Security for Non-Security Experts
Anastasia Vazhinskaya is an information security engineer, not a front-end developer, but her presentation became the most important for the main hall of the FrontendConf…
Anastasia Vazhinskaya is an information security engineer, not a front-end developer, but her presentation became the most important for the main hall of the FrontendConf…
tekkix, hello! I am Alexander Leonov, leading expert of the PT Expert Security Center laboratory. Every month, my team of analysts at Positive Technologies researches…
In this article, we will look at how to organize simple secrets management for applications in Kubernetes using the GitOps approach. We store secrets in git securely…
This article is a translation of the Password Security Guidance from the National Cyber Security Centre of Canada. There is a lot of information about passwords available…
TL;DR The article discusses accessing corporate resources through a Forti connection from the Windows Subsystem for Linux.
Democracy is a dialogue. Its functioning and survival depend on the available technologies for information exchange. For most of history, there were no technologies that…
What prompted me to switch to Golang? At that time, I was using Python version 2.7.9 — this was around 2017. Then Python 3 was released. It turned out that despite many…
In sunny Athens, the ICDAR-2024 conference has concluded. Whether it was the Mediterranean sun or the lively enthusiasm of the speakers, it was really hot here. This…
Together with the basic iPhone 16, Apple introduced the advanced Pro and Pro Max versions during the fall presentation. The company added a separate shutter button and…
The Flipper Zero development team announced the release of firmware version 1.0. This is the first major update in three years. The update includes support for custom…
Or more precisely, using two soldering irons. An unexpectedly simple and effective solution suitable for compact modules with a chip antenna, requiring no additional…
Details about what happens under the hood in the Linux kernel when you make the next system call when working with sockets.
In this article, I will tell you how SolriXML automates the processing of XML files, transforming complex data structures into user-friendly formats. When it comes to…
In this article, we have collected the main "symptoms" of mobile surveillance that we found on the Internet. Each of them is commented on by a specialist in the field…
There have already been several articles about wled on tekkix, but they usually limited themselves to the standard firmware features - garlands with effects, control…
The company HMD has introduced the modular smartphone HMD Fusion, which allows you to connect accessories to expand capabilities. For this, six Smart Pins contacts are…
Finally, you can buy a camera without a lens, not set adequate ISO, shutter speed, and just observe the results.
Hello, this is Sherpa Robotics. Today we have translated an article by Aman Tripathi, an experienced journalist and news editor for leading publications and media, including…