Category: Blog

Hacking WPA3: DragonBlood

Although the new WPA3 standard has not yet been fully implemented, security flaws in this protocol allow attackers to hack Wi-Fi passwords. Wi-Fi Protected Access III (WPA3) was launched in an attempt to address the technical shortcomings of the WPA2 protocol, which had long been considered insecure and vulnerable to KRACK (Key Reinstallation Attack). Although WPA3 relies on more […]

New York fails in first attempt to recognize drivers' faces

Total control systems, as a rule, are introduced under the rhetoric of fighting very dangerous terrorism. But with the decrease in public freedom, the number of terrorist attacks for some reason does not decrease significantly. So far this is due to the usual imperfection of technology. New York's plan to identify terrorists on the road using facial recognition has not gone so smoothly so far. The Wall Street Journal received an email […]

AMD Introduces New Ryzen Pro and Athlon Pro Mobile APUs

AMD believes that the current trend in the business PC market is one where both professional capabilities and a quality home environment are needed on a single mobile system; Laptops should support advanced collaboration capabilities on projects; and also have enough power for heavy loads. It is with these trends in mind that the new Ryzen Pro APUs were created […]

EK-Vector Trio Full Coverage Waterblock Designed for MSI's GeForce RTX Graphics Cards

EK Water Blocks continues to expand its range of full-coverage water blocks for video cards. This time, the Slovenian manufacturer presented a series of EK-Vector Trio water blocks, which are designed for MSI GeForce RTX 2080 and RTX 2080 Ti graphics accelerators of the Gaming Trio and Gaming X Trio series. One of the new water blocks was created specifically for GeForce RTX 2080 video cards of the corresponding series, […]

Antivirus requirements will be tightened in Russia

The Federal Service for Technical and Export Control (FSTEC) has approved new software requirements. They relate to cybersecurity and set deadlines until the end of the year, within which developers need to conduct tests to identify vulnerabilities and undeclared capabilities in software. This is being done as part of protective measures and import substitution. However, according to experts, such verification will require significant [...]

Cycling infrastructure in the Netherlands - how does it work?

Hello Habr. In recent years, various Russian cities have begun to pay more attention to cycling infrastructure. The process, of course, is slow and a little “creaky” - cars are parked on bicycle paths, often bicycle paths do not withstand the winter with salt and are worn out, and it is not physically possible to place these bicycle paths everywhere. In general, there are problems, but I’m glad that at least [...]

Life as a Service (LaaS)?

About digitalization and not only, and not so much and not at all. Life as a Service (ZhkU) or in English "Life as a Service" (LaaS) has already found expression in the minds of several people or groups of people: here it was considered from the position of the general digitalization of life, the transformation of all its aspects into services and the required new political system capital communism, and here […]

Debian + Postfix + Dovecot + Multidomain + SSL + IPv6 + OpenVPN + Multi-interfaces + SpamAssassin-learn + Bind

This article is about how to set up a modern mail server. Postfix + Dovecot. SPF + DKIM + rDNS. with IPv6. With TSL encryption. With support for multiple domains - the part with a real SSL certificate. With anti-spam protection and a high anti-spam rating from other mail servers. With support for multiple physical interfaces. With OpenVPN, the connection to which is via IPv4, and which […]

Writing an OTA bootloader for the ATmega128RFA1 (as part of the Smart Response XE device)

It all started with the acquisition by the author in the secondary market of an interesting device - Smart Response XE (brief description). It is intended for schools: each student in the class receives a device that looks like an electronic notebook or a translator of the nineties, the teacher asks a question, and the students type answers on the keyboards of the devices that come over the radio channel (802.15.4) to the receiver connected to the teacher's PC. […]

DeaDBeeF music player updated to version 1.8.0

The developers have released the release of the music player DeaDBeeF under the number 1.8.0. This player is similar to Aimp for Linux, although it does not support covers. On the other hand, it can be compared to the lightweight player ‎Foobar2000. The player supports automatic transcoding of text encoding in tags, an equalizer, can work with CUE files and Internet radio. Key innovations include: Opus format support; Search […]

Tesla electric car can now change lanes on its own

Tesla is one step closer to making a truly self-driving car by adding a mode to its autonomous driving system that allows the car to decide when it needs to change lanes. While the Autopilot system previously required driver confirmation before performing a lane change maneuver, this is no longer […]

Dell Introduces Inspiron 5000 Laptops with AMD Ryzen Mobile 3000 Processors

Dell has announced the release of laptops based on the new AMD Ryzen Mobile 3000 series (Picasso) processors. From now on, some Inspiron 5000 series laptops will be available not only in configurations with Intel processors, but also in versions based on the latest processors from AMD. These will be the 14-inch Inspiron 14 5485 and Inspiron 14 5485 2-in-1 models, and […]