IPsecHub+. Segmentation on the IPsec hub
Hello everyone! This is Nikolai Yedomskiy, the head of the network engineering team at EDINOM TSUPIS.
Hello everyone! This is Nikolai Yedomskiy, the head of the network engineering team at EDINOM TSUPIS.
Hello everyone! Nikolay Edomsky here, head of the network engineers group at EDINY TSUPIS.
On the access nodes where our clients create tunnels, we currently use Traefik for HTTP traffic termination. Recently, we encountered a problem where one of the domains…
Hello everyone! This is Ksenia Naumova. At Positive Technologies, I research malicious network traffic and improve tools for analyzing it at the security expert center.…
Imagine having to replace an airplane engine mid-flight. That’s roughly the situation we found ourselves in when we took on the localization of production systems at…
Japanese cybersecurity provider Trend Micro has reported that since the end of 2024, it has been observing a wave of large-scale DDoS attacks utilizing "armies" of compromised…
In the spring of 2022, our team faced an unconventional task: we had to transfer the entire IT infrastructure of a large manufacturing enterprise from foreign management…
tl;dr - new computers sometimes have a rather fast network hidden, most likely not set up in your home.
We will start a series of articles called Detection is easy, dedicated to Detection engineering, which I write about in the Telegram channel of the same name.
dumbproxy was already mentioned on tekkix in one of my previous articles. It is an HTTP proxy server that works over TLS, directly compatible with browsers and browser…
Hello everyone! We have long planned to tell a couple of scenarios for using our open-source web server Angie. Today we will talk about how Angie is used in the infrastructure…
Guide on how to run VPN through I2P. Complete description of server and client configuration. Sleight of hand and flexibility of mind — please see under the cut!
When we want to protect transmitted data, we use a VPN. But sometimes we want the fact of using a VPN to be hidden as well. We care so much about our data:)
This article opens a series of materials dedicated to the problems of the modern internet, its centralization, and possible solutions. The introductory article reveals…
If just a couple of years ago we asked an IT or IS specialist which NGFW is better to choose, everyone would unanimously recommend products from foreign vendors.
Good day to the community and as they say "congratulations on the start" :)
Good afternoon, colleague or random reader. My name is Pavel, I am a duty system administrator at Nubes. My colleagues mistakenly sent me access to tekkix, and I, without…