librats: a new C++ library for distributed P2P applications
Hello everyone! I am the creator of the distributed search engine rats-search based on DHT. Its principle is quite simple: the search engine collects torrents from all…
Hello everyone! I am the creator of the distributed search engine rats-search based on DHT. Its principle is quite simple: the search engine collects torrents from all…
I work in a service company, and in our work, we often use Russian SD-WAN solutions. We do large and non-standard deployments and also provide networks through a "subscription…
A detective story about how one of our partners, the IT Expert Group, was approached by a retail chain regarding the disappearance of 200 computers in the CMDB. And how…
Currently, the main model used in most network interactions is TCP/IP. It is simpler, more compact, and widely used. But here’s the catch: in any serious certification,…
Hub-and-Spoke on Huawei or how to connect sites with different IGPs together
Image by Freepik
It’s hard to imagine the Internet without the web and hypertext that we all use every day, but over 40 years ago, the global network was very different, and much of what…
A simple and clear guide to Unity Netcode for GameObjects that will help beginner developers take their first step into the world of network games.
Considering the current market situation and the decrease in availability of ready-made solutions for network testing, it becomes relevant to consider any available alternatives.…
If you are a beginner network engineer, administrator, or just interested in the topic, we have prepared a free course for you: "How Networks Work".
HTTPS has become the standard — and with it, the load on infrastructure has increased. Traffic decryption puts a serious strain on the CPU, which is why many still use…
Hello everyone! Nikolay Edomsky here, Head of the Network Engineering Group at EDINOM TSUPIS.
Hello everyone! This is Nikolai Yedomskiy, the head of the network engineering team at EDINOM TSUPIS.
Hello everyone! Nikolay Edomsky here, head of the network engineers group at EDINY TSUPIS.
On the access nodes where our clients create tunnels, we currently use Traefik for HTTP traffic termination. Recently, we encountered a problem where one of the domains…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…