Author: ProHoster

TCP steganography or how to hide data transmission on the Internet

Polish researchers have proposed a new method of network steganography based on the operating features of the widely used transport layer protocol TCP. The authors of the work believe that their scheme, for example, can be used to send hidden messages in totalitarian countries that impose strict Internet censorship. Let's try to figure out what the innovation actually is and how useful it really is. First of all, you need to determine [...]

Steganography in the file system

Hey Habr. I want to present you a small project on steganography, made in my spare time from study. I made a project on the hidden storage of information in the file system (hereinafter FS). This can be used to steal confidential information for educational purposes. A very old Linux FS ext2 was chosen as a prototype. Implementation Implementation Considerations If it's good to "irritate" […]

(Un)official Habr application - HabrApp 2.0: gaining access

One languid and already rather boring evening, I, leafing through the official Habr application, once again bent my fingers, one for each non-working feature. Here, for example, you cannot comment, here you are denied the right to vote, and in general, why are the formulas not visible on the screen? It was decided: we needed something comfortable, pleasant, something of our own. What about your own application for Habr? Let's, for [...]

CS Center graduates return to teach

“Remembering how kindly people interacted with me during my training, I try to create the same impression among those attending my course.” Graduates of the CS center who became teachers recall their years of study and talk about the start of their teaching journey. Applications for admission to the CS center are open until April 13. Full-time training in St. Petersburg and Novosibirsk. Absentee for residents [...]

Marvel's Iron Man VR will be a full non-linear game

Last month, Camouflaj announced that it was working on Marvel's Iron Man VR, a PlayStation VR exclusive. Its founder Ryan Payton said that this will be a full-fledged non-linear project with optional tasks and deep customization. Ryan Peyton has been in the industry for many years. He has contributed to projects such as […]

Video: Wood Elf in Warhammer: Chaosbane can summon a Groot-like tree

Publisher Bigben Interactive and studio Eko Software presented a trailer dedicated to the latest character in Warhammer: Chaosbane. In total, 4 classes will be available in the role-playing action movie: the warrior of the Empire easily endures the most terrible wounds, the dwarf specializes in close combat, the high elf attacks from a distance with magic, and the forest elf, which the new video tells about, acts as an incomparable master of bows and traps. […]

Programming Language Ranking Update: C# Loses Popularity

The official website of the TIOBE company, which specializes in software quality control, has an updated rating of programming languages ​​according to the data for the current month. The TIOB rating clearly demonstrates the popularity of modern programming languages ​​and is updated once a month. It builds on data collected around the world on the number of qualified engineers, available training courses, and third-party solutions that […]

Amazon to launch Alexa-enabled wireless headphones

Amazon is designing its own fully wireless in-ear headphones with the ability to interact with a voice assistant. This was reported by Bloomberg, citing information received from knowledgeable persons. In terms of design and construction, the new product will allegedly be similar to Apple AirPods. The creation of the device inside Amazon is carried out by specialists from the Lab126 division. It is reported that users using a voice command will be able to activate [...]

How to take control of your network infrastructure. Chapter two. Cleaning and documentation

This article is the second in a series of articles “How to take control of your network infrastructure.” The contents of all articles in the series and links can be found here. Our goal at this stage is to bring order to the documentation and configuration. At the end of this process, you should have the necessary set of documents and a network configured in accordance with them. Now we […]

How to take control of your network infrastructure. Chapter first. Retention

This article is the first in a series of articles “How to Take Control of Your Network Infrastructure.” The contents of all articles in the series and links can be found here. I fully admit that there are a sufficient number of companies where a network downtime of one hour or even one day is not critical. Unfortunately or fortunately, I did not have the opportunity to work in such places. […]

How to take control of your network infrastructure. Table of contents

Table of contents for all articles in the series “How to take control of your network infrastructure” and links. Currently, 5 articles have been published: Chapter 1. Retention Chapter 2. Cleaning and documentation Chapter 3. Network security. Part one Chapter 3. Network security. Part two Supplement. About the three components necessary for successful IT work. There will be about 10 articles in total. Chapter […]

The myth of staff shortage or the basic rules for the formation of vacancies

Quite often you can hear from employers about such a phenomenon as “staff shortage”. I believe that this is a myth; in the real world there is no shortage of personnel. Instead, there are two real problems. Objective – the relationship between the number of vacancies and the number of candidates on the labor market. And subjective – the inability of a particular employer to find, attract and hire employees. Results […]