Author: ProHoster

Samsung Reminds You to Regularly Scan Smart TVs for Malware

South Korean company Samsung reminds smart TV owners to regularly scan their firmware for malware. A corresponding publication appeared on the Samsung support page on Twitter, which states that you can prevent malware attacks on your TV by scanning every few weeks. Against the backdrop of this message, a completely natural […]

DragonFly BSD 5.6 operating system release

The release of DragonFlyBSD 5.6 is available, an operating system with a hybrid kernel created in 2003 for the purpose of alternative development of the FreeBSD 4.x branch. Among the features of DragonFly BSD, we can highlight the distributed versioned file system HAMMER, support for loading “virtual” system kernels as user processes, the ability to cache data and FS metadata on SSD drives, context-sensitive variant symbolic links, the ability to freeze processes […]

Vulnerabilities in Linux and FreeBSD TCP stacks leading to remote denial of service

Netflix has identified several critical vulnerabilities in the TCP stacks of Linux and FreeBSD that can remotely trigger a kernel crash or cause excessive resource consumption when processing specially crafted TCP packets (packet-of-death). The problems are caused by errors in the handlers for the maximum size of a data block in a TCP packet (MSS, Maximum segment size) and the mechanism for selective acknowledgment of connections (SACK, TCP Selective Acknowledgment). CVE-2019-11477 (SACK Panic) […]

CERN abandons Microsoft products

The European Nuclear Research Center is going to abandon all proprietary products in its work, and primarily from Microsoft products. In previous years, CERN actively used various closed-source commercial products because it made it easy to find industry experts. CERN collaborates with a huge number of companies and institutes, and it was important for him to make […]

TCP SACK Panic - Remote Denial of Service Kernel Vulnerabilities

Netflix employees found three vulnerabilities in the TCP network stack code. The most serious of the vulnerabilities allows a remote attacker to cause a kernel panic. Several CVE IDs have been assigned to these issues: CVE-2019-11477 is identified as a significant vulnerability, and CVE-2019-11478 and CVE-2019-11479 are identified as moderate. The first two vulnerabilities relate to SACK (Selective Acknowledgment) and MSS (Maximum […]

Firefox 69 will disable Flash by default

Mozilla developers have disabled the ability to play Flash content by default in nightly builds of Firefox. Starting with Firefox 69, scheduled for September 3, the option for permanently activating Flash will be removed from the settings of the Adobe Flash Player plugin and only the options will be left to disable Flash and individually enable it for specific sites (activation by explicit click) without remembering the selected mode. In Firefox ESR branches […]

AERODISK Engine: Disaster recovery. Part 1

Hello, Habr readers! The topic of this article will be the implementation of disaster recovery in AERODISK Engine storage systems. Initially, we wanted to write in one article about both tools: replication and metrocluster, but, unfortunately, the article turned out to be too large, so we split the article into two parts. Let's go from simple to complex. In this article, we will set up and test a synchronous […]

Why do we make Enterprise Service Mesh

Service Mesh is a well-known architectural pattern for integrating microservices and migrating to cloud infrastructure. Today in the cloud-container world it is quite difficult to do without it. Several open-source service mesh implementations are already available on the market, but their functionality, reliability and security are not always sufficient, especially when it comes to the requirements of large financial companies across the country. That's why […]

An Interactive Roadmap for Web Development Learners

The programming school codery.camp continues to develop in the village. We recently completed a complete redesign of the web development course, which is now available online. To arrange theoretical materials, we used an unusual solution - they are all combined into an interactive graph, which is convenient to use as a Roadmap for students of web development. The materials are interconnected and, in addition to the theory itself, contain exercises on […]

Digital events in Moscow from 17 to 23 June

A selection of events for the week Augmented intelligence and everyday life of the future. Lecture June 17 (Monday) Bersenevskaya embankment 14str.5A free Architects, developers, scientists, and even food designers from all over the world participate in Space10 projects. Creative director of the design studio Bas van de Poel will talk in more detail about the laboratory’s working methods and explain what the world will be like when all infrastructure becomes digital, what […]

SimbirSoft invites IT specialists to the Summer Intensive 2019

IT company SimbirSoft is once again organizing a two-week educational program for specialists and students in the field of information technology. Classes will be held in Ulyanovsk, Dimitrovgrad and Kazan. Participants will be able to get acquainted with the process of developing and testing a software product in practice, work in a team as a programmer, tester, analyst and project manager. The intensive conditions are as close as possible to the real tasks of an IT company. […]

Video: turn-based tactics I am Not a Monster: First Contact will receive a story campaign

Publisher Alawar Premium and studio Cheerdealers, who presented turn-based multiplayer tactics I am Not a Monster last September, have announced the release of a single-player campaign for their project. The release date is set for the second half of 2019, and so far only PC (Steam) is available among the platforms. A corresponding trailer is presented for this occasion. Let us remind you: the action of the strategy I am […]