The experience of blocking Internet advertising in a local network company

The experience of blocking Internet advertising in a local network companyHello, Khabarovsk citizens! Having received from the management the task to block employees from advertising on Internet sites, I decided to approach the process creatively: to understand how one or another advertisement is technically broadcast, what types of locking exist, their pros and cons. I also give an example of the implementation of the lock at the gateway level, using Traffic Inspector Next Generation, as well as the use of the options for blocking advertisements in Kaspersky Internet Security (KIS) and browser applications AdBlock and Adblock Plus for these purposes. The article will ...
+ 0 -

The Russian program for the creation of a global satellite Internet network can lose a single investor

The Russian program for the creation of a global satellite Internet network can lose a single investor  
 
In May this year, Habr was published news about the domestic project to create a global satellite Internet network. The authors of the project believe that the global satellite network will provide a continuous channel for unmanned vehicles, the Internet of things and secure data transmission.
 
 
The name of the project is "Sphere", and its approximate cost is 300 billion rubles, as previously reported by the deputy director general for strategic development and innovation of the RKS company, Yevgeny Nesterov. This is one of the most ambitious projects of the national program "Digital Economy"...
+ 0 -

We collect NetFlow cheaply and angrily

We collect NetFlow cheaply and angrilyTL; DR
: the author assembled the collector NetFlow /sFlow from GoFlow , Kafka , ClickHouse , Grafana and crutches on Go.
come to the rescue. NetFlow / IPFIX and sFlow which generate rich traffic information directly from network equipment. It remains to put it somewhere and somehow process it.
 
From the available NetFlow collectors, the following were considered:
 
 
flow-tools - did not like the storage in the files (long to make selections, especially operational ones in the process of reaction to the incident) or MySQL (having a table of billions of lines ...
+ 0 -

Variants of application or what the load balancers do not have

Variants of application or what the load balancers do not haveA couple of years ago I completed the migration project in the network of one of our clients, the task was to change the platform that distributes the load between the servers. The scheme for providing this client's services evolved over almost 10 years, together with new developments in the data center industry, so the customer was expecting a solution that would satisfy not only the failover requirements of network equipment, load balancers and servers, in a good sense of the word , but also would have such properties as scalability, flexibility, mobility and simplicity. In this article, I will ...
+ 0 -

Clever. Merry. Our. Get acquainted with MTC WikiTech

Of course you know what IMS, NB and SDN are. We decided to tell about it for those who do not know yet, and made a video about modern technologies in the telecom in a format understandable even for schoolchildren. Let's start with the main thing - frequencies.
 
 

 
The focus group clearly demonstrated that even the subjects of the humanities are not falling asleep during the viewing. Furthermore! After the third video, they began to use English-speaking abbreviations in conversations, often incomprehensible even to colleagues from the technical unit. In general, we are waiting for your suggestions ...
+ 0 -

How to bypass SMS identification when connecting to public Wi-Fi networks?

In 201? RF Government Decree No. 758 No. 80? which obliges owners of public WiFi networks to set up routers, identifies users via passport data, sms or state portal. services. Unwillingness of cafe owners to spend for Captive portal 's contributed to some providers in the distribution of their access points with paid SMS-authorization. I had a desire to check whether such a sms-authorization can be bypassed.
 
 
How to bypass SMS identification when connecting to public Wi-Fi networks?
 
here .
 
 
sudo -s # will work with super user rights
ifconfig # look at the name of the adapter that we want to use

 
We get the conclusion:
 
 
+ 0 -

Traffic generation in the user's area

Traffic generation in the user's area
 
Generate traffic through MoonGen + DPDK + Lua in the artist's presentation
 
 
Neutralization of DDoS-attacks in real conditions requires preliminary testing and testing of various techniques. Network equipment and software should be tested in artificial conditions close to real ones - with intensive traffic flows simulating attacks. Without such experiments, it is extremely difficult to obtain reliable information about the specific features and limitations of any complex instrument.
 
 
In this material, we will uncover some of the traffic generation methods used in Qrator Labs.
 
 
WARNING ...
+ 0 -

Overview of SIP-phones Digium A20 and A25

Overview of SIP-phones Digium A20 and A25
 
In February 201? Digium, the developer of the open-source project Asterisk, introduced A series phones designed to work specifically with Asterisk. Even strange that for so many years Digium has refrained from producing under its brand of conventional SIP-phones. And in August 201? Digium announced a merger with Sangoma, a leading manufacturer of equipment for Asterisk. Coincidence? Hardly, of course.
 
The line of phones of a series And has turned out, in my opinion, quite competitive, with the fishechkami. The series for the current moment includes four models - A2? A2? A2? A30. Let's take a closer look ...
+ 0 -

Google wants to kill the URL

Google wants to kill the URL  
 
In early September, the browser Google Chrome turned 10 years old, and in his short life he introduced a lot of radical changes to the web. The security department of Chrome likes to fight with big and conceptual problems, from the popularization of automatic updates to the aggressive promotion of HTTPS-encryption. Such influence and such scope can lead to the separation of opinions; and while Chrome plans its work for the next ten years, the team ponders the most debatable initiative of all: fundamentally change the work of URLs throughout the entire web.
 
 
A Uniform Resource Locator (URL) is a familiar ...
+ 0 -