Author: ProHoster

Pavel Durov believes that dictators value WhatsApp for its vulnerabilities

The creator of the social network VKontakte and the Telegram messenger Pavel Durov responded to information about a serious vulnerability in WhatsApp. He said that everything on users' smartphones, including photos, emails and texts, was accessible to attackers simply because of the use of the program. However, he noted that he was not surprised by this outcome. Last year, WhatsApp had to admit that they had […]

The user base of the Samsung Pay payment system has grown to 14 million people

The Samsung Pay service appeared in 2015 and allowed owners of gadgets from the South Korean technology giant to make contactless payments using their mobile device as a kind of virtual wallet. Since then, there has been a continuous process of developing the service and expanding the user audience. Network sources say that the Samsung Pay service is currently regularly used by 14 million users from […]

PowerShell Desired State Configuration and Files: Part 1: Configuring DSC Pull Server to Work with SQL Database

PowerShell Desired State Configuration (DSC) greatly simplifies the job of deploying and configuring the operating system, server roles, and applications when you have hundreds of servers. But when using DSC on-premises, i.e. not in MS Azure, there are a couple of nuances. They are especially noticeable if the organization is large (from 300 workstations and servers) and the world of […]

Intel plans to move production of 3D XPoint memory to China

With the end of its IMFlash Technology joint venture with Micron, Intel will face production challenges regarding memory chips. The company has technology in both 3D NAND flash memory and its proprietary 3D XPoint memory, which it believes will replace NAND due to its performance and durability advantages. The company is considering a project to move production [...]

Facebook tightens live streaming policy after New Zealand attack

Representatives of Facebook announced a tightening of policies regulating live broadcasts by users of the social network. Individuals who violate Facebook's rules will be temporarily banned from going live. The company says that it is introducing a so-called “one offense” policy, which implies the removal from live broadcasts of people who have violated certain rules. It is also reported that upon the first violation [...]

12. Check Point Getting Started R80.20. Logs & Reports

Welcome to lesson 12. Today we will talk about another very important topic, namely working with logs and reports. Sometimes this functionality turns out to be almost decisive when choosing a means of protection. Security specialists really love a convenient reporting system and functional search for various events. It's hard to blame them for this. Essentially, the logs […]

Redundancy in Kubernetes: it exists

My name is Sergey, I’m from ITSumma, and I want to tell you how we approach redundancy in Kubernetes. Recently, I have been doing a lot of consulting work on the implementation of various devops solutions for various teams, and, in particular, I have been working closely on projects using K8s. At the Uptime day 4 conference, which was dedicated to reservations in complex […]

How does your morning start?

- So how are you? - Fine. - I answer. Well, it's normal. It was fine until you got caught. You always choose a very bad moment. This is why I hate you, you bastard. - How's the article? – you asked sarcastically. - Fine. – I don’t want to go into details, to be honest. - Are you sure it’s normal? - Exactly. […]

Information hope predicates

Something new is born within the well-worn paths. The trampled and crushed cultural soil, from which, as it seems, all the air has been knocked out, is ready to do what it does best - put everything in its place like a mother. Beginning as intellectual games of loners, picked up by historical necessity, having received the monetary blessing of the world Machine, something on its knee receives the power […]

Intel Releases Clear Linux Edition for Application Developers

Intel announced the expansion of the scope of the Clear Linux distribution, previously positioned as a specialized solution for container isolation. The new Clear Linux Developer Edition allows you to use the distribution on developer systems as a user environment. The GNOME desktop is offered by default, but KDE Plasma, Xfce, LXQt, Awesome and i3 are available as options. The Clear Linux distribution provides strict […]

“Digital mess”: every fifth Russian has access to work files after dismissal

Kaspersky Lab released the results of an interesting study called “Digital Clutter,” which examined the problem of unauthorized access to corporate data. It turned out that every fifth Russian - 20% - has access to work files after dismissal. At the same time, more than half of people (60%) work with various types of confidential information, which means they retain the ability to use these […]

The Division 2 developers explain why there will be no random matchmaking in the raid

The first raid in the history of the series will be launched in The Division 2 today, but a considerable part of the audience is not very happy with its appearance. The fact is that in this entertainment for squads of eight people there is no automatic selection of players - you will have to call friends or look for comrades on the appropriate sites. On the one hand, fans of games of this genre [...]