Security Week 34: what are the &lt;{short}&gt; routers broken for? &lt;{full}&gt; <div class="post__text post__text-html js-mediator-article"> When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hij

routers broken for? <{full}>
When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.
 
 
Security Week 34: what are the  routers broken for?   When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.    
    
       
 Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable information. Or not only: it seems that cybercriminals of the middle level are also starting to try to play cyber espionage. Researchers from the Chinese team 360 Netlab were able to identify at least ?500 Mikrotik routers that were hacked and transmitted traffic passing through them to the servers of cybercriminals (  routers broken for?   When your computer is infected with a crypto-locker, if your passwords are stolen by a trojan and scammers hijacked mail, if phishing scams were taken and money was withdrawn - it's all terrible, but it's at least clear what happened and how to deal with it. Anti-virus clean up the muck, restore the data from the backup (if it is, of course, is), reissue the card. Much worse if you are quietly, without attracting attention, for a long time being watched.    
    
       
 Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable information. Or not only: it seems that cybercriminals of the middle level are also starting to try to play cyber espionage. Researchers from the Chinese team 360 Netlab were able to identify at least ?500 Mikrotik routers that were hacked and transmitted traffic passing through them to the servers of cybercriminals (
 
Usually such a threat is actual for public persons, large companies - in general, in those cases when you own really valuable ...
+ 0 -

Acquaintance with SOCI - C ++ library of access to databases

Introduction
 
The library itself is still mature, - the first release on the githaba
 
dates back to 2004. I was surprised when Habr was searching for
 
He did not give me a single reference to articles in which
was mentioned.  
about this wonderful library.
 
SOCI
supports ORM , through the specialization type_conversion.
 
In
SOCI
there are backends for:
 
 
Firebird
 
MySQL
 
Oracle
 
PostgreSQL
 
SQLite
 
 
I will not translate the manuals or give here the code from the examples,
 
but I'll try to adapt (with a change in the structure of the table, and other simplifications)
 
code from ...
+ 0 -

Why not rent a VPS /VDS for 200 rubles or how to choose a virtual server

The article was prompted by a topic on forum.searchengines.guru , where often people try to find VPS cheaply, build and monitor millions of directories that are almost useless for users, except for their creators (and I'll explain why later), in order to find the cheapest offer, which is the biggest mistake in the case of a novice webmaster underestimating the possibility of hosting or overestimating the use a cheap virtual server in its case. The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? we ...
+ 0 -

Your copywriting sucks. Here's how to fix it

Hello, Habr! I present to your attention the translation of article "Your Copywriting Sucks." Here's How to Fix It » author Kristina Adams.
 
 
10 tricks to create a cool advertising text.
 
 
Copywriting is an important and interesting thing if you know how to do it right. In this article, you will find out what you need for this.

 
 
 
Your copywriting sucks. Here's how to fix it
 
Your Copywriting Sucks. Here's How to Fix It.
 
The author is Kristina Adams
 
Translation ...
+ 0 -

Identification of content profiles in VK

Bots to distinguish from people and the truth is complicated. I myself can not really do it myself. But I came up with a good bicycles
method, how to distinguish in VK "interesting people" from "not very interesting". In terms of network communication, of course, not in life.
 
Identification of content profiles in VK

 
VK put a restriction on the ability to download the contents of the walls of users , and slowly it hurts. Those. It is possible, but it is necessary to greatly refine, optimize and dodge to circumvent the restrictions.
 
 

The basic idea is


 
The main idea is that bots, dull (in the network plan) personality...[/h]
+ 0 -

We learn new programming languages, relying on already studied

Hello colleagues.
 
 
We learn new programming languages, relying on already studied  
 
Photo Jenny Marvin from the site Unsplash
 
 
Today we have prepared for you the translation of an article about the fundamental similarity of many programming languages, for example with Ruby and C #. We hope that the ideas of the respected Severin Peres will help many of you to start learning the new programming language as quickly as possible, and it will be sensible and enjoyable.
 
 
What does not take away from the programmer - he never stops learning. You can have a favorite language, or a framework, or a library, but you can be sure that you can not do them exclusively...
+ 0 -

We share our knowledge: Master's program, StudentTalks, online courses and other educational initiatives

The new school year is the time to learn. In this post we will share news about highload-magistracy in MAI, online courses and announce the launch of student IT-mitsupov Avito Student Talks (voting for interesting topics - at the end of the post).
 
 
We share our knowledge: Master's program, StudentTalks, online courses and other educational initiatives  
online course "Multithreading in iOS" , which over the summer scored ?788 students and dozens of reviews.
 
 
Here is what Lyosha tells about the course:
 
 
+ 0 -

Patterns of design in Kotlin

Patterns of design in Kotlin
 
It is said that "design patterns are bypasses of the disadvantages of a particular programming language". The funny thing is that it's said supporters of Lisp and Scheme , in which everything was in order in the languages.
 
But it seems that the developers of the language Kotlin took this statement really close to heart.
Decorator . This is a pattern that allows you to add a bit of functionality over some other class. Yes, IntelliJ can create it for you. But Kotlin went even further.
 
How about we get a message about this every time we add a new key to HashMap?
 
In the constructor, you define ...
+ 0 -

QIWI-terminals. How to take maximum of simple technology

QIWI-terminals. How to take maximum of simple technologyAt the beginning of 201? we, the software development team for QIWI Terminals, collected the wishes of the company's divisions - we learned which global tasks colleagues would like to solve with our help, so that life would become easier.
 
 
Most of all I was pleased with the request of the customer service, working with calls and claims from payers:
 
 
"There is a problem: the client makes payment on the terminal, but it does not reach the processing - or the terminal could hang, or the Internet working through the gsm-modem, fell off. And it turns out that the client has a check, but there ...
+ 0 -

In Russia, the National Coordination Center for Computer Incidents (NKCCI)

In Russia, the National Coordination Center for Computer Incidents (NKCCI)was created.  Order of the Director of the Federal Security Service of Russia Alexander Bortnikov created the National Coordination Center for Computer Incidents, which will be headed by the director, head of the Center for Information Protection and Special Communications of the Russian FSB.  on the order . Order of the Federal Security Service of the Russian Federation of ??? No. 366 "On the National Coordination Center for Computer Incidents" (Registered ??? No. 52109).   PDF-version order.  This is in addition to the centers of the State system for detection, prevention and elimination of the ...
+ 0 -