Directory of RSS feeds
Statistics

RSS feeds in the directory: 374

Added today: 0

Added yesterday: 0

Advertising

Hi-Tech / Other

Habrahabr / Interesting / topical publications

Interesting publishing of thematic hubs on habrahabr

Other RSS feeds of this site

The best publications per day

Found 1922 items

Viewers are moving away from regular viewing TV programs in favor of YouTube versions of familiar shows and a variety of online content — movies, TV series and entertainment programs on other streaming platforms. The ongoing crisis has fuelled this trend and television Corporation — looking for ways to keep the audience: preformation rates, launch and develop their own online services and platforms. Discuss progress in the process that offer a TV crew, and who pays for all this. Read more

DDoS attack can be any resource. Most of the attacks are targeted — the attackers can try to put a website with some information (various media and websites, and TV broadcasts are faced with similar, and more than once). Trade enterprises and banks, too, suffer from this, for them a simple systems are quite critical, people used to go to the app Bank or an online store and a couple of clicks to transfer money or to buy goods. So there is obvious financial loss and reduced customer loyalty immediately. even If you have a medium business and not a store with thousands of products, DDoS still thing is not very nice, which is good to prevent. And, in addition to DDoS, the overall level of information security should be maintained. Especially now, when many...

I'm interested in IT, and the music, so I always paid attention to their intersection: songs it people. Sometimes this is a parody of famous songs with altered text, sometimes completely original compositions. Some of them are notable for the author (the best known is Richard Stallman), the other format (the non — standard-singing code). Typically, these songs are not serious, so Friday's the day collection of them. But at the same time this reason to understand: what they are and what is the difference? Why do some make me happy and other shame? I have not considered the cases when the computer has affected famous musicians had never worked in IT. Here only hardcore songs written about those who write code know how! Add in the comments the ones that you...

Good day, dear masters! This is my first article, I will try to be interesting. Many years ago (Oh the horror) when I was super energetic, young and eyes are burning I wanted to automate everything that moves and does not move. I felt your endless possibilities and was confident on 100% and more, in front of me there was not a single not a solved problem and burning in the hands. However, tracbar from youth to wisdom all moved towards the second. So with time came experience, which the son of errors difficult, and unfortunately, there's also the genius of paradoxes. Just looking ahead to say that many of the processes in the public service, where he worked and your faithful servant is automated, developed and put into operation a system which is...

Paragon Software has published a set of patches with full implementations of NTFS file system by opening the driver code under the GPL. The driver supports operation in read mode and in write mode. According to the developers, this implementation supports all the features of NTFS version 3.1.Now the driver uses a stripped-down implementation of the NTFS journal. But in the future Paragon Software adds support for the full journaling on top of the already built-in to the kernel generic block device JBD, which organized the journaling ext3, ext4, OCFS2. Read more →

Annually via cryptocurrency exchanges are millions of dollars of dubious origin. Often they belong to projects that later disappear with the users. Suffice it to recall the sensational case PlusToken, the founders who was deceived "investors" of three billion dollars. Team members are detained — is a consequence, but the stolen funds still not arrested. Attempts by regulators to get control of the crypto operations is not always effective. The situation has not changed after the entry into force of the Fifth EC Directive on combating money laundering (5AMLD). According to a report by research firm Peckshield for the last two quarters through the largest cryptocurrency exchanges have passed 147,000 BTC ($1.3 billion) received from suspicious addresses. The...

About the grants we found out the day of fools April 1, 2020. There was a lot of news propaganda wing with clickbaiting headers on how will help business and people in crisis. In fact, it has been found that will not all businesses and not all people. But I basically monitor all of the support packages, and I'm frankly infuriated by the inconsistency of the contents of the headers. In our office the last working day was March 13, and we still have another remote with the exception of the engineers of data centers. Any hope on getting real support was not. We've learned that the government usually only creates problems. Read more →

An Important component of protection against unauthorized access Every reasonable person has something to hide. This is normal. No one wants leaked his private keys to access the repository, important code or personal pictures in a reindeer sweater. So, I've thought about it and decided to gather in one place a standardized check-list for the comprehensive protection of your laptop. I deliberately cut stationary PC because they are less susceptible to threats of the "accidentally left in a bar". With 6 pounds of hard drives, heat pipes and tower cooler to make it much more difficult. I'll try to go through the main threats and methods of protection. For example, people often forget that to enter the password under the camera is a bad idea. I would be very...

