Heading: Blog

Nightdive Studios Announces System Shock 2: Enhanced Edition

Nightdive Studios announced on its Twitter channel an improved edition of the now classic sci-fi horror role-playing game System Shock 2. What exactly is meant by the name System Shock 2: Enhanced Edition is not reported, but the launch is promised “soon”. Let's remember: the original was released on PC in August 1999 and is currently on sale on Steam for ₽249. […]

Cybercriminals are actively using a new way to spread spam

Kaspersky Lab warns that network attackers are actively implementing a new scheme for distributing junk messages. We are talking about sending spam. The new scheme involves the use of feedback forms on legitimate websites of companies with a good reputation. This scheme allows you to bypass some spam filters and distribute advertising messages, phishing links and malicious code without arousing user suspicion. Danger […]

Alphacool Eisball: the original tank-sphere for coolant

The German company Alphacool is starting sales of a very unusual component for liquid cooling systems (LCS) - a reservoir called Eisball. The product has previously been demonstrated during various exhibitions and events. For example, it was displayed at the developer’s stand at Computex 2019. The main feature of Eisball is its original design. The reservoir is made in the form of a transparent sphere with a rim extending […]

Replacing the iPhone battery in an unofficial service will lead to problems

According to online sources, Apple has begun using software locking in new iPhones, which may indicate the entry into force of a new company policy. The point is that the new iPhones can only use Apple branded batteries. Moreover, even installing the original battery in an unauthorized service center will not avoid problems. If the user has independently replaced [...]

Service mesh data plane vs. control plane

Hello, Habr! I present to your attention a translation of the article “Service mesh data plane vs control plane” by Matt Klein. This time, I “wanted and translated” the description of both service mesh components, data plane and control plane. This description seemed to me the most understandable and interesting, and most importantly leading to the understanding of “Is it necessary at all?” Since the idea of ​​a “Service Network […]

“Changing shoes on the go”: after the announcement of the Galaxy Note 10, Samsung deletes a video with a long-standing Apple trolling

Samsung has not been shy about trolling its main competitor Apple for a long time to advertise its own smartphones, but, as often happens, everything changes over time and the old jokes no longer seem funny. With the release of the Galaxy Note 10, the South Korean company has actually repeated the iPhone feature that it once actively ridiculed, and now the company's marketers are actively removing the old video […]

We eat the elephant in parts. Application Health Monitoring Strategy with Examples

Hi all! Our company is engaged in software development and subsequent technical support. Technical support requires not just fixing errors, but monitoring the performance of our applications. For example, if one of the services has crashed, then you need to automatically record this problem and start solving it, rather than waiting for calls from dissatisfied users to technical support. We have […]

UPS monitoring. Part Two - Automating Analytics

Some time ago I created a system for assessing the viability of office UPS. The assessment is based on long-term monitoring. Based on the results of using the system, I completed the system and learned a lot of interesting things, which I’ll tell you about - welcome to the cat. First part In general, the idea turned out to be correct. The only thing you can learn from a one-time request to UPS is that life is pain. Part […]

DPKI: Fixing the Disadvantages of a Centralized PKI with Blockchain

It's no secret that one of the commonly used auxiliary tools, without which data protection in open networks is impossible, is digital certificate technology. However, it is no secret that the main drawback of the technology is unconditional trust in the centers that issue digital certificates. Director of Technology and Innovation at ENCRY Andrey Chmora proposed a new approach […]

Habr Weekly #13 / 1,5 million dating service users are under threat, Meduza investigation, deanon of Russians

Let's talk about privacy again. We have been discussing this topic in one way or another since the beginning of the podcast and, it seems, for this episode we were able to draw several conclusions: we still care about our privacy; the important thing is not what to hide, but from whom; we are our data. The reason for the discussion was two materials: about a vulnerability in a dating application that exposed the data of 1,5 million people; and about services that can de-anonymize any Russian. There are links inside the post […]

Alan Kay: How I Would Teach Computer Science 101

“One of the reasons to actually go to university is to move beyond mere vocational training and instead grasp deeper ideas.” Let's think about this question a little. Several years ago, Computer Science departments invited me to give lectures at a number of universities. Almost by chance, I asked my first audience of undergrads […]

Cisco Training 200-125 CCNA v3.0. Day 13 VLAN setup

Today's lesson we will devote to VLAN settings, that is, we will try to do everything that we talked about in previous lessons. Now we will look at 3 questions: creating a VLAN, assigning VLAN ports, and viewing the VLAN database. Let's open the Cisco Packer tracer program window with the logical topology of our network drawn by me. The first switch SW0 is connected to 2 computers PC0 and […]