Author: ProHoster

Mortal Kombat 11 withdrawn from sale in Ukraine

Last week, Ukrainian users noticed strange things when going to the Mortal Kombat 11 page on Steam and PlayStation Store. In the first case, an error appeared, and in the second, a message saying “the product is not available in your region.” Then everything was written off as a bug, but it turned out that the publishing house WB Games actually removed the fighting game from sale in Ukraine. […]

The State Duma adopted a law on isolating the Runet

Today, April 16, 2019, the State Duma adopted a law on “ensuring the safe and sustainable functioning” of the Internet in Russia. The media have already dubbed it the “Runet isolation” law. It was adopted in the third and final reading; the next stage will be the transfer of the document to the Federation Council, and then to the president for signature. If these stages are passed, the law […]

Random numbers and decentralized networks: practical application

Introduction "Random number generation is too important to be left to chance" Robert Cavue, 1970 This article focuses on the practical application of solutions using collective random number generation in an untrusted environment. In short, how and why random is used in blockchains, and a little about how to distinguish “good” random from “bad”. Generating a truly random number is […]

Seminar "Hybrid clouds - pros and cons: what to prepare for business and IT" - April 25, Moscow

Good afternoon Linxdatacenter and Lenovo invite you to a joint seminar on migration and support of IT infrastructure in a hybrid cloud. Date: April 25. Venue: Linxdatacenter data center, Moscow, st. 8 March, no. 14. What will be discussed: Advantages of hybrid infrastructure: scaling, performance, big data analytics. Difficulties and “thin spots”: migration, customization, configuration and support of systems. Hardware […]

The next level of MFP security: imageRUNNER ADVANCE III

With the increase in built-in functions, office MFPs have long gone beyond trivial scanning/printing. Now they have turned into full-fledged independent devices, integrated into high-tech local and global networks, connecting users and organizations not only within one office, but throughout the world. In this article, together with practical information security expert Luka Safonov, LukaSafonov, we will consider […]

IT Adepts Initiation: Show Your Strength at the RIF

Before the Sun has time to drop below the horizon twice, all the IT Jedi, Padawans and Younglings will flock to the Forest Dali star system to confirm their IT status. Rostelecom, RT Labs and Habr will be testing the adherents of the Force. The point of initiation will be the Russian Internet Forum (RIF), where information technology warriors will gather for advice on a variety of issues of galactic importance - small and medium […]

When someone's productivity is interesting

Surely each of us has ever thought about what this dream team is like? Ocean's crew of cool friends? Or the French national football team? Or maybe a development team from Google? In any case, we would like to be in such a team or even create one. Well, against the backdrop of all this, I want to share with [...]

Debian 10 "Buster" installer release candidate

The first release candidate installer for the next major release of Debian 10 "Buster" is now available. Currently, there are 146 critical errors blocking the release (a month ago there were 316, two months ago - 577, at the time of freezing in Debian 9 - 275, in Debian 8 - 350, Debian 7 - 650). The final release of Debian 10 is expected in the summer. Compared […]

Threat Hunting, or How to protect yourself from 5% of threats

95% of information security threats are known, and you can protect yourself from them using traditional means such as antiviruses, firewalls, IDS, WAF. The remaining 5% of threats are unknown and the most dangerous. They constitute 70% of the risk for a company due to the fact that it is very difficult to detect them, much less protect against them. Examples of “black swans” are the WannaCry ransomware epidemics, […]

Changing program settings while saving personal settings

Background One medical organization implemented solutions based on Orthanc PACS servers and Radiant DICOM client. During the setup, we found out that each DICOM client must be described in PACS servers as follows: Client name AE name (must be unique) TCP port, which automatically opens on the client side and receives DICOM examinations from the PACS server ( i.e. the server seems to push them towards the client […]

Disney's AI creates cartoons based on text descriptions

Neural networks that create original videos from a text description already exist. And although they are not yet able to completely replace filmmakers or animators, there are already advances in this direction. Disney Research and Rutgers have developed a neural network that can create a rough storyboard and video from a text script. As noted, the system works with natural language, which will allow […]

Video: Overwatch's new story operation will take place in Cuba

Blizzard is hosting a new seasonal event within the Overwatch archives where the developers reveal some of the storyline events from the world of the competitive shooter. A new co-op mission, The Storm is Coming, will begin on April 16 and send players to Cuba. You have to break through enemy barriers on the streets of Havana, playing as Tracer, Winston, Genji or Angel. The goal is to capture a high-ranking member of a criminal […]