My 71 TiB ZFS NAS has been running for 10 years without a single disk failure
My 4U 71 TiB ZFS server, built from twenty-four 4-terabyte disks, is over ten years old and still works great. Although it now has a second motherboard and power supply,…
My 4U 71 TiB ZFS server, built from twenty-four 4-terabyte disks, is over ten years old and still works great. Although it now has a second motherboard and power supply,…
Hello, tekkix! This is Viktor Sergeev from MTS Digital. Among the huge number of various models of user devices, sometimes very unusual ones come across. Some of them…
Hello! My name is Alexey Kolesnikov, I work in the malware detection department of the Positive Technologies security expert center, in the PT Sandbox team.
Greetings to all tekkix readers. If you throw out administrative work, then my main activity at work is finding various vulnerabilities. Most often, my toolkit consists…
The German company Leica introduced the digital camera M11-D, which does not have a digital display. It is noted that the device is designed for those who want to focus…
On August 21, the Chrome browser received an update that fixed 37 security-related bugs. The attention of researchers around the world was drawn to the vulnerability…
This publication is a translation of the article - HUNTING FOR MALWARE WITH COMMAND LINE LOGGING AND PROCESS TREES by Vanja Svajcer. The article is about how to use command…
Artificial intelligence is now largely everywhere. In any industry, we are told that neural networks, machine learning, and other AI directions are used in it. Systems…
Hello, tekkix! This is Viktor Sergeev from MTS Digital. Today we will talk about the Arbiter Studio Polar 75 Pro keyboard. It can be said that a keyboard is good, a keyboard…
When we were preparing this material, we argued for a long time about which characters could be used to visually compare OCR and IDP. The Coen brothers, Thor and Loki,…
«ChatGPT reveals personal data of real people!», «Side-channel attack on ChatGPT!», «ChatGPT chatbot caused a leak of confidential data!», «Hackers started using ChatGPT…
Hello tekkix! Let's talk about AIOps. As a profession, similar to the role of a DevOps engineer, AIOps has not yet formed into a clearly defined position. In companies,…
Hello, tekkix! Matvey Mochalov from cdnnow! is with you again, and in this post, we will not be dealing with FFmpeg - this time our "Eeeeeexperiments!" section will cover…
Good afternoon, dear tekkix readers. In this article, dedicated to the Setezor product, a description of the integration with the Acunetix web resource vulnerability…
Hello! I am Zhenya, CPO at the corporate messenger Compass. I often study the stories of large companies and popular services. This helps to look at non-standard successful…
My provider, in addition to slowing down YouTube, has also started blocking connections to my work VPNs. My employer doesn't really like it when I answer for a week at…
Information security specialists create systems that resist cyberattacks. They implement firewalls, configure monitoring, write security policies, and train employees.…
High-profile cybersecurity scandals in which employees of large companies and government agencies were found guilty have become one of the main topics of the past three…