Heading: Administration

Deployment of Zextras/Zimbra office workstations in Yandex.Cloud

Introduction Optimizing office infrastructure and deploying new jobs is a major challenge for companies of all types and sizes. The best option for a new project is to rent resources in the cloud and purchase licenses that can be used both from the provider and in your own data center. One solution for such a scenario is the Zextras Suite, which allows you to create a […]

How I made TK in Gruzovichkof or IT in Russian

Disclaimer The purpose of this article is to show what young programmers should beware of first of all, who, in pursuit of good money for this country, are ready to write applications for free, not knowing the real cost of such work. I myself got caught - I myself describe the experience. The vacancy mentioned in this article is in the public domain and familiarize yourself with its content and […]

Now you see us - 2. Life hacks for preparing for an online conference

It looks like online events - from school classes to haute couture weeks - are here to stay. It would seem that there should be no great difficulties in switching to an online format: just read your lecture not in front of a crowd of listeners, but in front of a webcam, and switch slides in time. But no :) As it turned out, for online events - even modest conferences, even intra-corporate meetups - […]

Data within us: What do bioinformaticians do?

We are talking about the people of the future who decipher the organic big date. Over the past two decades, the amount of biological data that can be analyzed has grown many times over due to the deciphering of the human genome. Before that, we could not even imagine that according to the information stored literally in our blood, it would be possible to determine our origin, to check how the body would react to certain […]

Multi-sensor wireless micro DIY sensor

DIY, as Wikipedia says, has long been a subculture. In this article I want to talk about my diy project of a small wireless multi-sensor sensor, and this will be my small contribution to this subculture. The history of this project started with the hull, it sounds stupid, but that's how this project started. The case was purchased on the Aliexpress website, it should be noted that […]

BPM style integration

Hey Habr! Our company specializes in the development of ERP-class software solutions, in which the lion's share is occupied by transactional systems with a huge amount of business logic and workflow a la EDMS. Modern versions of our products are based on JavaEE technologies, but we are also actively experimenting with microservices. One of the most problematic areas of such solutions is the integration of various subsystems related to […]

Configuring basic parameters for Huawei CloudEngine switches (for example, 6865)

We have been using Huawei equipment in the public cloud product for a long time. We recently added the CloudEngine 6865 model to operation, and when adding new devices, the idea came up to share some kind of checklist or collection of basic settings with examples. There are many similar instructions on the web for users of Cisco equipment. However, there are few such articles for Huawei and sometimes you have to look […]

Managing a VDS server under Windows: what are the options?

During early development, the Windows Admin Center toolkit was called "Project Honolulu" (Project Honolulu). As part of the VDS (Virtual Dedicated Server) service, the client receives a virtual dedicated server with maximum privileges. You can put any OS on it from your image or use the ready-made image in the control panel. Let's say the user has selected a full Windows Server or […]

Honeypot vs Deception on the example of Xello

There are already several articles on HabrΓ© about Honeypot and Deception technologies (1 article, 2 article). However, until now we are faced with a lack of understanding of the difference between these classes of protection tools. To do this, our colleagues from Xello Deception (the first Russian developer of the Deception platform) decided to describe in detail the differences, advantages and architectural features of these solutions. Let's figure out what is […]

Hole as a security tool - 2, or how to catch APT "on live bait"

(thanks to Sergey G. Brester sebres for the title idea) Colleagues, the purpose of this article is to share the experience of a year-long test operation of a new class of IDS solutions based on Deception technologies. In order to preserve the logical coherence of the presentation of the material, I consider it necessary to start with the premises. So, the problem: Targeted attacks are the most dangerous type of attacks, despite the fact that in the total number of […]

Unspeakably attractive: how we created a honeypot that cannot be exposed

Antivirus companies, information security experts, and just enthusiasts expose honeypot systems on the Internet in order to β€œcatch the live bait” of a fresh variety of a virus or reveal unusual hacker tactics. Honeypots are so common that cybercriminals have developed a kind of immunity: they quickly identify that there is a trap in front of them and simply ignore it. To explore the tactics of today's hackers, we've created a realistic honeypot that […]

Why are the letters not consecutive in EBCDIC?

The ASCII standard was adopted in 1963, and now hardly anyone uses an encoding whose first 128 characters are different from ASCII. However, until the end of the last century, EBCDIC was actively used - the standard encoding for IBM mainframes and their Soviet clones of ES computers. EBCDIC remains the default encoding in z/OS, the standard operating system for modern mainframes […]