A small note about the wildcard certificates Let's Encrypt

Everything already, probably, is aware of such an organization as Let's Encrypt. For some time there you can get a wildcard certificate. In this short note I will describe a couple of not very obvious moments that I encountered.
 
here .
 
The use of DNS plugins is described in detail in the documentation on the link above.
 
 
When using the manual mode, you will need to manually add a TXT record to DNS. Each time this record will be different, i.e. automatic certificate renewal in this case is possible only through certbot hooks. There, by the way, you can hang up a team, for example, to ...
+ 0 -

Soviet HI-FI and its creators: laser video discs in the USSR

It so happened that in this cycle we mainly dealt with HI-FI audio, not touching the issue of video equipment, but meanwhile, in the Land of Soviets there were, let them be somewhat belated, but achievements in this area. Considering the Soviet video as a relatively rare and mostly perestroika phenomenon, under the definition of HI-FI (ie, high fidelity of reproduction), the best video discs of the Laser Disc format and players for them are best.
 
 
Soviet HI-FI and its creators: laser video discs in the USSR  
 
By the time of development in the Soviet Union, the technology described has lived out its final years behind the rusting iron curtain. At the same time...
+ 0 -

About thorns and stars on the way of optimization of development processes

Dreams, dreams


 
On a cold autumn evenings, we with the developers of 3D visualization applications were gathering in the kitchen drinking coffee and thinking about it about the reference development organization.
 
 
- I have friends on agile work: sprints, story points, all matters
 
- Yes, we would at least have a review
 
 
About thorns and stars on the way of optimization of development processes
 

 
The fact is that in those times, with us it was not very smooth. For example, the storage of projects in git was very unusual:
 
 
 
there were several repositories and in each one there was some piece of the project;
 
some repositories were common, some related only ...[/h]
+ 0 -

Secure Data Act 2018 - in the US they plan to ban backdoors in[опять]devices.

In the middle of May members of the US Congress presented The bill, which received the name Secure Data Act 2018 . It will forbid the government and state structures to require manufacturers of technical devices to build backdoors into their products. Coercion can not be achieved even through a court.
 
 
More details about the bill and the community's reaction will be discussed further.
 
 
Secure Data Act 2018 - in the US they plan to ban backdoors in[опять]devices.

 
/photo ...
+ 0 -

The night vision device based on the thermal imaging module Flir Lepton 3

Previously I wrote an article about connecting a Flir One Gen 2 thermal imager to a smartphone. It's time to remove the lepton module from this console and connect it directly to the microcontroller, assembling the night vision device.
 
here .
 
Video work (unfortunately, I shot on an old camera with the appropriate quality-video cameras I do not have with myself right now).
 
Previously I wrote an article about connecting a Flir One Gen 2 thermal imager to a smartphone. It's time to remove the lepton module from this console and connect it directly to the microcontroller, assembling the night vision device.  here . Video work (unfortunately, I shot on an old camera with the appropriate quality-video cameras I do not have with myself right now).  ...
+ 0 -

What does VMware do, and what will be the network architecture of the future

What does VMware do, and what will be the network architecture of the futureLike note in Gartner, 10% of corporate data is generated outside the traditional data center. And it is expected that this figure will increase to 50% by 2022. The trend is related to the growing popularity of "peripheral computing" ( Edge computing ) And the Internet of things.
 
 
Companies have to look for new approaches to the organization of corporate networks. One such company is the developer of virtualization software for VMware. In early May, representatives of the organization ...
+ 0 -

Striving for transparency

The most effective way to help others is to help them help themselves.
 
Jerry Korstens
 
 

From the translator.


 
I bring to your attention the translation of CEO of SpecterOps David McGuire "A Push Toward Transparency" . I have no relation to this company and I have never used its products, therefore the article serves not advertising purposes, but only an occasion to reflect, discuss and use or refuse to use the approach proposed by the author.
 
 
David raises the issue of transparency in the information security industry, arguing that the dissemination of knowledge about tools and ...[/h]
+ 0 -

Oddities of synthesis when working with FPGA

Oddities of synthesis when working with FPGATo date, there are two most common languages ​​for describing hardware: Verilog /SystemVerilog and VHDL. The languages ​​of the description of equipment are quite universal means, but is this always so? And from what "the universality" of the language of the description of equipment can depend?
 
 
The idea of ​​writing this article has arisen in the synthesis of one project in different development environments, resulting in different results. Since the source module is large enough, a smaller test module was written to demonstrate the results, but the synthesis of the test module caused the same ...
+ 0 -

In Moscow, they will show how to hack into the office and the computer of the boss

On Wednesday, June ? Moscow will host a live Penetration Test Show , in which the object of penetration will be your superior's computer. A live demonstration of the stages of hacking the local network, video surveillance and access control to the office, and the final hacking of the computer manager of the company will be held on the territory of DIGITAL OCTOBER.
 
 
In Moscow, they will show how to hack into the office and the computer of the boss
 
Security specialists will show how they do this on the Penetration Show
 
 
According to the legend of the Penetration Test Show, hackers will hack the computer of the top manager, using a multi-stage and multi-channel attack ...
+ 0 -

From the buzz of giraffes to the sounds of birds-imitators - we listen to nature together

We continue a series of stories about interesting sounds of nature based on podcast World According to Sound Sam Harnett (Sam Harnett) and Chris Hoff (Chris Hoff). In the last part of review it was about unusual sounds that insects, geysers and gravitational waves can produce. In this part, we will analyze what sounds giraffes, birds and people can do.
 
 
From the buzz of giraffes to the sounds of birds-imitators - we listen to nature together

 
Photo Rachel Hobday ...
+ 0 -