Monitoring EVPN Fabric and BGP. Part 2
Hello, tekkix! My name is Elena Sakhno, I am a senior network engineer in the network services group of the network technologies department at Ozon.
Hello, tekkix! My name is Elena Sakhno, I am a senior network engineer in the network services group of the network technologies department at Ozon.
Many say that working as an engineer is a "clean job". You sit in a room with electronics, with hardware - no problems, and no dirt. According to the experience of the…
Every system/network administrator sooner or later faces a situation: someone edited the config, but it is not very clear who and when. There were no differential backups,…
Hello, tekkix! This is Viktor Sergeev from MTS Digital. Twenty years ago, in November 2004, the first release of the Firefox browser was launched. The novelty quickly…
In the modern internet, many face the question of how to bypass blocks and protect personal data. And, while VPN applications are well-known, solutions like Shadowsocks,…
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
Hello everyone, I recently started studying the USB protocol on the STM32F103C8, namely HID devices. I am a person who does not really like theory, but loves to learn…
This is the fourth article in the guide to developing multiplayer games, where I try to consistently and in one place gather the knowledge that will be required for conscious…
I, like many others, use Discord and Chinese proxy clients, but unfortunately, Discord voice chat does not support working through a proxy. Because of this, I constantly…
For smart guys, there's nothing interesting in the article, it's about a regular tunnel. It's for the smallest, but desperately in need. :)
Ansible is a configuration management system written in the Python programming language. It is used to automate the setup and deployment of software. It is usually used…
Modern technologies and the development of digital services make us increasingly dependent on data preservation, their security, and most importantly, accessibility.…
It is very easy to answer the first question. Just yesterday, it was impossible to manage foreign tenders and supplies without translators. Large enterprises created…
We started with text CAPTCHA and came to a simple checkbox, improving the system after each failure.
One such method was the calculation of the Digital Evolution Index, created by the Fletcher School in collaboration with Mastercard. Based on the data obtained, the countries…
Launching the first VM. It is not pinging over the network. Locally from the hypervisor — everything is ok. I go to the console, run something like tcpdump -nvvvi any…
Hello, tekkix, my name is Alexey Onosov, I am an author at vAITI media. In this article, I will talk about setting up DLNA on servers, TV and mobile players, and hardware…
When a user enters a website URL in the browser's search bar, their computer or other device initiates a connection with the server and sends it an HTTP request — a message…