Author: ProHoster

Linux Mint 20 distribution release

The release of the Linux Mint 20 distribution is presented, which switched to the Ubuntu 20.04 LTS package base. The distribution is fully compatible with Ubuntu, but differs significantly in the approach to organizing the user interface and the selection of applications used by default. The developers of Linux Mint provide a desktop environment that follows the classic canons of desktop organization, which is more familiar to users who do not accept new methods of building an interface […]

Big release of LanguageTool 5.0!

LanguageTool is a free system for checking grammar, style, spelling and punctuation. LanguageTool can be used as a desktop application, a command line application, or as a LibreOffice/Apache OpenOffice extension. Requires Java 8+ from Oracle or Amazon Corretto 8+. As part of a separate project, extensions for Mozilla Firefox, Google Chrome, Opera, and Edge browsers were created. And a separate extension […]

How to pick up 13 girls an hour using machine learning and Tinder

*Exclusively for the sake of studying Machine Learning, of course. Under the slightly displeased gaze of his beloved wife. There is probably no application as simple to the level of spinal reflexes as Tinder. In order to use it, one finger is enough to swipe and some neurons to choose the girls or men that you like best. The ideal implementation of brute force in choosing a pair. I decided it was […]

RATKing: New Remote Access Trojan Campaign

At the end of May, we discovered a campaign of malware distribution of the Remote Access Trojan (RAT) class, programs that allow attackers to remotely control an infected system. The group we are considering was distinguished by the fact that it did not choose any specific RAT family for infection. Several Trojans were spotted in the attacks within the campaign (all in the public domain). With this feature, the group reminded us of the rat king, a mythical animal that […]

High performance TSDB benchmark VictoriaMetrics vs TimescaleDB vs InfluxDB

VictoriaMetrics, TimescaleDB and InfluxDB were compared in a previous article on a dataset with a billion data points belonging to 40K unique time series. A few years ago was the era of Zabbix. Each bare metal server had no more than a few metrics - CPU usage, RAM usage, disk usage, and network usage. Thus, metrics from thousands of servers can fit […]

Release of the LKRG 0.8 module to protect against exploitation of vulnerabilities in the Linux kernel

The Openwall project has published the release of the kernel module LKRG 0.8 (Linux Kernel Runtime Guard), designed to detect and block attacks and violations of the integrity of kernel structures. For example, the module can protect against unauthorized changes to the running kernel and attempts to change the permissions of user processes (detecting the use of exploits). The module is suitable for organizing protection against already known exploits for the kernel [...]

Chrome introduces new PDF viewer interface and adds support for AVIF

Chrome includes a new implementation of the built-in PDF document viewer interface. The interface is notable for placing all settings in the top panel. If previously only the file name, page information, rotation, print and save buttons were displayed in the top panel, now the contents of the side panel, which included zoom controls and document placement […]

Release of a minimalistic set of system utilities BusyBox 1.32

The release of the BusyBox 1.32 package is presented with the implementation of a set of standard UNIX utilities, designed as a single executable file and optimized for minimal consumption of system resources with a package size of less than 1 MB. The first release of the new branch 1.32 is positioned as unstable, full stabilization will be provided in version 1.32.1, which is expected in about a month. The project code is distributed under the license [...]

When it's not just a vulnerability in Kubernetes...

Note. transl.: the authors of this article talk in detail about how they managed to detect the CVE-2020-8555 vulnerability in Kubernetes. Although initially it did not look very dangerous, in combination with other factors, its criticality turned out to be maximum for some cloud providers. Several organizations generously rewarded specialists for their work. Who we are We are two French […]

Setting up IPFIX export on VMware vSphere Distributed Switch (VDS) and subsequent traffic monitoring in Solarwinds

Hey Habr! In early July, Solarwinds announced the release of a new version of the Orion Solarwinds platform - 2020.2. One of the innovations in the Network Traffic Analyzer (NTA) module is support for recognition of IPFIX traffic from VMware VDS. Analyzing traffic in a virtual switch environment is important to understand the distribution of load on a virtual infrastructure. By analyzing traffic, you can also detect virtual machine migrations. In this […]

Qcon conference. Mastering Chaos: A Netflix Guide to Microservices. Part 4

Josh Evans talks about the chaotic and colorful world of Netflix microservices, starting from the very basics - the anatomy of microservices, the problems associated with distributed systems, and their benefits. Building on this foundation, he explores the cultural, architectural, and operational practices that lead to mastery of microservices. Qcon conference. Mastering Chaos: A Netflix Guide to Microservices. Part 1 QCon. Mastering Chaos: […]

US launches probe into Tesla Model S touchscreen failures

Touch control is inseparable from gadgets, and what is a Tesla electric car if not a gadget? I'd like to believe this, but for a number of applications, buttons, levers and switches seem to be a more reliable solution than icons on a touch screen. Icons turned out to be a slippery slope as an element of the control system of the Tesla Model S. On this slope, Tesla could face trouble in […]