Heading: Blog

California farmers install solar panels as water and farmland shrink

Dwindling water supplies in California, which has been plagued by persistent droughts, are forcing farmers to look for other sources of income. In the San Joaquin Valley alone, farmers may have to retire more than half a million acres to comply with the Sustainable Groundwater Management Act of 202,3, which will eventually imposes restrictions on [...]

New article: Top 10 smartphones under 10 thousand rubles (2019)

We keep talking about stagnation in the world of gadgets - almost nothing new, they say, is happening, technology is marking time. In some ways, this picture of the world is correct - the form factor of smartphones itself has more or less settled down, and there have been no grandiose breakthroughs in either productivity or interaction formats for a long time. Everything may change with the massive introduction of 5G, but for now […]

OPPO is preparing its first Snapdragon 665 smartphone

The Chinese company OPPO, according to online sources, will soon announce a mid-range smartphone A9s, which appears under the code name PCHM10. It is noted that the new product may become the first OPPO device on the Qualcomm Snapdragon 665 platform. This processor combines eight Kryo 260 computing cores with a clock speed of up to 2,0 GHz and an Adreno 610 graphics accelerator. Devices […]

Comparative review of portable microwave devices Arinst vs Anritsu

A pair of devices from the Russian developer β€œKroks” have been submitted for independent test review. These are fairly miniature radio frequency meters, namely: a spectrum analyzer with a built-in signal generator, and a vector network analyzer (reflectometer). Both devices have a range of up to 6,2 GHz in the upper frequency. There was an interest in understanding whether these are just another pocket β€œdisplay meters” (toys), or really noteworthy devices, because the manufacturer positions them: […]

SGX malware: how villains exploit the new Intel technology for purposes other than those for which it was conceived

As you know, the code executed in the enclave is seriously limited in its functionality. It cannot make system calls. It cannot perform I/O operations. It does not know the base address of the host application's code segment. It cannot jmp or call host application code. It has no idea about the address space structure that governs the host application (for example, which pages are mapped […]

Go to 2FA (Two Factor Authentication for ASA SSL VPN)

The need to provide remote access to a corporate environment is emerging more and more often, no matter whether it is your users or partners who need access to a particular server in your organization. For these purposes, most companies use VPN technology, which has proven itself to be a reliably protected way of providing access to the organization’s local resources. My company did not […]

We create a pipeline for streaming data processing. Part 2

Hi all. We are sharing the translation of the final part of the article, prepared specifically for students of the Data Engineer course. The first part can be found here. Apache Beam and DataFlow for real-time pipelines Setting up Google Cloud Note: I used Google Cloud Shell to run the pipeline and publish custom log data because I was having trouble running the pipeline in Python […]

LinOTP two-factor authentication server

Today I want to share how to set up a two-factor authentication server to protect a corporate network, sites, services, ssh. The server will run the following combination: LinOTP + FreeRadius. Why do we need it? This is a completely free, convenient solution, within its own network, independent of third-party providers. This service is very convenient, quite visual, unlike other open source products, and also supports […]

How we organized the first electronic leasing and what it led to

Despite the popularity of the topic of electronic document management, in Russian banks and in the financial sector in general, the majority of any transactions are executed the old fashioned way, on paper. And the point here is not so much the conservatism of banks and their clients, but the lack of adequate software on the market. The more complex the transaction, the less likely it is that it will be carried out within the framework of EDI. […]

LibreSSL 3.0.0 Cryptographic Library Release

The developers of the OpenBSD project have released LibreSSL 3.0.0 portable edition, which develops a fork of OpenSSL aimed at providing a higher level of security. The LibreSSL project is focused on high-quality support for SSL / TLS protocols with the removal of unnecessary functionality, the addition of additional security features and a significant cleaning and reworking of the code base. The release of LibreSSL 3.0.0 is considered experimental, […]

Matrix: 20 years later

This year, science fiction fans are celebrating the 20th anniversary of the premiere of The Matrix trilogy. By the way, did you know that the film was seen in the USA in March, but it only reached us in October 1999? A lot has been written and said on the topic of Easter eggs embedded inside. I was interested in comparing what was shown in the film with what […]