MC.exe (Message compiler), rc.exe, link.exe to generate .dll for EventMessageFile

Good afternoon, dear readers of Habr. This post is a guide for creating a dynamic .dll library, which contains the messages necessary for displaying in a custom logger, which is located in the Windows Event Viewer Application and Services Logs, yy (as an example). 3r3147.  3r3154. 3r3147.  3r3154. MC.exe (Message compiler), rc.exe, link.exe to generate .dll for EventMessageFile 3r3147.  3r3154. 3r311.
3r3147.  3r3154. In the custom log you can often see messages, the description of which contains:
 3r3154. 3r3147.  3r3154. 3r3147.  3r3154. 3r3147.  3r3154. This means that the source of the events yyyy does ...
+ 0 -

Import substitution, fairy tales continue (continued)

Import substitution, fairy tales continue (continued)Having a little continued the study of the issue of "import substitution" on the basis of newly appeared information (tests, search for a solution), I came to the disappointing conclusion that earlier I was an optimist. In reality, things are much worse (in general, like in a fairy tale) than further, the worse. According to the comments of colleagues commenting on the first article 3–3–34. "Import substitution, the voice crying in the wilderness" 3r-3345. I cite references to regulatory documents calling us to “Patriotism”. The number of documents is growing, but there is only one problem, or ...
+ 0 -

 [Bug bounty | mail.ru]Access to the admin panel of the partner site and the disclosure of data of 2 million users

 [Bug bounty | mail.ru]Access to the admin panel of the partner site and the disclosure of data of 2 million users  
 
Relatively recently, I switched from searching for vulnerabilities on random sites to Bug Bounty sites, and for many such a choice seems obvious - in such programs, a researcher in 90% of cases will receive not only good experience, but also a guaranteed reward for valid vulnerability, while random site can stumble upon misunderstanding and threat. Actually, in order to gain reputation and “acceleration” on the largest Bug Bounty - HackerOne, it was decided to focus on finding vulnerabilities on one of the major bugbounty programs - mail.ru.
 
 
This article will deal with several bugs at mail.ru itself...
+ 0 -

BDSM, Gore and the harassment of the developer Drupal

 3r3172. 3r3-31.
I apologize for the yellow title, but in this case it really reflects the essence of the matter. A year ago, a blatant incident occurred in the Drupal developer community, which on Habr and even on the Russian Internet passed somewhat unnoticed. In context recent unrest around Linus and Linux, it makes sense to recall those events. 3r3146. 3r3147.  3r3172. 3r3145. 3r3138. The cover of the 23rd book is “Renegades of Gor” in the saga of The Chronicles of Mountain.
3r3147.  3r3172. BDSM, Gore and the harassment of the developer Drupal 3r3146. 3r3147...
+ 0 -

Google is still going to launch a search service censored in China

Google is still going to launch a search service censored in China  3r366.
 3r366. Google has been operating in China for quite a while. Over the course of several years, everything happened — for example, 3r339. conflicts
with the leadership of the country. The fact is that Chinese law prohibits search engines operating in the country from displaying queries on a number of keywords. Previously, Google refused r3r322. comply with the requirements for the introduction of censorship in the Chinese version of the service.
 3r366.
 3r366. But now, it seems, something has changed. Recently it was reported that the company will still launch a “special version” of the search ..
.
+ 0 -

How to achieve the first positions in SEO-delivery in all cities of Russia in all products and categories?

How to achieve the first positions in SEO-delivery in all cities of Russia in all products and categories? 3r3167. 3r3-31. We use the technology of geo-binding of goods to specific cities of Russia. Practical experience and mechanics of implementation.
 3r3167.
 3r3167. 3r3333. Task: [/i]
 3r3167.
 3r3167. A year ago, we were approached by a client who sells cash and trade equipment. He set the task - to bring the site to the TOP for all products and categories throughout Russia.
 3r3167.
 3r3167. 3r3333. What results have been achieved? 3r3334.
 3r3167.
 3r3167. On April ? 201? we launched geotechnology. Here is how the traffic from the regions from February 1 to August 31 looks like. Moscow was removed ...
+ 0 -

Monetization of user data vs Advertising in the application: pros and cons

In 201? the market for mobile applications continued to grow, not only thanks to users who do not release the phone from the hands of 24/? but also thanks to advertisers who have picked on advertising inside applications. Since the audience engagement here is incomparably higher, the cost of displaying advertising in applications has increased, leading to 3r334. evolution of ways to monetize free
applications. 3r33333.  
65% of developers prefer advertising to other monetization models 3r33312. . 3r33333.  
3r33333.  
Monetization of user data vs Advertising in the application: pros and cons ..
.
+ 0 -

Signing a PDF on JS and inserting a signature on C # using Krypto PRO

 3r33434. 3r3-31. So. The task came. Using a browser, invite the user to sign a PDF with an electronic signature (hereinafter referred to as ES) The user must have a token containing a certificate, public and private key. Next on the server you need to insert a signature in the PDF document. After that, you need to check the signature for validity. We use ASP.NET and C # as the back-end.
 3r33434.
 3r33434. All salt in that it is necessary to use the signature in the CAdES-X Long Type 1 format, and the Russian GOST R ???-200? GOST R ???-201? etc. In addition, there can be more than one signatures...
+ 0 -

What promotions are clothing stores luring customers to

What promotions are clothing stores luring customers to 3r3204.  
3r3204.  
Marketing campaigns are an integral part of the life of any clothing store. Seasonal sales, special conditions, discounts on sets of goods - all this must be done, otherwise buyers will go to competitors. We list the main promotions that make fashion-retailers lure us to stores. Wrote here ) However, it is important to consider a number of points, limiting: 3r3204.  
3r3204.  
3r3176.  
3r3178. benefit from the purchase amount not more than a certain percentage; 3r3179.  
3r3181. 3r3204.  
3r3176.  
3r3178. the number of coupons affecting the total amount (for example, one check ...
+ 0 -

Under the hood, Graveyard Keeper: How to implement graphic effects

 3r33333. 3r3-31. Hello! As much as 4 years I did not write on Habr. My last series of posts It was about various tools and techniques that we used on our last game (developing it on Unity). Since then, the game that we have safely released, and also released a new one. So now you can breathe a little and write a few new articles that may be useful to someone.
 3r33333.
 3r33333. Under the hood, Graveyard Keeper: How to implement graphic effects  3r33333.
 3r33333. Today I want to talk about graphic techniques and tricks that we used to create the image that you see in the gif above.
 3r33333.
 3r33333. We are very sensitive to the visuals of our games and for this ...
+ 0 -