Waiting for the sixth, Winamp 5.8: the “mystery” of origin, the possibilities of the official version

 3r3144. 3r3-31. Like us already reported a couple of days ago , Radionomy, plans to complete the development of a new Winamp 6 in 2019. As a preliminary attempt at writing, the Radionomy team updated Winamp 5 to version 5.? for the first time since 201? which pleased many users and fans of this product. Under the cut a bit about the sudden appearance of an unofficial beta version in September and a small overview of the changes that affected the official version of Winamp 5.8.
 3r3144.
 3r3144. Waiting for the sixth, Winamp 5.8: the “mystery” of origin, the possibilities of the official version  3r3144. 3r311...
+ 0 -

Integration of 3CX with 1C: Trade Management - a method of combining configurations

Integration of 3CX with 1C: Trade Management - a method of combining configurationsIn 3r3147. previous article 3r3148. We reviewed the integration of 3CX v15.5 with a typical configuration of 1C Trade Management, edition 11 (???.167) for Russia. However, some experts in the comments expressed concern that disabling the compatibility mode of the 1C platform with the current version of the Trade management configuration could cause various problems for users. Although we did not receive any information about any problems, we prepared a second instruction describing the combination of configurations. 3r3145.  3r3154. 3r3145.  3r3154. So, at the moment we offer two ways to integrate ...
+ 0 -

Connecting the paging file (SWAP) in MAC OS X when using an external SSD-disk as a system

 
3r3-31. Good day, dear comrades!
 
 
I want to leave a very short message here in order for people who have a problem similar to mine not to spend too much time on its solution.
 
 
Once, I had to think about one small puzzle. There is an iMac computer, there is a successfully installed OS X Sierra on an external, USB-connected SSD-disk, and there is a strange, surprising, and at the same time - complete, lack of a paging file.
 
Answer on Toaster . And a hundred more pages read forums and blogs on the Internet.
 
 
sudo diskutil mount -mountPoint /private /var /vm `diskutil ap list | ...
+ 0 -

We play Mortal Kombat with TensorFlow.js

+ 0 -

Memo on the types of phishing

3r3633. My nephew and I decided to do our bit to counter phishing and prepared a memo. Distributed free of charge. You can download it and, having printed it, hang it in your office; post in social networks, add to booklet or book. 3r366. 3r361.  
3r3633. Here is a reminder:
3r361.  
3r3633. Memo on the types of phishing 3r366. 3r361.  
3r3633. And now, an explanation of why phishing is still relevant, and why it will remain so in the future. 3r366. here . 3r366. 3r373.
3r373.3r3633. My nephew and I decided to do our bit to counter phishing and prepared a memo. Distributed free of charge. You can download it and, having printed it, hang it in your office; post in social networks, add to booklet or book. 3r366. 3r361.  3r3633. Here is a reminder:3r361.  3r3633. 3r366. 3r361.  3r3633. And now, an explanation of why phishing is still relevant, and why it will remain so in the future. 3r366. here . 3r366. 3r373.3r373...
+ 0 -

Winamp is back - discussing whether he has a chance in the era of streaming services

Radionomy plans to release a new version of Winamp after a five-year hiatus. The player should become an aggregator of streaming services, podcasts and audiobooks.
 
 
We discuss what prospects are waiting for him.
 
 
Winamp is back - discussing whether he has a chance in the era of streaming services

 
3r3185. Photo Jarle Refsnes / CC [/i] 3r3113.
 
 
3r3r1616. The return of Winamp
 
The last update (if you do not take into account 3r3335. Version ???r3-3209.) Was released in 2013. But recently, Radionomy - in 2014 bought Winamp from AOL - announced Winamp 6.
 
 
It should be a universal platform for listening to music. In addition to tracks on the computer, users can listen ...
+ 0 -

Equifax: a year after the largest data breach

Equifax: a year after the largest data breach 
3r3-31. Hi, Habr! We all remember the leakage of personal data from Equifax databases (145.5 million customers). A year later, in August 201? the GAO (The United States Accounts Chamber (Eng. The Government Accountability Office, Abb. GAO) is an audit, appraisal, and analytical investigative body of the US Congress) 3–3–33. released the report “Actions Taken by Equifax and Federal Agencies in Response to the 2017 Breach”, you can read it here ( https://www.gao.gov/assets/700/694158.pdf ). I will only make excerpts that seemed interesting to me, and, I hope, will be interesting to readers.
 
Equifax -...
+ 0 -

Already not luggable pc, not yet notebook: Laptop TOSHIBA T3100 /20

 3r33333. 3r3-31. Hi, Habr! We continue to poking around in the old iron and survey it as best we can. 3r33351.  3r33333. Today we have a laptop from the era when this word was not synonymous with a laptop. 3r33351.  3r33333. 3r33351.  3r33333. Already not luggable pc, not yet notebook: Laptop TOSHIBA T3100 /20 3r33351.  3r33333. 3r33351.  3r33333. Helped me in transporting this unit someone deadelf and TomFarr. Thank them so much. 3r33351.  3r33333.
3r33351.  3r33333. The T3100 /20 is a variation of the T310? the difference is in the larger hard disk. 20mb versus 10mb in the original. 3r33351.  3r33333. 3r33351.  3r33333. ...
+ 0 -

Onkyo's ISCP /eISCP protocol: control of Onkyo devices over a

Onkyo's ISCP /eISCP protocol: control of Onkyo devices over anetwork.I am sure that many of Habr's readers know, or at least heard about, Onkyo audio equipment. Modern network players and A /V receivers have onboard Linux, as well as the possibility of wired /wireless connection to the network. The company Onkyo provides its proprietary mobile application for remote control of such a device - Onkyo Controller . There is practically no information about how this application works - there are crumbs on the forums, as well as several projects on github. 3r3-1089.  3r31096. 3r3-1089.  3r31096. 3r3103. 3r3-1089.  3r31096. Official information on the article ...
+ 0 -

MIT course "Security of computer systems". Lecture 13: "Network Protocols", part 3

MIT course "Security of computer systems". Lecture 13: "Network Protocols", part 3 3r33613. 3r3-31.

Massachusetts Institute of Technology. Lecture course # ???. "Security of computer systems." Nikolai Zeldovich, James Mykens. 2014

3r? 3593.  3r33613. Computer Systems Security is a course on the development and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and security methods based on the latest scientific work. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware protection and security in web applications. 3r? 3593.  3r33613. 3r? ...[/h]
+ 0 -