Almost OCR for getting the VPNBook password. PHP + Mikrotik

Recently VPNBook began to publish the password instead of direct text in the form of an image. "Well, it's like that," I thought, and began to look for ways to solve this problem. Recognize the "picture" VPNBook password in PHP. And, of course, the script for Mikrotik.
 
Customize the automatic obtaining of a password for VPN on Mikrotik ". Prior to the problem, the password for VPNBook could simply be extracted from the html page, for example, as:
 
 
preg_match ('/Password:
([^<]+) /', $ homepage, $ matches);
print ($ matches[1])

 
And recently the password has become a "picture". And ...
+ 0 -

HPE webinars in August-October

A new series of HPE webinars has arrived, and there are a lot of interesting topics in it: arm processors in high-performance computing, acceleration of calculations with Intel Optane, building Wi-Fi in extreme conditions, HPE Lanamark utility for reviewing the state of IT infrastructure, various services for data centers. See the full list and register:
 
HPE webinars in August-October  
The arm processor in HPC. We dismantle HPE Apollo 70 - August 29
 
HPE Apollo 70 - the first corporate HPC platform based on arm processors from HPE. What for? What is inside? What's outside? What's around? Understand the points.
 
 
...
+ 0 -

GitHub opened the code of its load balancer - how their solution works

Developers from GitHub last week laid out in the open source source of its load balancer - GLB Director. The team has been working on this project for several years.
 
 
What is remarkable about their solution, how it is arranged, and who else passed the load balancing systems to open source, we tell further.
 
 
GitHub opened the code of its load balancer - how their solution works

 
/Flickr / theilr / CC
 
 

Why GitHub its balancer


 
In GitHub use the cloud infrastructure based on bare metal to ...[/h]
+ 0 -

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space mission

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space missionSomeone likes to go to the movies, someone likes to go to clubs, someone likes to go to museums - and I've long dreamed of walking around data centers, looking at everything with my own eyes, chatting with those who work there. But to organize all this seemed unreal. Fortunately, a certain recognizability, which earned poiskvps.ru for these years, and which now, sometimes, surprises me - simplified the most difficult: acquaintance. So for the last two months I visited two data centers. What I saw interesting in St. Petersburg, I still plan to write later. And today I will tell you how I saw ...
+ 0 -

Translation of the third day Slurm: Intensivy on Cubernetes

Soon begins the third and final day of Slurm.
 
Those who do not sleep on Sunday morning, are dedicated.
 
Today, the program is shortened, because the second half of the day is occupied with practical exercises and summing up that we do not broadcast.
 
Theme of the day is
 
9: 00-11: 00 CI /CD, building a de-cluster into a cluster from the ground
 
Installation and configuration of Gitlab
 
Setting up and running the registry on the example of Gitlab
 
Building a CI /CD solution
 
Link to the broadcast: Yutoub Soon begins the third and final day of Slurm. Those who do not sleep on Sunday morning, are dedicated. Today, the program is shortened, because the second half of the day is occupied with practical exercises and summing up that we do not broadcast. Theme of the day is 9: 00-11: 00 CI /CD, building a de-cluster into a cluster from the ground Installation and configuration of Gitlab Setting up and running the registry on the example of Gitlab Building a CI /CD solution Link to the broadcast: Yutoub ...
+ 0 -

Translation of the second day of Slurm: Intensivy on Cubernetes

Soon begins the second day of Slurm.
 
Themes of the day
 
9: 00-11: 00
Ceph, cluster configuration and work features in production
 
The device ceph
 
Cluster installation
 
Creating users, setting up secrets, connecting RBD to
feeds.
 
11: 00-15: 00
Pause
 
15: 00-16: 15
Introduction to Helm. The analysis of the chart on the example stable /* - 1 hour
 
17:30
Cluster trawlschuting, what problems and how we solved, pitfalls
 
The event is alive. The schedule can float.
 
Link to the broadcast:
 
https://www.youtube.com/watch?v=UB4dDrnKB_Y Soon begins the second day of Slurm. Themes of the day 9: 00-11: 00Ceph, cluster configuration and work features in production The device ceph Cluster installation Creating users, setting up secrets, connecting RBD tofeeds. 11: 00-15: 00Pause 15: 00-16: 15Introduction to Helm. The analysis of the chart on the example stable /* - 1 hour 17:30Cluster trawlschuting, what problems and how we solved, pitfalls The event is alive. The schedule can float. Link to the broadcast:  https://www.youtube.com/watch?v=UB4dDrnKB_Y ...
+ 0 -

Traffic balancing between Web servers using IP CEF on network equipment

The task was to implement a fault-tolerant solution for two web servers and, if possible, implement load balancing between web servers, since sometimes one database could not cope with all requests. To buy special equipment was not possible, in connection with which the following scheme was invented. Perhaps the idea is unoriginal, but on the Internet nothing like this is found. The topology is like this:
 
 
Traffic balancing between Web servers using IP CEF on network equipment here . Other vendors may have certain nuances. In Cisco, the distribution ...
+ 0 -

Preparing SSL certificates for the installation of

About installation of SSL-certificates on a web server is written a lot, and usually this question does not cause complexity for system administrators. However, just before installation, it's a good idea to do a few checks so as not to behold the annoying "The site's security certificate is not trusted!" In the browser. (The site's security certificate is not trusted!). This is especially true when you receive certificates not from a registrar, but from a customer who can, for example, confuse private keys or send a certificate in the format of its text editor with the addition of garbage formatting.
 
 
Thus, in...
+ 0 -

New 3CX clients for Android and iOS with OPUS and PUSH codec for several

New 3CX clients for Android and iOS with OPUS and PUSH codec for severaldevices.Last week we introduced the updated 3CX clients for Android and iOS . Developers try to make the user's work with the mobile VoIP client as comfortable as possible, and, at the same time, add features, most in demand by users .  The main innovation in mobile clients is the addition of the OPUS voice codec, the advantages of which we will discuss below. The second refinement is the ability to register an extension from several mobile devices and deliver PUSH call notifications to each device in parallel. Also, the reliability of delivery of PUSH notifications to devices is significantly ...
+ 0 -

How SSH appeared on port 22

How SSH appeared on port 22 SSH by default it works on port 22. This is not a match. Here's the story of how he got this port.
 
 
When I ( Tatu Ilonen ) First published this story in April 201? it became viral: it was read by about ??? readers in three days.
 
 

The history of receiving port 22 for SSH


 
I wrote the first version of SSH (Secure Shell) in the spring of 1995. At that time, widely used Telnet and FTP .
 
 
But I still developed SSH for the replacement and telnet (port 23) and ftp (port 21). Port 22 was free and conveniently located between ...[/h]
+ 0 -