Author: ProHoster

How ITSM can help and who applies this methodology

Let's talk about three tasks that ITSM can help solve: development management, data protection, and optimization of processes outside of IT departments. Source: Unsplash / Photo: Marvin Meyer Software Development Management Many companies use flexible methodologies like scrum. Even engineers from Axelos who develop the ITIL methodology use them. Four-week sprints help the team track progress and […]

Cisco Training 200-125 CCNA v3.0. Day 20 Static Routing

Today we'll talk about static routing and look at three topics: what static routing is, how it's configured, and what its alternative is. You see the network topology, which includes a computer with an IP address of 192.168.1.10, connected via a switch to a gateway, or router. For this connection, the router port f0/0 with the IP address 192.168.1.1 is used. The second port of this router […]

Raspberry Pi + CentOS = Wi-Fi Hotspot (or Raspberry Red Hat Router)

There is a huge amount of information on the Internet on creating Wi-Fi access points based on a Raspberry single-board PC. As a rule, this means using the Raspbian operating system native to the Raspberry. Being an adherent of RPM-based systems, I could not pass by this little miracle and not try my beloved CentOS on it. The article provides instructions for making a 5GHz/AC Wi-Fi router […]

DevOps Deflope open mic, stories about Skyeng and Nvidia infrastructure and more

Hello, next Tuesday warm lamp gatherings are planned at Taganka: Artem Naumenko will be there with a story about infrastructure as a product, Vitaly Dobrovolsky with a report on balancing the Kafka cluster and the hosts of a specialized podcast with a still secret topic for discussion. We are also expecting a special guest from the northern capital - Vitaly Levchenko, organizer of the St. Petersburg SRE party. UPD. Locations in […]

Full-time remote work: where to start if you are not a senior

Today, many IT companies are faced with the problem of finding employees in their region. More and more offers on the labor market are related to the possibility of working outside the office - remotely. Working in full-time remote mode assumes that the employer and employee are bound by clear labor obligations: a contract or employment agreement; most often, a certain standardized work schedule, a stable salary, vacations and [...]

How I put things in order in a project where there is a forest of direct hands (tslint settings, prettier, etc)

Hello again. Sergey Omelnitsky is in touch. Today I will share with you one of my headaches, namely, what to do when a project is written by many multi-level programmers using the example of an Angular application. It so happened that for a long time I worked only with my team, where we had long agreed on the rules of formatting, commenting, indentations, etc. Got used to it [...]

2019 presentation design trends that will continue in 2020

Your “sales” presentation will be one of the 4 advertising messages that a person sees every day. How to distinguish it from the crowd? A large number of marketers use flashy—or vulgar—messaging tactics. Doesn't work for everyone. Would you give your money to banks that advertise with heists, or to a pension fund that uses the image of its founder with a […]

How the world's largest video surveillance systems work

In previous posts we talked about simple video surveillance systems in business, but now we will talk about projects in which the number of cameras is in the thousands. Often the difference between the most expensive video surveillance systems and the solutions that small and medium-sized businesses can already use is scale and budget. If there are no restrictions on the cost of the project, you can directly [...]

End of i686 repositories on Fedora 31 approved

The FESCo (Fedora Engineering Steering Committee), responsible for the technical part of the development of the Fedora distribution, approved the cessation of the formation of the main repositories for the i686 architecture. Let us recall that initially consideration of this proposal was postponed to study the possible negative impact of the cessation of supply of packages for i686 on local module assemblies. The solution complements the solution already implemented in the rawhide branch to stop the formation of the boot […]

MemeTastic 1.6 is a mobile application for creating memes based on templates

MemeTastic is a simple meme generator for Android. Completely free of advertising and 'watermarks'. Memes can be created from template images placed in the /sdcard/Pictures/MemeTastic folder, images shared by other applications and images from the gallery, or take a photo with your camera and use this photo as a template. The application does not require network access to operate. Convenience […]

Backdoor Found in Webmin Allowing Remote Root Access

The Webmin package, which provides tools for remote server management, has a backdoor (CVE-2019-15107), found in the official project builds distributed through Sourceforge and recommended on the main website. The backdoor was present in builds from 1.882 to 1.921 inclusive (there was no code with the backdoor in the git repository) and allowed arbitrary shell commands to be executed remotely without authentication on a system with root rights. For […]

VLC 3.0.8 media player update with security fixes

A corrective release of the VLC 3.0.8 media player has been presented, which eliminates accumulated errors and eliminates 13 vulnerabilities, including three problems (CVE-2019-14970, CVE-2019-14777, CVE-2019-14533) that can lead to the execution of an attacker’s code when trying to playback of specially designed multimedia files in MKV and ASF formats (write buffer overflow and two problems with accessing memory after it is freed). Four […]