Release of the unofficial MTProto proxy in Python, features protocol

Release of the unofficial MTProto proxy in Python, features protocol

 
Recently, Telegram developers have laid out the source of a proxy server that uses the MTProto protocol. On the hub came out articles about features of its assembly and repackaging the container docker with it . The official proxy server, written in C, surprises with the amount of code - about 23 thousand lines. At the same time, and sometimes a little earlier, several alternative implementations came out, but none of them supported the possibility of advertising their channel.
 
 
In this article I would like to tell you about the little-known peculiarities of the proxy server communication ...
+ 0 -

Development of TELNET-server based on W5500 and ATMEGA8

Development of TELNET-server based on W5500 and ATMEGA8Recently, the hardware and software complex Arduino has become very popular, which is designed to develop various interesting electronic designs. The constructions are made by connecting the Arduino baseplate with additional necessary modules. On the Arduino baseboard is a microcontroller, the firmware for which is written in a special development environment for Arduino, using, as a rule, ready-made libraries for a particular module.
 
 
One of the modules - W5500 - is designed for the manufacture of electronic structures that will be connected to the Internet. In this case, most often, it means ...
+ 0 -

Creation of own network of self-made devices based on Arduino (Part 1)

Creation of own network of self-made devices based on Arduino (Part 1)Good afternoon, Khabravchans! Today I will tell you about the integration of Arduino from PC to Windows and other devices. It was already in 201? my Arduino boards of various models came to me at last.
 
 
I have long wanted to build a smart house, and decided to use this platform. Why? Well, I know quite well C # and a little C ++, and as you know, firmware for Arduino are written on the changed pluses. In addition, the platform has a digital-to-analog converter, which simplifies the work with analog sensors. In addition, the platform is very well known and has a large modular base.
 
 
For all ...
+ 0 -

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?

Cisco StealthWatch or classic corporate network protection (FW, IPS, ACL, NAC, AV, SIEM)?
 
 
The structure of almost any IB system includes traditional systems (individually or in combination):
 
 
• Firewall
 
• Intrusion Prevention System (IPS)
 
• Access control lists (ACL)
 
• Network Access Control System (NAC)
 
• Antivirus systems (Antivirus /Antimalware)
 
• Management systems of the IB event (SIEM)
 
 
All these systems are good both individually for solving their problems, and in complex. However, there are various classes of tasks to provide IS, which the system data can not solve, alas. Moreover, the traditional network perimeter, where traditional means of protection in the modern ...
+ 0 -

Installation of 3CX on hosting for ??? Euro /month. for 10 minutes

Installation of 3CX on hosting for ??? Euro /month. for 10 minutesPerhaps you know that at the moment, 3CX provides free hosting ATS For all new users on Google's cloud infrastructure for 1 year. However, for existing users of 3CX or those who want to use commercial hosting right away, in order not to "move" in the future, it makes sense to install ATS on an inexpensive virtual Linux machine in a reliable data center. The advantage of installing 3CX on your own virtual machine compared to the so-called. "Virtual PBX" is that you completely control both PBX services and confidential data - history and records of conversations.
 
 
3CX has done a lot of work ...
+ 0 -

Analysis of routing tables, or why the network engineer Python

Analysis of routing tables, or why the network engineer PythonHello Habr!
 
This is my first article on Habré, and she was born out of the question in one of the professional forums. The question looked, somewhat paraphrasing, as follows:
 
 
There is a set of text files containing output of routing tables from various network devices;
 
Each file contains information from one device;
 
Devices can have different output formats for the routing table;
 
It is necessary to output the path to an arbitrary subnet or IP address from each of the devices based on the available data on demand;
 
The output must include information on the record from the routing table ...
+ 0 -

Steganography in IP-packages

Once, before the protection of the regular laboratory work, I was asked: what fields of the IP package can I use for the stegano? I did not know and just shrugged. But soon I decided to study this question.
 
Under the hood you are waiting for the study of IP packet headers, your own ping utility in Python and several ways to transfer data without attracting attention.
 
Structure of the IP packet
 
Setting up the environment
 
Ping: Easy version of
 
Ping: Complicated version of
 
Improvements?
 
 
 
...
+ 0 -

Programming for network engineers: working with

Programming for network engineers: working withconfiguration.Even in a good network, in terms of design, from time to time, work is needed to update the configurations of certain entities. Among the most weighty and expected reasons for such activity, we can note migrations for harmonizing the physical and logical planes, the development of the network in the process of technological evolution, the harmonization of the architectures of the segments being joined and the solution of growth problems. In fact, the life cycle of the network, almost always represents a change with a certain level of risk and the impact on the service, in the evaluation of which ...
+ 0 -

A short instruction on setting up OpenVPN (for access to the resources of the organization)

A short instruction on setting up OpenVPN (for access to the resources of the organization)Hello. This instruction is intended for beginners and for those who are not ready to delve into the details and spend a long time in the console, but it is necessary to make protected remote access to work for certain employees of the company today, yesterday. A short instruction on setting up OpenVPN using the free distribution project www.nethserver.org .
 
www.nethserver.org , there is nothing complicated, the standard installation of Centos 7. You should pay attention to the address, static or dynamic with redundant address on the router, and of course the network interface on the ...
+ 0 -

Distributed data center from the provider: what and why

Distributed data center from the provider: what and whyOver the decades of its existence, data centers have come a long way from small computer rooms to data centers, data centers, cloud and distributed data centers. What is the purpose of distributed data centers? All known Cisco Systems distinguishes the following goals of their creation:
 
 
 
Catastrophic resistance
 
Continuity of data processing
 
Mobility of applications
 
Migration of systems
 
Capacity /capacity expansion
 
Distributed services
 
Geographically-localized services
 
 
Medium-sized organizations often have a fairly centralized model, where all data, services and applications ...
+ 0 -