Conference DEFCON 18. Troll reverse engineering with the help of mathematics

Trolling with math is what I'm going to talk about. This is not some kind of fashionable hacker stuff, rather, it’s an artistic expression, a funny, intelligent technology so that people would consider you a jerk. Now I will check if my report is ready for display on the screen. It seems everything is going fine, so I can introduce myself. 3r37474.  3r33490. 3r37474.  3r33490. Conference DEFCON 18. Troll reverse engineering with the help of mathematics
3r37474.  3r33490. 3r37474.  3r33490. My name is Frank Tu, it is written frank ^ 2 and @franksquared on Twitter, because Twitter also has some kind of spammer called "frank 2". I tried to apply social engineering to them so that they ...
+ 0 -

Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider

 3r3304. 3r3-31. Today we have collected 17 articles on the security of personal data (PD), new technologies in data centers and the "internal kitchen" 3r-32r. 1cloud
. From these materials, you will learn why a data center has a GPS firewall, how to work with PDs in a public cloud, and how to cool servers with hot water.
 3r3304.
 3r3304. Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider 3r311.
 3r3304. 3r3197. 3r3198. /Flickr /3r317. Dennis van Zuijlekom
/ CC BY-SA [/i]
 3r3304.
 3r3304. 3r3178. How to handle personal data
 3r3304.
 3r3304.
3r3334. [b] What is the essence of the ...
+ 0 -

Exploit Wednesday December 2018: for tests of time patches to spare - drove

Yesterday, on Tuesday, at about 10 p.m. Moscow, Microsoft rolled out patches for new vulnerabilities, thereby giving a start to the monthly race between security administrators and intruders. While the former are checking whether the installation of updates of critical business servers will drop into a blue screen, the latter will disassemble the code of the updated libraries and try to create working exploits for still vulnerable systems.
 3r3355.
 3r3355. For lovers of details - a short reference to the new vulnerabilities under the cut.
 3r3355.
 3r3355. Exploit Wednesday December 2018: for tests of time patches to spare - drove
 3r3355. ...
+ 0 -

9 circles warehouse automation Lamoda

9 circles warehouse automation Lamoda 
3r3-31. Our warehouse is about the size of two Red Squares and is 5 floors high and works all year round and never sleeps - 24/?364 days a year (the only day off is January 1). We have stored and maintained more than ?00?000 products, every day there are more than 300 operators replacing them. They work with goods coming from all over the world, and collect orders for users from four countries: Russia, Ukraine, Belarus and Kazakhstan. On such a scale, business requires flawless automation. 3r33300.  
3r33300.  
Under the cut, I, Pasha Finkelstein - team leader of the development and automation ...
+ 0 -

Check Point for Check Point Security Settings

Check Point for Check Point Security Settings  
 
Relatively recently, we published an open-access mini-course "3r3-39. Check Point for a maximum of 3r3-3209.". There we tried briefly and with examples to consider the most frequent errors in the Check Point configuration from the point of view of information security. In fact, we told you what the default settings are bad for and how to tighten the screws. The course (unexpectedly for us) received pretty good reviews. After that, we received several requests for a brief “squeeze” of this material - 3r3144. security checklist [/b] . We decided that this is a good idea, and therefore we publish this ...
+ 0 -

Implementing SSD caching in a QSAN XCubeSAN

Implementing SSD caching in a QSAN XCubeSANstorage system. 3r3-3596. 3r3-31. 3r33570. Productivity technologies based on the use of SSD and widely used in storage systems, have long been invented. First of all, it is the use of SSD as storage space, which is 100% efficient, but expensive. Therefore, in the course are the technology of tiring and caching, where SSD are used only for the most popular ("hot") data. Tiring is good for long-term (day-to-week) use scenarios. And caching, on the contrary, for short-term (minutes-hours) use. Both of these options are implemented in storage 3r3-3582. QSAN XCubeSAN. In this article we will consider the implementation ...
+ 0 -

Yandex opens the Cloud. The architecture of the new

Yandex opens the Cloud. The architecture of the newplatform. 3r33180. 3r3-31.  3r33180. 3r33180. Today Yandex.Oblako 3r3r1616 became available. all Now, any user can go to Cloud and deploy the resources he needs, gaining access to Yandex technologies. For example, to machine translation and speech recognition and synthesis. 3r33180. 3r33180. Today I want to introduce you to Yandex. Cloud and tell you how it works inside. Under the cut you will learn a little about the history, team and architecture of our platform. 3r33180. 3r33180.3r3168.A bit of history 3r3158. 3r33180. Despite the fact that the Yandex cloud platform was first publicly shown not so ...
+ 0 -

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 2

Conference DEFCON 18. You have spent all this money, but you continue to “have”. Part 1
 3r33395.
 3r33395. I use the interesting thing by Gary O’Leary-Steele, called Unicod-fun, which is pretty good for a utility written in Ruby. You know that my tools should be written exclusively in Python, so we translated it to Python. Now we can use different encoding for tools that are designed to attack web applications and are part of the WAF framework.
 3r33395.
 3r33395. 3r314.
 3r33395.
 3r33395. The WAF framework includes WAF Fun and WAFWOOF and operates on the basis of multi-coding and proxy information...
+ 0 -

mRemoteNG again cake

 3r3197. 3r3-31. mRemoteNG again cake If you are the administrator of several dozen Windows and Linux servers, packs of switches and routers, then without a remote connection manager you can quickly and safely go crazy. 3r3182.  3r3197. 3r3182.  3r3197. 3r3174. TL; DR 3r3-33175. . mRemote, the development of which was abandoned long ago, has gained a new life. If you use RDCMan or Remote Desktop free from Devolutions - try mRemoteNG! 3r3182.  3r3197. 3r311. 3r3185. 3r3182.  3r3197. 3r3174. mRemote [/b] - In the past, a very popular remote connection manager. Unfortunately, its development was abandoned around 2009. Flaws in the interface...
+ 0 -

Centralized bus vs Service Mesh: how to turn mitp into a battle

When we decided that it would be boring to hold the next meeting, we decided to turn it into something more up-to-date. Namely in a duel, in fight between two integration approaches — ESB and Distributed — whose honor was defended by heavyweight experts. In this post we will tell you how the battle went and find out the winner.
 
 
Centralized bus vs Service Mesh: how to turn mitp into a battle  
Alexander Trekhlebov , our corporate architect. For decentralization - Andrei Trushkin, head of the center for innovations and promising technologies at Promsvyazbank. In turn, they made reports on their technologies and answered various questions, provocative and ...
+ 0 -