Linux On A Stick
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
Hello everyone, I recently started studying the USB protocol on the STM32F103C8, namely HID devices. I am a person who does not really like theory, but loves to learn…
You apply the key card to the reader, and the office door opens. But what if such a pass can be hacked and copied by anyone?
This is the fourth article in the guide to developing multiplayer games, where I try to consistently and in one place gather the knowledge that will be required for conscious…
In 2024, the logical programming language Prolog turned fifty years old! As a tribute, I would like to tell in a small historical essay about the scientific context of…
In the life of every HR, sooner or later, HE appears... Security professional! And how to approach hunting people for this position is usually unclear.
The article is based on a year and a half of work on implementing neural networks in an open-source web application. It contains practical life hacks for solving real…
Hello! My name is Alexander Ustyuzhanin, and I am a developer in the YandexART team. Recently, I visited Milan for one of the largest international conferences on computer…
In light of recent news about layoffs in the IT industry, the issue of job searching is becoming increasingly acute even for people who are currently employed. It has…
I will briefly introduce the age encryption tool. We will learn to encrypt both personal and corporate backups with one simple command, and then argue about why openssl…
Continuing the story about vulnerabilities discovered by UCSB pentesters and formed the basis of cases at the Pentest Award, we publish an analysis of the following real…
Modern hardware is incredibly fast. The M1 Max, on which I am writing this article, runs at 3.2 GHz. That is 3.2 BILLION cycles per second. However, Microsoft Teams takes…
Main problems of LLM:
Hello, tekkix! The security team of the Platform, led by its team leader Vladimir Bukin, is in touch. The main task of our team is to protect CI/CD and, in particular,…
I, like many others, use Discord and Chinese proxy clients, but unfortunately, Discord voice chat does not support working through a proxy. Because of this, I constantly…
The profession of a fraudster is highly competitive: to stay afloat and be economically efficient, poor fellows must keep up with trends and respond quickly to changes.…
Recently, developers using the Trivy image scanner encountered the TOOMANYREQUESTS error. It occurred due to the maximum number of tool users and the download rate limit…