Introduction As often happens, the database architect needs to develop a database for the specific solution. One Friday evening, returning on the train home from work, I thought, how would I have created a service for the recruitment in different companies. After all, none of the existing services makes it difficult to understand how suitable you candidate, you cannot create complex filters it is for specific skills, projects, and positions or exclude certain skills, positions and projects. The maximum that offer services are the filters by companies and partially by skill. In this article, I will allow myself to slightly dilute the strict technical presentation of the material, stir technical information non-technical real-life examples. In this example...

Crew Members NASA SpaceX Crew-1 sitting in the spacecraft Crew Dragon during training on interaction with the equipment. From left to right — NASA astronauts Shannon Walker, mission specialist; Victor Glover, pilot; Mike Hopkins, the commander of the ship; and Japanese astronaut (JAXA) Soichi Noguchi, mission specialist. Photo source: SpaceX. 14 Aug 2020 NASA has announced plans to launch to the ISS the first regular mission Crew-1 after October 23, 2020. The flight will take place on a certified NASA commercial spacecraft Crew Dragon produced by the American company SpaceX. The duration of this scientific mission will last for six months. Read more →

My name is Rostislav Salad, I work in the eSports organization for almost three years. Joined the company for the position of user experience designer, has grown to the UX lead, and are currently the grocery Manager. grocery Task Manager and approach to work we are very different from the responsibilities of product managers in other companies. This means that your company's ideas about the functionals and the set of skills for product Manager and designer may vary. For example, in some companies, the product Manager designs the interfaces, and we – no. the reason I raised this topic? We spent a lot of interviews with product designers. Based on my experience and the experience of colleagues, I can safely say that the question of the terms of reference asks...

RFC exists since 1969 — it was introduced during the discussion of the ARPANET. Then the engineer, Steve Crocker wrote RFC 1, on the software host. Since then it has been more than 50 years, but the Request for Comments is still in Vogue — published ~9 thousand documents on the network protocols, models of data storage and encryption algorithms. this diversity meet RFC that have no practical application. Wrote them mostly for fun. Today we will talk about some of the finds from this area. Read more →

We analyzed the data collected using container-honeypots — they were created by us to track threats. We found a significant activity of unsolicited or unauthorized miners cryptocurrency deployed as fraudulent containers with the use of published community of the image on Docker Hub. The image is used as part of the service that delivers malware-crypto currency miners. in addition, established programs to work with networks to penetrate in the open nearby containers and applications. Read more →

Author: Bart Hendricks, Monday, August 10, 2020 Warning — this is a Google translation.original an Early concept of the main mirror diameter of 2.4 m, which will be used for the Russian reconnaissance satellites of the new generation of "Hrazdan". (Source: journal Kontenant) currently, Russia has in orbit, there is only two existing satellite optical reconnaissance, the lifetime of which may have expired. They should be replaced by a more powerful satellites with a primary mirror about the same size as those believed to be installed aboard U.S. reconnaissance satellites, but it is unclear when they will be ready to fly. Experimental satellite launched in 2018 is probably the precursor of the much smaller constellation of spy satellites that will complement...

Entry, or where it is taken the Career programmer and engineer in General is a very interesting thing, and often leads to project management, as happened to me in T-Systems. Project management is beautiful: the experience, honor, and respect, but the scope for engineering activities there are to do. And the hands-that remember! (C) it Remains to use the obtained knowledge and skills in their outside projects, the good, it is. today I will tell in addition, I have a little (5-6 years old) saxophonist. And all is well in this beautiful instrument, but it is very loud it is. And with his first lessons, I dreamed about the appearance of my life of the same saxophone, but to be able to play it with headphones and not bother the neighbors, so it was sort of a...