Petrol bikes or a strange product search (e-commerce)

 3r3146. 3r3-31. Discussing the quality of grocery search and the ways of its automated testing, last time, came to an understanding of some opacity of the problem. A huge number of online stores often put buyers in a dead end, not finding the required simple requests, and the problem, as it were, is not. In a word, we look at the real problems of a not very relevant search for a very popular online store (which really wants to be a “marketplace”). 3r3116.  3r3146. 3r3116.  3r3146. Petrol bikes or a strange product search (e-commerce) The case of a missing cake
3r3116...
+ 0 -

How to write in an assembler program with overlapping instructions (another bytecode obfuscation technique)

How to write in an assembler program with overlapping instructions (another bytecode obfuscation technique)We present to your attention the technique of creating assembler programs with overlapping instructions, - to protect the compiled byte-code from disassembling. This technique is able to withstand both static and dynamic analysis of bytecode. The idea is to pick up such a stream of bytes, when disassembling which starting from two different offsets, two different chains of instructions were obtained, that is, two different ways of executing the program. To do this, we take multibyte assembly instructions, and hide the protected code in the variable parts of the byte code of these instructions...
+ 0 -

Convert words and phrases into an anagram

 
3r3-31.
Anagram (from the Greek. Ανα- - “per” and γράμμα - “letter”) is a literary device consisting in rearrangement of the letters or sounds of a certain word (or phrases), which results in another word or phrase 3r3155.  
Anagrams are used to encrypt the answer to a quiz question (charade, crossword, etc.).
 
 
I bring to your attention two functions that implement the algorithm for obtaining anagrams from individual words and phrases.
 
 
The work of the functions “in combat”, as they say, can be seen in 3r3-316. here
.
 
 
To select the most “mixed” anagram, the Levenshtein function ...
+ 0 -

Universal monitoring - Sludge

Perhaps you will say that I do not understand anything in zabbix or nagios, and therefore I rush with such loud phrases, and only for this, slap me a minus in karma. I ask you before you do to answer the question. What task the network administrator solves in 2k L2 devices distributed geographically on the area of ​​the city. 3r3114.  
3r3114.  
It would be great to get an answer in the form of comments. Below is my vision of the situation. 3r3114.  
3r311. 3r3114.  
Actually, these reflections were prompted to me by reading J. Patton's book “User Stories, The Art of Agile Software Development”, be...
+ 0 -

Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a JavaScript botnet. Part 2

 
3r3-31. Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a jаvascript botnet. Part 1 3r33352.  
3r33352.  
This guy kept all the chats with those who are interested in the profile of this girl. This slide shows my favorite chat, kkbill1980 is the one who pretends to be a girl, and fiat176punt is his victim. “Kkbill1980: hello, sweetie! - fiat176punto: hello, my sweet mouse! ”, And so on, very cheerful chat. 3r33352.  
3r33352.  
Conference DEFCON 20. How to fuck the bad guys (and the mafia) with the help of a JavaScript botnet. Part 2 3r33352.  
3r33352.  
Further in the chat, they discuss ...
+ 0 -

Career newcomer in the "LC": Leaps of pace slowly grow forward

Some habrovchane believe that the employees of "Kaspersky Lab" clone in secret laboratories or from childhood bring up you know where. We decided to investigate this issue in more detail and captured several young colleagues on the subject of interviewing. It turned out that no, these are quite lively people and among them come across extremely curious specimens. For example, Nikita Kurganov - a recent addition to the AMR team (Anti-Malware Research) - an enthusiastic bearer who came into the profession right from the fourth year of Baumanka.
 
 
Career newcomer in the "LC": Leaps of pace slowly grow forward ...
+ 0 -

How to fix the gender gap in technology

Article 3–3–35. How to Fix the Gender Gap in Tech
author Clara Marie Schroeder draws attention to the problem of women's non-participation in technology. I thought that this is even more relevant for the CIS countries.

 3r366.
 3r366. How to fix the gender gap in technology
 3r366. reduced from 24% to 22% 3r3356. .
 3r366.
 3r366. For comparison, in 1995 this number was
was
significantly higher - 37%. This tells us that it is not enough just to inspire girls to learn programming, we need to talk more about what prevents them from building a career in this field.
 3r366.
 3r366. To talk about gender inequality in technology...
+ 0 -

The Guardian: "You won't have a jet pack, live with it"

There are also “opponents” of jetpacks, such as the journalist Dean Burnett from The Guardian, we will know them by sight.
 
 
Dude, there will be a jetpack for you.
 
 
3r3163. The Guardian: "You won't have a jet pack, live with it"
 
3r33170. Article dated September 2? 201? 3-33-317.
 
 
Typical complaints about science are connected with jetpacks - you see, we still don’t have them, but “promised.” However, their absence is not connected with the failure of scientists, but with physical and anatomical limitations, not to mention the fact that the creation of a jet pack is a terrible undertaking.
 
 
3r33170. “Where is my jetpack?” 3r3171.
 
 
You have probably ...
+ 0 -

8 interesting beta bugs iOS 12 and how we searched for them

 3r33434. 3r3-31. 8 interesting beta bugs iOS 12 and how we searched for them
3r3013.  3r33434.  3r33434. 3r3013.  3r33434. 3r33333.  3r33434.
changing the position of the “Remind me later” button so that some inattentive users accidentally click on the update button; 3r3013.  3r33434. 3r33380.  3r33434.
not allowing downgrade version ; 3r3013.  3r33434. 3r33380.  3r33434.
showing a red marker on the settings icon; 3r3013.  3r33434. 3r33380.  3r33434.
Finally, my favorite move is the daily display of update messages. 3r3013.  3r33434. 3r33380.  3r33434. 3r33382. 3r3013.  3r33434.
3r3409. 3r3013.  3r33434...
+ 0 -

Browse Free 2D CAD

 3r? 3513. 3r3-31. Every year in the field of design automation, parametric three-dimensional CAD systems are increasingly strengthening their positions. The usefulness of this approach in engineering is now beyond doubt, and the scope of application of this approach is extensive. 3r301501.  3r? 3513. Nevertheless, in engineering there is still room for traditional two-dimensional design, and there are appropriate tools for that. 3r301501.  3r? 3513. 3r301501.  3r? 3513. Browse Free 2D CAD 3r301501.  3r? 3513. 3r311.
3r301501.  3r? 3513. In the comments under the articles on the subject of CAD (for example, 3-3315. 1 3-3-3496...
+ 0 -