Author: ProHoster

Everything you ever wanted to know about secure password reset. Part 2

Two-Factor Authentication Everything you read in the first part was about identifying based on what the requester knows. He knows his email address, knows how to access it (i.e. knows his email password), and knows the answers to security questions. "Knowledge" is considered one authentication factor; two other common factors are that you […]

Private PSK (Pre-Shared Key) - features and capabilities of the ExtremeCloud IQ platform

WPA3 has already been adopted, and since July 2020 it is mandatory for devices that are certified by the WiFi-Alliance, WPA2 has not been canceled and is not going to. At the same time, both WPA2 and WPA3 provide for operation in PSK and Enterprise modes, but we propose to consider Private PSK technology in our article, as well as the benefits that can be achieved with its help. Problems […]

5G in Russian telemedicine

Fifth generation networks (5G) have great potential for application in various industries. One of the promising areas is the field of medicine. In the future, patients from remote regions will most likely no longer have to go to the hospital in large regional centers - consultations or operations can be carried out remotely. First 5G operations in Russia Our country does not […]

How we implemented SonarQube and realized its great potential

We would like to share our experience of implementing a platform for continuous analysis and measurement of the quality of the SonarQube code into the existing processes for developing the DPO system (an addition to the Alameda depositary and clearing accounting system) of the National Settlement Depository. The National Settlement Depository (Moscow Exchange Group of Companies) is one of the key financial infrastructure companies that stores and records securities of Russian and foreign issuers worth more than […]

Adding CMDB and Geographic Map to Zabbix

Habr, of course, is not a very suitable platform for romance, but we cannot but confess our love for Zabbix. In many of our monitoring projects, we have used Zabbix and really appreciate the harmony and consistency of this system. Yes, there is no fancy event clustering and machine learning (and some other features available out of the box in commercial systems), […]

How we, Sber employees, count and invest our money

Is it necessary to buy a car for 750 thousand rubles, despite the fact that you drive 18 times a month, or is it cheaper to use a taxi? If you work in the back seat or listen to music - how does this change the assessment? What is the best way to buy an apartment - at what point is it optimal to finish saving on a deposit and make a down payment on a mortgage? Or […]

Cisco ISE: Configuring Guest Access on FortiAP. Part 3

Welcome to the third post in the Cisco ISE series. Links to all articles in the series are given below: Cisco ISE: Introduction, requirements, installation. Part 1 Cisco ISE: Creating users, adding LDAP servers, integrating with AD. Cisco ISE Part 2: Configuring Guest Access on FortiAP. Part 3 In this publication, you will dive into guest access, and […]

Umbrella monitoring system and resource-service models in the updated DX Operations Intelligence from Broadcom (ex. CA)

This September, Broadcom (formerly CA) released the new version 20.2 of its DX Operations Intelligence (DX OI) solution. On the market, this product is positioned as an umbrella monitoring system. The system is able to receive and combine data from monitoring systems of various domains (network, infrastructure, applications, databases), both CA and third-party manufacturers, including open source solutions (Zabbix, […]

FOSS News #38 - Digest of news and other materials about free and open source software for October 12-18, 2020

Hi all! We continue to digest news and other materials about free and open source software and a bit about hardware. All the most important things about penguins and not only in Russia and the world. Why Congress Should Invest in Open Source; Open Source makes a defining contribution to the development of everything related to software; Understanding Open Source is a development model, a business model […]

Linux security systems

One of the reasons for the tremendous success of Linux OS on embedded, mobile devices and servers is the relatively high degree of security of the kernel, related services and applications. But if you look closely at the architecture of the Linux kernel, you can not find in it a square responsible for security, as such. Where is the Linux security subsystem hiding and what does it consist of? Background […]

“Unsolicited recommendations”: why learn to search for music without the help of streaming services

After reviewing alternatives for the background, we told you where to look and how to pick up new tracks. Today we will see what streaming platforms are criticized for (besides the low quality of recommendations), and why it is useful to “dilute” their “advice” with an independent and conscious search for music. Photo: John Hult. Source: Unsplash.com Something went wrong Not everyone is able to "teach" the system so that it gives out new tracks that […]

What to listen to when writing code - playlists with rock music, ambient and soundtracks from games

It seems that there will only be more “remote” this year, so it’s worth stocking up on music that helps you relax and enter a state of flow right now. Before the start of the working week, we discuss the recommendations of freelancers and employees of large IT companies. Digest to read: radio game streaming, old PC sounds and a compact history of ringtones. Photo by Martin W. Kirst/Unsplash By […]