A vulnerability has been detected in the Vesta CP

A vulnerability has been detected in the Vesta CPhosting control panel.In some of our previous articles we are already told about the free control panel Vesta CP. This morning we received alarming information - in the panel there is a critical vulnerability that allows attackers to gain access to the server and make DDoS attacks from it or send out spam, which often leads to overflow of traffic. Known for the moment, details, as well as tips for protecting clean and clean up the hacked server, under the cut.     forum panel . The symptoms of all were similar: a sharp increase in traffic and parasitic load on the server. And according to the people who served ...
+ 0 -

Visualization of process connections in Linux

Visualization of process connections in Linux  
Did you have to track the dependencies of system processes, who's whose folder, find the emperor and kill him so that slaves do not respawn? You can ps'at and grep'at, you can lsof drive, because it's so exciting;) But any connection, it seems to me, is always easier to analyze in visual form, console utilities draw good tablets, but from them you can not always quickly understand that with what is connected and in what order, and for diagnostics it is very important.
 
useful tool lsof , but it did not say anything about the -F switch...
+ 0 -

Why does "=" mean an assignment?

Let's look at the following code:
 
 
a = 1
a = a + 1
print (a)

 
In the environment of the OP often criticize this moment of imperative programming: "How can it be that a = a + 1? It's like saying "1 = 2". In a misbehaving, there is no point. "
 
 
Here we see the discrepancy of the notation: "equal" should mean "equality", when in practice it means "assign". I agree with this criticism and believe that this is an unfortunate notation. But I also know that in some languages, instead of a = a + 1 write the expression a: = a + 1 . Why is this not the norm?
 
 
This question ...
+ 0 -

Hunting for Dofoil using Windows Defender ATP

Hunting for Dofoil using Windows Defender ATPIn March 201? hundreds of thousands of computers were attacked by by the cryptomayer Dofoil . In previous blog posts, we looked at how we managed to shield users from this massive attack. We also managed to track the origins of the attack until the moment infection of the software update service which was used by attackers to spread malware.
 
 
In this publication, we will take a closer look at the methods of debugging against debugging and analysis, which Dofoil authors have resorted to, and will show how the capabilities of Windows 10 to identify malicious software can be useful ...
+ 0 -

Applications that have reached self-awareness: automated diagnostics in production

Applications that have reached self-awareness: automated diagnostics in productionThe path to understanding Zen begins with the development of applications that can monitor themselves - this makes it easier and cheaper to fix problems on the production. In this article we will see how modern Windows applications can do self-monitoring, self-diagnostics, and maybe even self-healing, all without having to have an external agent or stupidly restart the application. Curbing the power of ETW for accurate low-level monitoring, Windows performance counters for obtaining free-of-charge statistics and the CLRMD library for analyzing their own flows, heap and lok objects, one can move ...
+ 0 -

Journalists found 11 exchange points in Moscow and 4 Bitcoin ATMs

Journalists found 11 exchange points in Moscow and 4 Bitcoin ATMsin Moscow.   In early April, the media got information that an offline exchange of crypto-currency called "Sberkoin" was opened in Moscow. Now the journalists conducted an experiment and found out that this is far from the only point for the exchange of the crypto currency and the commission of transactions with digital money. have declared , that they do not violate Russian legislation and work in accordance with the Civil Code of the Russian Federation.   Other exchangers and bitcoin-ATMs  This episode is not the first in the history of the opening of exchangers for crypto-currency. As ...
+ 0 -

"Micro-Digest": 4 news from the world of developments for IoT

Today we have prepared a digest, in which we collected several news from the sphere of "chip building" for IoT. We will tell you about new devices for data encryption, the smallest computer in the world from IBM and about NVIDIA solution, which simplifies the integration of deep learning systems into microprocessors.
 
 
"Micro-Digest": 4 news from the world of developments for IoT

 
/photo Santi CC
 
 

The smallest computer in the world from IBM


 
At the IBM Think 2018 conference in March, the company introduced the smallest computer in the world. Its dimensions are ...[/h]
+ 0 -

Nagios-traffic light from Chinese dice

Nagios-traffic light from Chinese diceAs usual, to start a small "written otmaz of responsibility."
 
 
 
The goal of all the ridiculous gestures described in the article is one - to facilitate monitoring of servers and applications.
 
This bold stunt can be repeated at home and at work, even unprepared athletes.
 
I hope that this text will come in handy not only for the adepts of Nagios, but also for the lightless Jabal Zabbix and the neophytes of other denominations of monitoring.
 
There will be no demonstrations of aerobatics in the use of a soldering station, an oscilloscope and the masterly possession of Ruby /Fortran /etc...
+ 0 -

As in hh.ru they test the search for vacancies

I already shared with the story of about our experience of using artificial intelligence in the search for hh.ru, and today I would like to dwell on the measurement of the quality of this search in more detail.
 
As in hh.ru they test the search for vacancies  
For the normal operation of the search system of metrics - local, A /B-tests, queues on the pass, etc., is extremely important, and this system requires separate attention and resources. It's not right to think that it's enough just to cut a steep ML and screw all these metrics with "scotch tape"; It is also not enough to measure the quality of the work of an already running system - it ...
+ 0 -