Author: ProHoster

Kazakhstan obliges to install state certificate for MITM

In Kazakhstan, telecom operators sent messages to users about the need to install a security certificate issued by government agencies. Without installation, the Internet will not work. It should be remembered that the certificate not only affects the fact that government agencies will be able to read encrypted traffic, but also the fact that on behalf of any user it will be possible to write anything. Mozilla has already launched […]

In Kazakhstan, a number of large providers have implemented the interception of HTTPS traffic

In accordance with the amendments to the law “On Communications” that have been in force in Kazakhstan since 2016, many Kazakh providers, including Kcell, Beeline, Tele2 and Altel, have launched systems for intercepting client HTTPS traffic with the replacement of the originally used certificate. Initially, the interception system was planned to be implemented in 2016, but this operation was constantly postponed and the law […]

Release of the Snort 2.9.14.0 intrusion detection system

Cisco has published the release of Snort 2.9.14.0, a free attack detection and prevention system that combines signature matching techniques, protocol inspection tools, and anomaly detection mechanisms. Main innovations: Added support for port number masks in the host cache and the ability to override the binding of application identifiers to network ports; New client software templates have been added to display the […]

P4 programming language

P4 is a programming language designed to program packet routing rules. Unlike a general-purpose language such as C or Python, P4 is a domain-specific language with a number of designs optimized for network routing. P4 is an open source language licensed and maintained by a non-profit organization called the P4 Language Consortium. It is also supported […]

Digital Shadows - competently helps to reduce digital risks

Perhaps you know what OSINT is and have used the Shodan search engine, or are already using the Threat Intelligence Platform to prioritize IOCs from different feeds. But sometimes it is necessary to constantly look at your company from the outside and get help in eliminating identified incidents. Digital Shadows allows you to track a company's digital assets and its analysts suggest specific actions. In fact […]

The basics of transparent proxying using 3proxy and iptables / netfilter or how to "put everything through a proxy"

In this article I would like to reveal the possibilities of transparent proxying, which allows you to redirect all or part of the traffic through external proxy servers absolutely unnoticed by clients. When I started solving this problem, I was faced with the fact that its implementation had one significant problem - the HTTPS protocol. In the good old days, there were no particular problems with transparent HTTP proxying, […]

Long live the king: the cruel world of hierarchy in a pack of stray dogs

In large groups of people there is always a leader, consciously or not. The distribution of power from the highest to the lowest level of the hierarchical pyramid has a number of advantages for the group as a whole and for individual individuals. After all, order is always better than chaos, right? For thousands of years, mankind in all civilizations has been implementing a hierarchical pyramid of power by […]

CryptoARM based on PKCS#12 container. Creation of electronic signature CadES-X Long Type 1.

An updated version of the free cryptoarmpkcs utility has been released, designed to work with x509 v.3 certificates stored both on PKCS#11 tokens, with support for Russian cryptography, and in secure PKCS#12 containers. As a rule, a personal certificate and its private key are stored in a PKCS#12 container. The utility is absolutely self-sufficient and works on Linux, Windows, OS X platforms. A distinctive feature of the […]

In the UK, they want to equip all houses under construction with electric car charging points

The UK government has proposed in a public debate on building codes that all new homes should be equipped with electric vehicle charging points in the future. This measure, along with a number of others, is believed by the government to increase the popularity of electric transport in the country. The government plans to end sales of new petrol and diesel vehicles in the UK by 2040, although there is talk of […]

PC becomes Ubisoft's most profitable platform, surpassing PS4

Ubisoft recently released its financial report for the first quarter of the 2019/20 financial year. According to these data, the PC has surpassed the PlayStation 4 as the most profitable platform for the French publisher. For the quarter ended June 2019, PC accounted for 34% of Ubisoft's "net orders" (the unit of sale of a product or service). This figure was 24% a year earlier. For comparison: […]

Roskomnadzor punished Google for 700 thousand rubles

As expected, the Federal Service for Supervision of Communications, Information Technology and Mass Communications (Roskomnadzor) imposed a fine on Google for non-compliance with Russian law. Let us recall the essence of the matter. In accordance with the laws in force in our country, search engine operators are required to exclude from the results of the issuance of links to Internet pages with prohibited information. To do this, search engines need to connect […]