Heading: Administration

Python is an assistant in finding cheap flights for those who love to travel

The author of the article, the translation of which we are publishing today, says that her goal is to talk about the development of a Python web scraper using Selenium that searches for airfare prices. When searching for tickets, flexible dates are used (+- 3 days from the indicated dates). The scraper saves search results in an Excel file and sends an email to whoever launched it with […]

Docker: Not Bad Advice

In the comments to my article Docker: bad advice, there were many requests to explain why the Dockerfile described in it was so terrible. Summary of the previous episode: two developers compose a Dockerfile under a tight deadline. In the process, Ops Igor Ivanovich comes to them. The resulting Dockerfile is so bad that the AI ​​is on the verge of a heart attack. Now let’s figure out what’s wrong with this [...]

"Pill from the demon" in motion

To some, the test described in this article may seem trivial. But it would still need to be done to be absolutely sure that the solution would work. Now we can safely say that we are not afraid of short-term interference in the L1 range. The first article will introduce you to the course. Briefly: not so long ago it became available, including to the general public, […]

Bitmap indexes in Go: searching at wild speed

Foreword I delivered this report in English at the GopherCon Russia 2019 conference in Moscow and in Russian at the meetup in Nizhny Novgorod. It is about a bitmap index - less common than a B-tree, but no less interesting. I share a recording of a speech at a conference in English and a text transcript in Russian. We'll consider, […]

REG.RU vs. Beget: debriefing

A fascinating story began a little less than a year ago when REG.RU unilaterally terminated the partnership agreement with Beget. I became interested in how things are going with this issue, and I decided to ask the direct participants in the course of the proceedings, since the statements of each of the parties were quite unfounded. I asked questions to both sides. REG.RU limited themselves to a response containing general phrases […]

He doesn't tell you

In connection with the growing popularity of Rook, I want to talk about its pitfalls and problems that await you along the way. About me: Experience in administering ceph since the hammer version, founder of the t.me/ceph_ru community in telegram. In order not to be unfounded, I will refer to the posts accepted by Habr (judging by the rating) about problems with ceph. With most of the problems in […]

Complex systems. Reaching a critical level

If you've spent any time thinking about complex systems, you probably understand the importance of networks. Networks rule our world. From the chemical reactions within the cell, to the network of ecosystem relationships, trade and political networks that shape the course of history. Or consider this article you are reading. You probably found it on a social network, downloaded it from a computer network […]

How we accelerated a web application 20 times using WebAssembly

This article discusses a case of speeding up a browser application by replacing JavaScript calculations with WebAssembly. WebAssembly - what is it? In short, this is a binary instruction format for a stacked virtual machine. Often Wasm (abbreviated name) is called a programming language, but it is not. The instruction format is executed in the browser along with JavaScript. Importantly, WebAssembly can […]

PyDERASN: how I wrote an ASN.1 library with slots and blobs

ASN.1 is a standard (ISO, ITU-T, GOST) for a language that describes structured information, as well as rules for encoding this information. For me, as a programmer, this is just another serialization and data presentation format, along with JSON, XML, XDR and others. It is extremely common in our everyday life, and many people face it: in cellular, telephone, VoIP communications (UMTS, […]

GOSTIM: P2P F2F E2EE IM in one evening with GOST cryptography

As a developer of the PyGOST library (GOST cryptographic primitives in pure Python), I often get questions about how to implement the simplest secure messaging on my knee. Applied cryptography is considered by many to be fairly simple, and a .encrypt() call on a block cipher will be enough to securely send it over a communication channel. Others believe that applied cryptography is for the few, and […]

Shit happens. Yandex removed some of the virtual machines in its cloud

Shot from the film Avengers: Infinity War According to user dobrovolskiy on May 15, 2019, as a result of human error, Yandex deleted some of the virtual machines in its cloud. The user received a letter from Yandex technical support with the following text: Today we carried out technical work in Yandex.Cloud. Unfortunately, due to a human factor, user virtual machines in the ru-central1-c zone were deleted, […]

12. Check Point Getting Started R80.20. Logs & Reports

Welcome to lesson 12. Today we will talk about another very important topic, namely working with logs and reports. Sometimes this functionality turns out to be almost decisive when choosing a means of protection. Security specialists really love a convenient reporting system and functional search for various events. It's hard to blame them for this. Essentially, the logs […]