Heading: Blog

Cable TV networks for the little ones. Part 9: Headend

The headend collects signals from several sources, processes them and broadcasts them to the cable network. Contents of the series of articles Part 1: General architecture of a CATV network Part 2: Composition and shape of the signal Part 3: Analog component of the signal Part 4: Digital component of the signal Part 5: Coaxial distribution network Part 6: RF signal amplifiers Part 7: Optical receivers Part 8: Optical […]

Reversing and hacking Aigo self-encrypting external HDD. Part 1: Dissecting the parts

Reversing and cracking external self-encrypting drives has been a longtime hobby of mine. In the past, I have had the opportunity to practice with models such as Zalman VE-400, Zalman ZM-SHE500, Zalman ZM-VE500. Just recently, a colleague brought me another exhibit: Patriot (Aigo) SK8671, which is built according to a typical design - an LCD indicator and a keypad for entering a PIN code. Here's what came out of it… 1. Introduction […]

How to solve NP-hard problems with parameterized algorithms

Research work is perhaps the most interesting part of our training. The idea is to try yourself in your chosen direction while still at university. For example, students from the areas of Software Engineering and Machine Learning often go to do research in companies (mainly JetBrains or Yandex, but not only). In this post I will talk about my project in Computer Science. […]

Collaboration and automation in the frontend. What we have learned in 13 schools

Hi all. Colleagues recently wrote on this blog that registration for the next Interface Development School in Moscow has opened. I am very pleased with the new set, because I was one of those who came up with the School in 2012, and since then I have been constantly involved in it. She has evolved. From it came a whole mini-generation of developers with a broad outlook and the ability to […]

13 most downvoted articles of the past year

It is better to learn from the mistakes of others and mentally thank those who provide such an opportunity. Below the cut are several typical examples of what you should not do on Habré. And what to do if it gets drained. According to our internal statistics, last year 656 publications out of 16711 went negative. This is slightly less than 4%. About half of them […]

Professions of the future: "Where will you work on Mars?"

“Jetpack pilot” is a “profession of the past” and is 60 years old. "Jetpack Developer" - 100 years old. “Instructor of a school course on designing jetpacks” is the profession of the present, we are doing it now. What is the profession of the future? Tamper? Archaeoprogrammer? Designer of false memories? Blade Runner? An old friend of mine who took part in crowdsourcing a jetpack engine has now launched his […]

CERN abandons Microsoft products

The European Nuclear Research Center is going to abandon all proprietary products in its work, and primarily from Microsoft products. In previous years, CERN actively used various closed-source commercial products because it made it easy to find industry experts. CERN collaborates with a huge number of companies and institutes, and it was important for him to make […]

DragonFlyBSD 5.6.0

On June 17, 2019, the next significant release of the DragonFly BSD operating system – Release56 – was presented. The release brings significant improvements to the Virtual Memory System, updates to Radeon and TTM, and performance improvements to HAMMER2. DragonFly was formed in 2003 as a fork from FreeBSD version 4. Among the many features of this operating room, the following can be highlighted: High-performance file system HAMMER2 […]

Recruitment for undergraduate students at St Petersburg University with the support of Yandex and JetBrains

In September 2019, St. Petersburg State University opens the Faculty of Mathematics and Computer Science. Enrollment for undergraduate studies begins at the end of June in three areas: “Mathematics”, “Mathematics, algorithms and data analysis” and “Modern programming”. The programs were created by the team of the Laboratory named after. P.L. Chebyshev together with POMI RAS, Computer Science Center, Gazpromneft, JetBrains and Yandex companies. The courses are taught by renowned teachers, experienced [...]

TCP SACK Panic - Remote Denial of Service Kernel Vulnerabilities

Netflix employees found three vulnerabilities in the TCP network stack code. The most serious of the vulnerabilities allows a remote attacker to cause a kernel panic. Several CVE IDs have been assigned to these issues: CVE-2019-11477 is identified as a significant vulnerability, and CVE-2019-11478 and CVE-2019-11479 are identified as moderate. The first two vulnerabilities relate to SACK (Selective Acknowledgment) and MSS (Maximum […]

Firefox 69 comes with a password generator and video autoplay blocking mode

In the nightly builds of Firefox, on the basis of which the Firefox 3 release will be formed on September 69, an implementation of a password generator has been added, to enable which you need to set the “signon.generation.available” parameter in about:config. After activation, in the password management section of the configurator, in addition to the option to enable a request to save passwords, an option will appear that allows you to display a prompt with an automatically generated […]

Firefox 69 will disable Flash by default

Mozilla developers have disabled the ability to play Flash content by default in nightly builds of Firefox. Starting with Firefox 69, scheduled for September 3, the option for permanently activating Flash will be removed from the settings of the Adobe Flash Player plugin and only the options will be left to disable Flash and individually enable it for specific sites (activation by explicit click) without remembering the selected mode. In Firefox ESR branches […]