Author: ProHoster

Identification of users by browsing history in the browser

Mozilla employees have published the results of a study on the possibility of identifying users based on a profile of visits in the browser, which can be visible to third parties and websites. An analysis of 52 thousand browsing profiles provided by Firefox users who took part in the experiment showed that preferences in visiting sites are characteristic of each user and are constant. The uniqueness of the obtained browsing history profiles was 99%. At […]

CudaText editor release 1.110.3

CudaText is a free, cross-platform code editor written in Lazarus. The editor supports Python extensions, and has several features borrowed from Sublime Text. On the project's Wiki page https://wiki.freepascal.org/CudaText#Advantages_over_Sublime_Text_3 the author lists the advantages over Sublime Text. The editor is suitable for advanced users and programmers (more than 200 syntactic lexers are available). Some IDE features are available as plugins. The project repositories are located at […]

ZombieTrackerGPS v1.02

ZombieTrackerGPS (ZTGPS) is a program for managing collections of GPS tracks from cycling, hiking, rafting, airplane and glider flights, car trips, snowboarding and other sports activities. It stores data locally (no tracking or data monetization like other popular trackers), has advanced sorting and search capabilities that allow you to view and manage data, and convenient […]

4. Check Point SandBlast Agent Management Platform. Data protection policy. Deployment and Global Policy Settings

Welcome to the fourth article in the Check Point SandBlast Agent Management Platform solution series. In previous articles (first, second, third), we described in detail the interface and capabilities of the web-based management console, and also reviewed the Threat Prevention policy and tested it against various threats. This article focuses on the second security component, the Data Protection policy, which is responsible for […]

5. Check Point SandBlast Agent Management Platform. Logs, Reports & Forensics. Threat Hunting

Welcome to the fifth article in the Check Point SandBlast Agent Management Platform solution series. Previous articles can be found by clicking on the appropriate link: first, second, third, fourth. Today we will look at the monitoring capabilities in the Management Platform, namely working with logs, interactive dashboards (View) and reports. We will also touch on Threat Hunting to identify current threats and […]

FOSS News #31 - Free and Open Source News Digest August 24-30, 2020

Hi all! We continue to digest news and other materials about free and open source software and a bit about hardware. All the most important things about penguins and not only in Russia and the world. 29th anniversary of Linux, a couple of articles about the topic of the decentralized Web, which is so relevant today, a discussion of the degree of modernity of communication tools for Linux kernel developers, an excursion into the history of Unix, Intel engineers […]

Broadcom becomes largest chipmaker despite shrinking revenue

The impact of the pandemic on various sectors of the economy is difficult to call unambiguous, since even within the same sector, multidirectional trends can be observed. Qualcomm suffered from a delay in the announcement of new iPhones in the second quarter, and therefore Broadcom took first place in terms of revenue, even taking into account its decline. Statistics for the second quarter were summarized by the research agency TrendForce. Former leader […]

Russian blogger said that Valve used his pictures when creating Half-Life: Alyx

Russian urban blogger Ilya Varlamov said on VKontakte that Valve used his photographs when developing Half-Life: Alyx. Whether Varlamov plans to file claims against the studio for copyright infringement is not specified. Varlamov noticed one of his pictures of Murmansk in the application The Final Hours of Half-Life: Alyx, in which Geoff Keighley talked about […]

Video: big map, dinosaurs and guns in the trailer of the cooperative shooter Second Extinction about the extermination of reptiles

At gamescom 2020, Systemic Reaction studio presented a new trailer for the cooperative shooter Second Extinction, in which players will have to return the Earth to people from the clutches of mutant dinosaurs. In a team of three, users will have to exterminate hordes of mutant dinosaurs that have overrun the Earth. Humanity fled into space, but the main character and two other people will return to the surface of the planet to reconquer […]

The Iceweasle Mobile project has begun development of a fork of the new Firefox for Android

Mozilla developers have successfully completed the migration of Firefox 68 users for the Android platform to a new browser developed as part of the Fenix ​​project, which was recently offered to all users as the “Firefox 79.0.5” update. The minimum platform requirements have been raised to Android 5. Fenix ​​uses the GeckoView engine, built on Firefox Quantum technologies, and a set of Mozilla Android Components libraries, which […]

Development and production management in Asana

Hello everyone, my name is Konstantin Kuznetsov, I am the CEO and founder of RocketSales. In the IT field, a story is quite common when the development department lives in its own universe. This universe has humidifiers on every desktop, a bunch of gadgets and cleaners for monitors and keyboards, and, most likely, its own task and project management system. What […]

Creation of an automatic system to combat intruders on the site (fraud)

For the last about six months, I have been creating a system for combating fraud (fraudulent activity, fraud, etc.) without any initial infrastructure for this. Today's ideas that we found and implemented in our system help us detect and analyze many fraudulent activities. In this article, I would like to talk about the principles that we followed, and that […]