack is a collection whose elements [...]

Retrospective: how IPv4 addresses were depleted

Geoff Huston, chief research engineer at internet registrar APNIC, predicted that IPv4 addresses will run out in 2020. In a new series of materials, we will update information about how addresses were depleted, who still had them, and why this happened. / Unsplash / Loïc Mermilliod Why addresses are running out Before moving on to the story of how the pool “dried up” […]

Cryptographic Attacks: An Explanation for Confused Minds

When you hear the word “cryptography,” some people remember their WiFi password, the green padlock next to the address of their favorite website, and how difficult it is to get into someone else’s email. Others recall a series of vulnerabilities in recent years with telling abbreviations (DROWN, FREAK, POODLE...), stylish logos and a warning to urgently update your browser. Cryptography covers all of this, but the point is different. The point is there is a fine line between [...]

Multi-model DBMS - the basis of modern information systems?

Modern information systems are quite complex. Not least of all, their complexity is due to the complexity of the data processed in them. The complexity of data often lies in the variety of data models used. So, for example, when data becomes “big”, one of the problematic characteristics is not only its volume (“volume”), but also its variety (“variety”). If you do not yet find a flaw in the reasoning, then […]

Lenovo returned to the Russian market by introducing smartphones A5, K9, S5 Pro and K5 Pro

Lenovo celebrated its return to the Russian market with a joint presentation with Mobilidi, a division of the international holding RDC GROUP, of a number of new smartphones, including budget models A5 and K9, as well as mid-range devices S5 Pro and K5 Pro, equipped with dual cameras. “Lenovo smartphones have already won the trust of users. We hope for the success of our brand on the Russian market [...]