Conference DEFCON 18. Troll reverse engineering with the help of mathematics

Trolling with math is what I'm going to talk about. This is not some kind of fashionable hacker stuff, rather, it’s an artistic expression, a funny, intelligent technology so that people would consider you a jerk. Now I will check if my report is ready for display on the screen. It seems everything is going fine, so I can introduce myself. 3r37474.  3r33490. 3r37474.  3r33490. Conference DEFCON 18. Troll reverse engineering with the help of mathematics
3r37474.  3r33490. 3r37474.  3r33490. My name is Frank Tu, it is written frank ^ 2 and @franksquared on Twitter, because Twitter also has some kind of spammer called "frank 2". I tried to apply social engineering to them so that they ...
+ 0 -

Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider

 3r3304. 3r3-31. Today we have collected 17 articles on the security of personal data (PD), new technologies in data centers and the "internal kitchen" 3r-32r. 1cloud
. From these materials, you will learn why a data center has a GPS firewall, how to work with PDs in a public cloud, and how to cool servers with hot water.
 3r3304.
 3r3304. Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider 3r311.
 3r3304. 3r3197. 3r3198. /Flickr /3r317. Dennis van Zuijlekom
/ CC BY-SA [/i]
 3r3304.
 3r3304. 3r3178. How to handle personal data
 3r3304.
 3r3304.
3r3334. [b] What is the essence of the ...
+ 0 -

Framework: analysis of DLT-systems

 3r3611. 3r3-31. This paper aims to determine whether the object being analyzed is a DLT system. The results obtained are well suited for a comparative analysis of different projects, ranging from the management structure, to the definition of references to which transactions refer. 3r3-3597.  3r3611. 3r3-3597.  3r3611. Framework: analysis of DLT-systems
3r3-3597.  3r3611. 3r3-3597.  3r3611. 3r33575. 3r33586. Technical analysis 3r33587. 3r33576. 3r3-3597.  3r3611. 3r33575. 3r33547. The protocol level is 3r33548. 3r33576. 3r3-3597.  3r3611. 3r33575. Genesis 3r33576. 3r3-3597.  3r3611. 3r3-3597.  3r3611. The protocol level refers to the processes ...
+ 0 -

OpenVPN with Extended Authentication and Authorization

 3r33984. 3r3-31. The article discusses the configuration of OpenVPN with additional features:
 3r33984.
 3r33984.
 3r33984.
certificates on tokens for primary authentication (for example, Rutoken) 3r-3243.  3r33984.
LDAP backend for secondary authentication (for example, ActiveDirectory) 3r-3243.  3r33984.
Filtering internal resources available to the userx (via iptables)
 3r33984.
 3r33984. The configuration of clients under Linux, Windows and MacOS is also described.
 3r33984. Nyr /openvpn-install , run as root.
 3r33984.
 3r33984. 3r33966. 3r3393939. git clone https://github.com/Nyr/openvpn-install.git
cd ...
+ 0 -

As we were repairing a corrupted .wav file

As we were repairing a corrupted .wav file 
3r3-31. 3r3142. It was an interesting experience when a .wav file was restored with a friend. I decided to describe our tormenting process, suddenly someone will come in handy. 3r3143. 3r33140.  
Prehistory
3r33140.  
3r3142. There are sad stories when a voice recorder hangs /or gives an error when saving a file. Therefore, when we try to open a damaged file, we get errors like: unable to decode format 3r3r166. , Incorrect format. or The program did not recognize the file format 3r3166. .
3r3143. 3r33140.  
Trying to figure out
3r33140.  
3r3142. Since we did not manage to open the ...
+ 0 -

Docker Remote API with certificate authentication with revocation checking

Problem Description
 
For the needs of remote control of Docker, Docker can provide web API.
 
This API can either not require authentication at all (which is highly discouraged), or use certificate authentication.
 
The problem is that native certificate authentication does not provide for certificate revocation checking. And this can have serious consequences.
 
I want to tell how I solved this problem.
3r318.
 
Solution of the problem 3r3203.
 
First you need to say what to say, I will be about Docker for Windows. Maybe Linux is not so bad, but now is not about that.
 
What we have? We have ...
.NET / C# / DevOps
+ 0 -

User experience on 5G NR networks, expected under real conditions

 3r3197. 3r3-31. User experience on 5G NR networks, expected under real conditions
3r3184.  3r3197. 3r3184.  3r3197. 3r3178. Test download speeds on 5G NR networks in the range up to 6 GHz in Tokyo
3r3184.  3r3197. The 5G NR SA macro network segment model in Tokyo included 20 new 5G NR base stations, which were located on the same sites as the existing LTE cells. The 5G NR network model in Tokyo operated in the 100 MHz band at 3.5 GHz and the Gigabit LTE TDD core network in three LTE spectrum bands (3 × 20 MHz) (in Figure 1). The distribution between base stations and devices was modeled on the basis of high-resolution 3D maps of Tokyo, taking into account possible losses ...
+ 0 -

Oracle Bitmap Index Techniques

Oracle Bitmap Index Techniques 3r3196. 3r3-31. And again, good evening! 3r3181.  3r3196. 3r3181.  3r3196. We start the second stream of our new course 3r336. "Relational DBMS" 3r3184. which we did a little bit after the first run: additional classes on MySQL and Postgres clusters, docker was in demand, and various “file improvements”. So wait for open lessons (in which part of old topics have been carried out) and interesting materials. Today we delve into the techniques of Oracle. 3r3181.  3r3196. 3r3181.  3r3196. Go. 3r3181.  3r3196. 3r3181.  3r3196. Oracle Bitmap indices are very different from standard B-tree indices. In ...
+ 0 -

Quick setup of storage Aerodisk Engine

Quick setup of storage Aerodisk Engine . Also, the guys got their YouTube 3r3159. channel with training videos for setting up and working with the system. And even before the new year, Aerodisk launched 3r3133. promo program in which you can buy storage at a discount of up to 60%! The offer, in our opinion, is excellent. 3r33333.  3r33333. 3r33333.  3r33333. This time Aerodisk provided us with the ENGINE N2 storage system in All-flash configuration for self-study and configuration, and we will share this experience. 3r33333.  3r33333. In the framework of our acquaintance with ENGINE, we will make a cycle of 3 articles:
 3r33333. 3r33333...
+ 0 -

Exploit Wednesday December 2018: for tests of time patches to spare - drove

Yesterday, on Tuesday, at about 10 p.m. Moscow, Microsoft rolled out patches for new vulnerabilities, thereby giving a start to the monthly race between security administrators and intruders. While the former are checking whether the installation of updates of critical business servers will drop into a blue screen, the latter will disassemble the code of the updated libraries and try to create working exploits for still vulnerable systems.
 3r3355.
 3r3355. For lovers of details - a short reference to the new vulnerabilities under the cut.
 3r3355.
 3r3355. Exploit Wednesday December 2018: for tests of time patches to spare - drove
 3r3355. ...
+ 0 -