Author: ProHoster

The authors of Layers of Fear are working on a secret project along with Blair Witch

Eurogamer interviewed developer Maciej Głomb and screenwriter Basia Kciuk from Bloober Team. Representatives of the Polish studio talked mostly about the creation of Blair Witch, announced at E3 2019, but they also let slip about a new secret project. The authors reported the following: “After the production of Observer, the team split into three internal teams. One started […]

Google in Russia faces a fine of up to 700 thousand rubles

It is possible that a large fine will be imposed on Google in our country for failure to comply with the law. This, as reported by TASS, was stated by Alexander Zharov, head of the Federal Service for Supervision of Communications, Information Technologies and Mass Communications (Roskomnadzor). We are talking about compliance with requirements regarding filtering of prohibited content. In accordance with current legislation, search engine operators are obliged […]

Roskosmos raised prices for the delivery of NASA astronauts to the ISS

Roscosmos has increased the cost of delivering National Aeronautics and Space Administration (NASA) astronauts to the International Space Station (ISS) on Soyuz spacecraft, RIA Novosti reports, citing a report from the US Accounts Office on NASA's commercial manned flight program. The document states that in 2015, under a contract with Roscosmos, the American space agency paid about $82 […]

Ivan Shkodkin

My name is Ivan Shkodkin. I work and live as a programmer and now I have a pause. And as expected, during such pauses different thoughts come to mind. For example: knowing what programming language you write in, I can say: where you came from, how long you walked, how much your language infuriated and pleased you, where […]

Vulnerability in AMD SEV allowing encryption keys to be determined

Developers from the Google Cloud team have identified a vulnerability (CVE-2019-9836) in the implementation of AMD SEV (Secure Encrypted Virtualization) technology, which allows data protected using this technology to be compromised. AMD SEV at the hardware level provides transparent encryption of virtual machine memory, in which only the current guest system has access to the decrypted data, and the remaining virtual machines and the hypervisor when trying to access […]

Developers from Google offered to develop their own libc for LLVM

One of the developers from Google raised the topic of developing a multi-platform standard C library (Libc) as part of the LLVM project on the LLVM mailing list. For a number of reasons, Google is not satisfied with the current libc (glibc, musl) and the company is on the way to developing a new implementation, which is proposed to be developed as part of LLVM. LLVM developments have recently been used as a basis for building […]

Release of Chrome OS 75

Google has unveiled the release of the Chrome OS 75 operating system, based on the Linux kernel, the upstart system manager, the ebuild/portage assembly tools, open components and the Chrome 75 web browser. The Chrome OS user environment is limited to a web browser, and instead of standard programs, web browsers are used. apps, however, Chrome OS includes a full multi-window interface, desktop, and taskbar. Building Chrome […]

CD Projekt RED Reveals Several Cyberpunk 2077 Characters

Over the past few days, on the official Cyberpunk 2077 Twitter account, developers from CD Projekt RED have been publishing images of the characters, accompanied by a brief description. From this information you can find out who the main character will interact with. Some personalities were shown in the trailer from E3 2019. Dex is the employer and has information about the most important operations in Night City. […]

What do data protection experts rely on? Report from the International Cybersecurity Congress

On June 20-21, the International Cybersecurity Congress was held in Moscow. Based on the results of the event, visitors could draw the following conclusions: digital illiteracy is spreading both among users and among cybercriminals themselves; the former continue to fall for phishing, open dangerous links, and bring malware into corporate networks from personal smartphones; Among the latter, there are more and more newcomers who are chasing easy money without [...]

Categories instead of directories, or the Semantic File System for Linux

Data classification itself is an interesting topic for research. I love to collect information that seems necessary, and I always tried to make logical directory hierarchies for my files, and one day in a dream I saw a beautiful and convenient program for assigning tags to files, and decided that I couldn’t live like this anymore. The problem of hierarchical file systems Users often face the […]

History of the Internet: ARPANET - Birth

Other articles in the cycle: History of the relay The method of "rapid transmission of information", or the birth of the relay Long-ranger Galvanism Entrepreneurs And finally, the relay The talking telegraph Simply connect The forgotten generation of relay computers The electronic era The history of electronic computers Prologue ENIAC Colossus The electronic revolution The history of the transistor darkness From the crucible of war Repeated reinvention The history of the Internet The backbone […]

The History of the Internet: Expanding Interactivity

Other articles in the cycle: History of the relay The method of "rapid transmission of information", or the birth of the relay Long-ranger Galvanism Entrepreneurs And finally, the relay The talking telegraph Simply connect The forgotten generation of relay computers The electronic era The history of electronic computers Prologue ENIAC Colossus The electronic revolution The history of the transistor darkness From the crucible of war Repeated reinvention The history of the Internet The backbone […]