Internet of the future: from freedom to centralization and back
This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals…
This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals…
If just a couple of years ago we asked an IT or IS specialist which NGFW is better to choose, everyone would unanimously recommend products from foreign vendors.
Good day to the community and as they say "congratulations on the start" :)
Good afternoon, colleague or random reader. My name is Pavel, I am a duty system administrator at Nubes. My colleagues mistakenly sent me access to tekkix, and I, without…
On December 17th, we will be live to talk about the capabilities of Cloud SD-WAN MWS. You will learn how to connect new offices and branches in a few hours, optimize…
In November and December 2024, the world faced a new threat to digital infrastructure — three underwater internet cable damages within a couple of weeks. These events…
In network traffic, you can find a lot of interesting things, the main thing is to know what to look for. With the Wireshark analyzer, you can find all sorts of anomalies…
As a provider of a Wi-Fi subscriber management solution that is independent of the radio communication standard, we decided to share with tekkix readers a small guide.…
Hello, tekkix! I want to share my implementation, vision of MultiWan on Mikrotik equipment.
Hello, tekkix! My name is Elena Sakhno, I am a senior network engineer in the network services group of the network technologies department at Ozon.
Many say that working as an engineer is a "clean job". You sit in a room with electronics, with hardware - no problems, and no dirt. According to the experience of the…
Every system/network administrator sooner or later faces a situation: someone edited the config, but it is not very clear who and when. There were no differential backups,…
Hello, tekkix! This is Viktor Sergeev from MTS Digital. Twenty years ago, in November 2004, the first release of the Firefox browser was launched. The novelty quickly…
In the modern internet, many face the question of how to bypass blocks and protect personal data. And, while VPN applications are well-known, solutions like Shadowsocks,…
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
Hello everyone, I recently started studying the USB protocol on the STM32F103C8, namely HID devices. I am a person who does not really like theory, but loves to learn…
This is the fourth article in the guide to developing multiplayer games, where I try to consistently and in one place gather the knowledge that will be required for conscious…
I, like many others, use Discord and Chinese proxy clients, but unfortunately, Discord voice chat does not support working through a proxy. Because of this, I constantly…