Heading: Blog

Building an automated testing pipeline on Azure DevOps

I recently came across a not-so-popular beast in the DevOps world, Azure DevOps pipelines. I immediately felt the lack of any clear instructions or articles on the topic, I don’t know what this is connected with, but Microsoft clearly has something to work on in terms of popularizing the tool. Today we will build a pipeline for automated testing inside the Azure cloud. So, […]

The basics of transparent proxying using 3proxy and iptables / netfilter or how to "put everything through a proxy"

In this article I would like to reveal the possibilities of transparent proxying, which allows you to redirect all or part of the traffic through external proxy servers absolutely unnoticed by clients. When I started solving this problem, I was faced with the fact that its implementation had one significant problem - the HTTPS protocol. In the good old days, there were no particular problems with transparent HTTP proxying, […]

Functional DBMS

The world of databases has long been dominated by relational DBMSs, which use the SQL language. So much so that emerging variants are called NoSQL. They managed to carve out a certain place for themselves in this market, but relational DBMSs are not going to die, and continue to be actively used for their purposes. In this article I want to describe the concept of a functional database. For better understanding, I […]

Long live the king: the cruel world of hierarchy in a pack of stray dogs

In large groups of people there is always a leader, consciously or not. The distribution of power from the highest to the lowest level of the hierarchical pyramid has a number of advantages for the group as a whole and for individual individuals. After all, order is always better than chaos, right? For thousands of years, mankind in all civilizations has been implementing a hierarchical pyramid of power by […]

Balancing writes and reads in the database

In a previous article, I described the concept and implementation of a database built on the basis of functions, rather than tables and fields as in relational databases. It provided many examples showing the advantages of this approach over the classical one. Many found them not convincing enough. In this article I will show how this concept allows you to quickly and conveniently balance […]

CryptoARM based on PKCS#12 container. Creation of electronic signature CadES-X Long Type 1.

An updated version of the free cryptoarmpkcs utility has been released, designed to work with x509 v.3 certificates stored both on PKCS#11 tokens, with support for Russian cryptography, and in secure PKCS#12 containers. As a rule, a personal certificate and its private key are stored in a PKCS#12 container. The utility is absolutely self-sufficient and works on Linux, Windows, OS X platforms. A distinctive feature of the […]

Fedora CoreOS pre-release announced

Fedora CoreOS is a self-updating minimal operating system for running containers securely and at scale in production environments. It is currently available for testing on a limited set of platforms, but more are coming soon. Source: linux.org.ru

Is it time for game developers to stop listening to their fans?

There was a dispute over an article and I decided to post its translation for public viewing. On the one hand, the author says that developers should not indulge players in matters of the scenario. If you look at games as art, then I agree - no one will ask the community what ending to choose for their book. On the other side […]

Oracle Linux 8 release

Oracle has published the release of the Oracle Linux 8 distribution, created on the basis of the Red Hat Enterprise Linux 8 package base. The assembly is supplied by default based on the standard package with the kernel from Red Hat Enterprise Linux (based on the 4.18 kernel). The proprietary Unbreakable Enterprise Kernel for Oracle Linux 8 is still under development. In terms of functionality, Oracle beta releases […]

Kazakhstan obliges to install state certificate for MITM

In Kazakhstan, telecom operators sent messages to users about the need to install a security certificate issued by government agencies. Without installation, the Internet will not work. It should be remembered that the certificate not only affects the fact that government agencies will be able to read encrypted traffic, but also the fact that on behalf of any user it will be possible to write anything. Mozilla has already launched […]

Application development on SwiftUI. Part 1: Dataflow and Redux

After attending the State of the Union session at WWDC 2019, I decided to take a deep dive into SwiftUI. I've spent a lot of time working with it and have now started developing a real application that can be useful to a wide range of users. I called it MovieSwiftUI - this is an app for searching for new and old films, as well as collecting them […]

Firefox Update 68.0.1

A corrective update for Firefox 68.0.1 has been published that fixes several issues: Builds for macOS are signed with an Apple key, allowing them to be used in beta releases of macOS 10.15; Fixed an issue where the full screen button was missing when watching a video in full screen mode on HBO GO. Fixed a bug that caused incorrect messages for some locales when trying to query using […]