IPsecHub+. High Availability and Dynamic Routing
Hello everyone! Nikolay Edomsky here, Head of the Network Engineering Group at EDINOM TSUPIS.
Hello everyone! Nikolay Edomsky here, Head of the Network Engineering Group at EDINOM TSUPIS.
Hello, tekkix. This is the T1 Cloud team. If you keep up with the news in the server GPU world for ML, you surely know about the Nvidia H100—the computation powerhouse…
HTTPS makes it possible to implement secure interaction with the DNS resolver interface, concealing the DNS traffic that would otherwise be transmitted in plain text.…
💻 Using Nginx for load balancing LLM chat sessions. There are many examples of connecting LLM models to a Telegram bot, but with a large number of users, there are no…
Incident Description: The attacker uses stolen credentials to access the company’s server, website, or cloud.
In my previous article[1], I already talked about how I started my acquaintance with artificial intelligence. Back then it was ChatGPT, and now — the Chinese DeepSeek[2].
A few years ago, I came across an article on tekkix about building a PC for photogrammetry using four 3090 GPUs for a million rubles. That computer was assembled by a…
Is it possible to protect data without encryption? In 2025, as algorithms become outdated, quantum computing is on the rise, and most data breaches are caused by human…
Exactly one year has passed since the world watched in awe as the investigation of one of the most sophisticated backdoors in Linux history unfolded. The story of the…
Hello, tekkix! We continue our series of reviews on laws, orders, decrees, and regulatory initiatives related to information security. In this article, we cover what…
This article is a translation of a blog post by Luciano Nooijen published on April 1, 2025
Good night to everyone :)
The neural networks’ consortium is pondering what exactly the user meant in their prompt – at least, that’s how I imagine it)
Holidays, public holidays, any "extra" days off - this is an opportunity for attackers to try to launch an attack. The attackers' calculation is simple: the fewer "defending"…
In this article, we will examine which methods of transmitting a password over the internet are the safest. Hashing passwords or the TLS protocol - which one to choose…
Hello, tekkix! This is Anton Komarov, I write for the MTS blog. I’ve already published several posts about repairing various devices—for example, a robot vacuum cleaner…
Today we’ll talk about a topic that sparks lively interest among many developers and AI enthusiasts — integrating large language models like DeepSeek or ChatGPT with…