Silent Wazuh — tuning, event minimization, notifications in Telegram
Recently, I finally got around to studying Wazuh - to make the learning process useful, I set it up for testing in a small hospital and identified the tasks it should…
Recently, I finally got around to studying Wazuh - to make the learning process useful, I set it up for testing in a small hospital and identified the tasks it should…
If you follow the latest news in the field of IT security, you may have noticed an increase in the number of attacks on the network infrastructure of Linux systems. Among…
Every system/network administrator sooner or later faces a situation: someone edited the config, but it is not very clear who and when. There were no differential backups,…
Linux as a server OS is considered a guarantee of reliability and security, it is popular with companies and ordinary users. However, no system is completely impervious…
Frameworks simplify development, eliminate chaos, and set clear boundaries when creating an application.
Hello, tekkix! This is Viktor Sergeev from the MTS Digital special projects team. Well, six months have passed, and we got what we were promised — we waited for Fedora…
This article was born as a result of combining ideas from a laboratory work in preparation for the CCNA exam by Cisco, and the Network Protocols in Linux course, which…
Hello, tekkix! This is Viktor Sergeev, author of the special projects team at MTS Digital. I think there are practically no people here who have never worked with or…
Hello, tekkix, my name is Alexey Onosov, I am an author at vAITI media. In this article, I will talk about setting up DLNA on servers, TV and mobile players, and hardware…
In June 2023, Red Hat made a controversial decision to change the way it distributes the source code of Red Hat Enterprise Linux. Social media erupted with heated discussions,…
Setting up a Linux PC for training models on GPU. The article provides links to scripts written to simplify the process of setting up a GPU PC on Linux for training machine…
In a world where cyberattacks are becoming more frequent, it is important to understand the process of incident response in information security.
Fuzzing is a very popular software testing technique using random input data. There are a huge number of materials on the web about how to find software defects using…
Details about what happens under the hood in the Linux kernel when you make the next system call when working with sockets.
Some time ago, the SolarCamPi project was created - a solar-powered autonomous camera with Wi-Fi.