What to read for a system administrator — authors who write about protocols
If you are a beginner network engineer, administrator, or just interested in the topic, we have prepared a free course for you: "How Networks Work".
If you are a beginner network engineer, administrator, or just interested in the topic, we have prepared a free course for you: "How Networks Work".
HTTPS has become the standard — and with it, the load on infrastructure has increased. Traffic decryption puts a serious strain on the CPU, which is why many still use…
Hello everyone! Nikolay Edomsky here, Head of the Network Engineering Group at EDINOM TSUPIS.
Hello everyone! This is Nikolai Yedomskiy, the head of the network engineering team at EDINOM TSUPIS.
Hello everyone! Nikolay Edomsky here, head of the network engineers group at EDINY TSUPIS.
On the access nodes where our clients create tunnels, we currently use Traefik for HTTP traffic termination. Recently, we encountered a problem where one of the domains…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…
Japanese cybersecurity provider Trend Micro has reported that since the end of 2024, it has been observing a wave of large-scale DDoS attacks utilizing "armies" of compromised…
In the spring of 2022, our team faced an unconventional task: we had to transfer the entire IT infrastructure of a large manufacturing enterprise from foreign management…
tl;dr - new computers sometimes have a rather fast network hidden, most likely not set up in your home.
We will start a series of articles called Detection is easy, dedicated to Detection engineering, which I write about in the Telegram channel of the same name.
dumbproxy was already mentioned on tekkix in one of my previous articles. It is an HTTP proxy server that works over TLS, directly compatible with browsers and browser…
Hello everyone! We have long planned to tell a couple of scenarios for using our open-source web server Angie. Today we will talk about how Angie is used in the infrastructure…
Guide on how to run VPN through I2P. Complete description of server and client configuration. Sleight of hand and flexibility of mind — please see under the cut!
When we want to protect transmitted data, we use a VPN. But sometimes we want the fact of using a VPN to be hidden as well. We care so much about our data:)
This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals…