Unity posted the original C # code on Github

Unity posted the original C # code on Github
 
 
Rejoice everyone who has ever had to decompile the .NET Unity code! Now the code C # -part of the engine and the editor Unity is available for study on Github . All major branches are available, from version 2017.1 to the latest ???b12.
 
 
The code was posted yesterday, the official announcement will take place only on Monday.
 
 
Fly in the ointment: the code can be used only for reference purposes . You can see the full license for use here .
 
 
However, this did not stop the comrade, already ...
+ 0 -

FastReport.Mono. Part 2: Web-report in the Docker

FastReport.Mono. Part 2: Web-report in the Docker
 
 
In the previous parts I explained how to run the demonstration Web report FastReport.Mono. Now, I propose to move to a new level and "wrap" all the necessary components in Docker-containers.
 
 
 
Understand, in heaven only they say that about the sea. How infinitely beautiful it is
 
 
In recent years, everyone has been talking about Docker, because the containers are stylish, fashionable and sexy youth. Many developers and administrators use Docker on the case and without any apparent need. But, if you really need it and it's interesting - welcome to the cat. Unlike the first part, there will ...
+ 0 -

Cisco ASA: critical vulnerability of firewalls

Cisco ASA: critical vulnerability of firewallsis patched.At the end of January, Cisco reported about the critical vulnerability of CVE-2018-0101 in firewalls Cisco ASA. It allowed attackers to remotely execute malicious code, conduct DDoS attacks and reboot the system.  To date, the vulnerability is "closed".  We decided to understand the situation and look at the vector of the attack in more detail.     /Flickr / Horst Gutmann / CC    What was the vulnerability of  Problem found researcher Cedric Halbronn (Cedric Halbronn) from the consulting agency for information security NCC Group. It consisted of the XML parser of ...
+ 0 -

Data center with an interesting physical protection

Data center with an interesting physical protection  
 
We use the DataPro data center for our cloud. Yes, the integrator Technoserv built data centers and server nodes, yes, we know how to do it, yes, we have the right engineers in the state, but we prefer to outsource it to outsourcing. Why? Because the data center in the form of IaaS is, very much simplifying, like a refrigerator or a warehouse. Nothing romantic - just a place to put the server. Cooling, food, regulations and everything else is a lot of competencies that are not needed in the cloud. Keeping other servers on is a separate business.
 
 
Why did we choose them? Because they are ...
+ 0 -

Testing and continuous integration for Ansible-roles using Molecule and Jenkins

Testing and continuous integration for Ansible-roles using Molecule and Jenkins  
 
After Ansible entered our practice, the amount of code on it and, in particular, the roles began to grow very quickly. Roles for back-up, front, proxy, databases, monitoring, collection of logs, etc., etc.-their number counts dozens. Some of the roles are specific to a particular project, but many solve common problems, they want to share between project teams, so as not to create the same solution twice.
 
 
Along with a lot of code there is an old, familiar problem: fear of change. People do not want to make changes to the "alien" role, for fear of spoiling it, instead create their own copy. Code ...
+ 0 -

3 years of "right to forget": Google disclosed the statistics of requests to "delete" information

A month ago in its blog company Google has submitted statistics on the implementation of the so-called right to oblivion over the past 3 years. In total, from 2014 to 2017 the company received 2.5 million requests for the removal of information from the search issue.
 
 
More details on what is the "right to oblivion" and how it works will be discussed later.
 
 
3 years of "right to forget": Google disclosed the statistics of requests to "delete" information

 
/photo James West ...
+ 0 -

The battle for network neutrality: the war of the states

The battle for network neutrality: the war of the statesBefore the repeal of the rules of network neutrality in the United States, less than a month remains. In this regard, the country has not ceased to argue, and the peculiarity of the confrontation is that it included state authorities.
 
 
In previous articles, we traced the history of network neutrality from nucleation of before its acceptance and cancellation of in less than 3 years. Today we will consider what changed after sign solution FCC at the end of 2017.
 
 
...
+ 0 -

Simplify the code with if constexpr in C ++ 17

Several new features of C ++ 17 allow you to write a more compact and clear code. This is especially important in the case of template meta-programming, the result of which often looks creepy
 
For example, if you want to express if , which is evaluated at compile time, you will be forced to write the code using the method. SFINAE (for example,
? enable_if ) or static dispatching (tag dispatching). Such expressions are hard to understand, and they look like magic for developers unfamiliar with advanced meta-programming templates.
 

Fortunately, with the advent of C ++ 1? ...

+ 0 -

Digest of interesting materials for mobile developer # 244 (March 19-March 25)

Last week, we dealt with updates to Android, with how to become a great designer, with the secrets of advertising, with computer vision and bugs in products. All this and much more - in our digest.
 
 
Digest of interesting materials for mobile developer # 244 (March 19-March 25)
 
 
 
 

 

Bugodelnia - marathon on the murder of elderly bugs


 
 
Some people use Zero Bug Policy, some have a well developed culture of working with bugs (timely update the backlog, review errors when changing functionality, etc.), and someone grows wizards who write without bugs at all (unlikely, but, maybe it happens).
 
 
The digest is also available as a mailing list. You can subscribe to ...[/h]
+ 0 -

Training FastTrack. "Networking basics." "Cisco Security Software Products." Eddie Martin. December, 2012

About a year ago, I noticed an interesting and fascinating series of lectures by Eddie Martin, which is incredibly intelligible, thanks to his history and examples from real life, as well as his tremendous experience in teaching, allows him to gain an understanding of quite complex technologies.
 
 
Training FastTrack. "Networking basics." "Cisco Security Software Products." Eddie Martin. December, 2012  
 
We continue the cycle of 27 articles on the basis of his lectures:
 
 
01/02: "Understanding the OSI model" Part 1 / Part 2
 
03: "Understanding the Cisco Architecture" ...
+ 0 -