Almost OCR for getting the VPNBook password. PHP + Mikrotik

Recently VPNBook began to publish the password instead of direct text in the form of an image. "Well, it's like that," I thought, and began to look for ways to solve this problem. Recognize the "picture" VPNBook password in PHP. And, of course, the script for Mikrotik.
 
Customize the automatic obtaining of a password for VPN on Mikrotik ". Prior to the problem, the password for VPNBook could simply be extracted from the html page, for example, as:
 
 
preg_match ('/Password:
([^<]+) /', $ homepage, $ matches);
print ($ matches[1])

 
And recently the password has become a "picture". And ...
+ 0 -

6. Check Point to the maximum. IPS. Part 2

6. Check Point to the maximum. IPS. Part 2  
 
Welcome to the 6th lesson and we continue the IPS theme. Previous lesson was completely devoted to delusions on the IPS account, and we also briefly reviewed the history of the formation of intrusion prevention systems. Strongly recommend to see 5th lesson , before starting this one. This will allow us to penetrate more deeply into the problems of the question. This lesson is already fully devoted to the practical part. For various attacks, we will use the distribution. Kali-Linux with tools such as OpenVAS , Metasploit and Social Engineering ...
+ 0 -

From Germany with love: the pioneer of IP-telephony comes to Russia

From Germany with love: the pioneer of IP-telephony comes to Russia

 
Interesting news: the company Snom Technologies GmbH, which in 2001 released the very first IP-phone in the world, intends to seriously settle in the Russian market. So it turned out that despite the fact that Snom is very widely represented in Europe, the US and the Middle East, we know little about the products of this company. So to speak, neither Snom nor spirit.
 
numerous awards and regalia . The company's successes are regularly celebrated by industry experts. In 2000 CeBIT Snom won the "Best of Show" prize, and since 2003 the company's products are stably present in the TOP-100 ...
+ 0 -

Robot Cars: Platooning and Bavarian sausages

Robot Cars: Platooning and Bavarian sausages
 
Sure, you've heard of Bavarian sausages.
 
 
So - you can safely forget about them. Well, there is no such thing in the real life of the Free State of Bavaria ( , That's exactly what this southern region officially calls )
 
 
What to eat are numerous kinds of sausages /sausages /ham. And some of them are fried, others are soaring, others are cooked - and something even is used in the form of raw pork minced, mixed with finely chopped onions and black pepper, and then smeared on bread. In general, everyone will find that he is pleased - and no one will leave offended, especially after a liter mug ...
+ 0 -

Features of switch configuration ExtremeXOS

This article is designed to reduce the amount of time necessary to understand the principles of working with
ExtremeXOS (XOS)
. When I started to get acquainted with XOS, I really missed such an article on Habr.
 
Below I will talk about the configuration of Extreme and the problems I have encountered. I hope that it will help network engineers who are just starting to work with XOS. Regardless of the switch model, the CLI syntax is exactly the same.
 
 
 
Features of switch configuration ExtremeXOS
 
Switch stand Extreme
Eve-Ng and the image of Virtual ExtremeOS ( .xos ...
+ 0 -

Laser ablation, tellurite glass and dopant Er2O3

Laser ablation, tellurite glass and dopant Er2O3  
 
In any system, no matter how complex it was, from how many working elements would not be, it is almost always possible to single out one fundamentally important detail. So in modern communication systems, the basis of the bases is often optical fibers, which allow data to be transmitted over long distances and at high speed. And all would be nothing, if not for the slogan of some scientists - "the world in a thimble". There is nothing wrong with the desire to minimize the size of a device, but the mini version should not be inferior to the original in performance, but may even exceed it.
 
 
To transmit ...
+ 0 -

Traffic balancing between Web servers using IP CEF on network equipment

The task was to implement a fault-tolerant solution for two web servers and, if possible, implement load balancing between web servers, since sometimes one database could not cope with all requests. To buy special equipment was not possible, in connection with which the following scheme was invented. Perhaps the idea is unoriginal, but on the Internet nothing like this is found. The topology is like this:
 
 
Traffic balancing between Web servers using IP CEF on network equipment here . Other vendors may have certain nuances. In Cisco, the distribution ...
+ 0 -

New 3CX clients for Android and iOS with OPUS and PUSH codec for several

New 3CX clients for Android and iOS with OPUS and PUSH codec for severaldevices.Last week we introduced the updated 3CX clients for Android and iOS . Developers try to make the user's work with the mobile VoIP client as comfortable as possible, and, at the same time, add features, most in demand by users .  The main innovation in mobile clients is the addition of the OPUS voice codec, the advantages of which we will discuss below. The second refinement is the ability to register an extension from several mobile devices and deliver PUSH call notifications to each device in parallel. Also, the reliability of delivery of PUSH notifications to devices is significantly ...
+ 0 -

A new variant of the Specter attack with the possibility of remote data acquisition via the

A new variant of the Specter attack with the possibility of remote data acquisition via thenetwork was discovered. Earlier this year, the types of attacks were already shown. Specter and Meltdown . They allow you to attack the victim with minimal use of resources. A specially crafted jаvascript can be used to perform a Specter attack. Cloud services, as far as could be understood, are safe - both types of attacks are applicable only to penetration of discrete network resources.  Now appeared information about a new type of attack. It was provided by researchers from Graz University of Technology named after Karl and Franz. In the disclosure of a new type of attack, the expert on cyber security ...
+ 0 -

Password reset on Cisco ASA without downtime for active /standby failover scheme

Recently I encountered a problem: the client has two Cisco ASA 5512-x, which work in the active /standby mode. The client forgot to update the passwords and all users have expired password. ASA when trying to log in just reports the expiry date and does not give the chance to change the password. Since the expiration date has expired for all users, it was not possible to connect and change the password in any way. It has always been an iron variant to reset the password by changing the register, but there's no getting around without downtime. This option was not suitable. It was decided to use ...
+ +1 -