Unboxing a Coil of VVGng Cable
The article about how to blink an LED using Arduino was quite well received by the Tekkix audience. At the end of that article, there was a poll with a long list of topics…
The article about how to blink an LED using Arduino was quite well received by the Tekkix audience. At the end of that article, there was a poll with a long list of topics…
Hello, today I will share with you another report. The vulnerability we will discuss is IDOR. Using it, I was able to expose personally identifiable information (PII…
A good interface should help the user. But what if I say that sometimes a good interface should hinder them?
Light weekend post, with all that implies: take it with either kind humor or harsh satire, but do not treat it as something serious.
Hello, tekkix! My name is Alexander Shcherbakov. I will tell you how Privileged Access Management systems help control the actions of privileged users with the help of…
AI assistants in programming have burst into developers' daily lives at incredible speed. But what lies behind the convenience? Acceleration or superficial thinking?
Welcome to all CTF and ethical hacking enthusiasts on the Red Team! In this article, we will look at how to complete the easy task TETRIS, developed by pentesters from…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
The morning of October 2nd burst into Inga's apartment with an unexpected call. The smartphone screen lit up at the moment when Inga brought a cup of tea to her lips—her…
Hello, tekkix! The team of the regional scientific and educational center "Artificial Intelligence and Big Data Analysis" at NSTU named after R. E. Alekseev is here.
In 2024, we released a post We Hacked Google A.I. for 50,000, which described how our group consisting of Roni “Lupin” Carta, Joseph “rez0” Tacker, and Justin “Rhynorater”…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…
Hello, %USERNAME%. Do you remember that feeling when you have a free day and you can put a game disc you bought the day before in the CD-ROM drive right in the morning?…
In 2023, an international group of students and postgraduates at the Technical University named after George Asachi in Iași began researching the potential of personal…
Ignoring vulnerabilities in operating systems or other software products is fundamentally an unimaginable situation. On the contrary, developers always strive to find…
Security Vision
As it is known, a horizontal infrared counter essentially counts not people but interruptions of the horizontal infrared beam caused by their passage. The height of the…