Roskomnadzor: Telegram blocking affected 400 resources

Roskomnadzor: Telegram blocking affected 400 resources The other day the press service of Roskomnadzor said that as a result of the actions to block the messenger Telegram, abnormal work of about 400 sites was detected. Now the agency is working with companies that own resources.
 
 
The hotline received calls for a large number of sites, but only for ?300 specific addresses or IP are indicated. "The inspections showed that the abnormal work of the 400 resources indicated in these ?300 appeals was somehow connected with the measures taken by Roskomnadzor and telecom operators to implement the court's decision on Telegram," the press service said.
 
...
+ 0 -

The basis of the gameplay of the game in C ++ for Unreal Engine

The basis of the gameplay of the game in C ++ for Unreal Engine

 
The basis of the gameplay for Unreal Engine 4 provides the developer a powerful set of classes to create the game. Your project can be a shooter, a farm simulator, a deep RPG - it does not matter, the foundation is very versatile, does some of the hard work for you and sets some standards. It's pretty integrated into the engine, so I recommend you stick to these classes, and not try to invent your own game foundation, as it often happens in engines like Unity3D. Understanding this framework is very important for successful and effective work on projects.
 
 

For whom this article?


 
For ...[/h]
+ 0 -

Why do they think about web security when it's too late?

Greetings, Khabravchans!
 
 
Some time ago I faced the need to find a worthy intrusion detection system (IDS), then in the text we will use the abbreviation IDS. It was necessary to monitor the servers on which applications of our clients are hosted. And after a long and tedious search, all the options found could be divided into two camps:
 
 
1. Geeks for geeks: difficult to manage and understand open source solutions that do not even have a sane interface, you can work in them only through the console, and without solid experience and knowledge in the field of cyber security with them you will ...
+ 0 -

Is there life without architecture?

Is there life without architecture?

 
Most of the code for most modern applications was probably written in the time of Android 4.0. The applications survived the time ContentProvider, RoboSpice , various libraries and architectural approaches . Therefore, it is very important to have an architecture that will remain flexible not only to functional changes, but also ready for new trends, technologies and tools.
 
In this article, I would like to talk about the architecture of the IFunny application, the principles we adhere to, and how the major problems arising in the development process are being addressed.
...
+ 0 -

The effect of a small window on the user's memory, and what to do with it

The effect of a small window on the user's memory, and what to do with it
 
Even with the release of Windows Vista200? administrators faced a small but unpleasant problem: the warning of the expiry of the password was lonely appearing in the most inconspicuous corner of the screen. And this instead of the window is right in the center, as it was before!
 
Hence the change of passwords at the last moment, to the accompaniment of access failures; and indignation, why suddenly stopped working VPN, and what to do with it on a business trip. Of course, not a problem of the year, but a phenomenon intrusive and unpleasant. Therefore, we understand how to overcome it. ...
+ 0 -

The book "Swift. Basics of developing applications for iOS and macOS. 4 th ed. supplemented and revised "

The book "Swift. Basics of developing applications for iOS and macOS. 4 th ed. supplemented and revised " This book contains exhaustive information for everyone who wants to learn how to program in the wonderful language of Swift in order to create their own iOS-applications (including macOS, tvOS and watchOS) or programs for the Linux operating system. In the course of reading the book you will find not only theoretical information, but also a large number of practical examples and tasks, which you will deepen your knowledge of the studied material.
 
 
During a long and fruitful dialogue with many of you, a lot of ideas were developed, thanks to which the new edition became really useful. In comparison with ...
+ 0 -

Chinese hackers are behind numerous hacking of international companies

Chinese hackers are behind numerous hacking of international companies  
 
Recently, information security specialists from the company ProtectWise have stated that Chinese cyber intelligence is behind many hacking companies of the most different companies in the last ten years. Companies, to which the Chinese are implicated, are located in Europe, the US, Russia and many other countries. The actions of hackers from the Middle Kingdom would have remained unnoticed, were it not for the recent large-scale attack conducted to compromise corporate accounts in Office 365 and Gmail.
 
 
This attack was committed with a number of errors. The burglars left behind a lot of tracks on ...
+ 0 -

Welcome to the Android-meetup SuperJob

Another Mitap for Android developers in the SuperJob office.
 
 
Welcome to the Android-meetup SuperJob
 
 
Speakers and themes:
 
 
Anatoly Shukolyukov , senior developer of SuperJob, with the report "Creating Animations with Constraint Layout and ConstraintSet"
 
 
"I'll tell you how using the tool for creating complex UI interfaces ConstraintLayout, using a minimum of code, create beautiful animations and transitions"
 
fb-group SuperJob IT-meetup
 
 
Admission is free, the number of seats is limited.
 
 
Please, register with . Another Mitap for Android developers in the SuperJob office.    Speakers and themes:   Anatoly Shukolyukov , senior developer of SuperJob, with the report "Creating Animations with Constraint Layout and ConstraintSet"  "I'll tell you how using the tool for creating complex UI interfaces ConstraintLayout, using a minimum of code, create beautiful animations and transitions"  fb-group SuperJob IT-meetup   Admission is free, the number of seats is limited.  ☛ Please, register with . ...
+ 0 -

How to make a routing configuration file in React Router 4 (subtitles)

When react-router 4 only appeared, many experienced on two occasions:
 
 
How to render the routing in a separate file (configurations)
 
How to now live without an onEnter hook.
 
 
The video from Tyler McGinnis covers the first question.
 

here .When react-router 4 only appeared, many experienced on two occasions:  How to render the routing in a separate file (configurations) How to now live without an onEnter hook.  The video from Tyler McGinnis covers the first question.  here ...
+ 0 -

News Qt, June 2017 - May 2018

What's new appeared /happened in Qt for
half a year
almost a year with last article . Releases 5.9 and 5.1? as well as new tools, add-ons, platforms and transition to the licensing subscription model.
 
News Qt, June 2017 - May 2018
Conferences and exhibitions
 
 
Qt Contributors Summit 2017
 
Qt World Summit 2017
 
Qt on Embedded World 2018
 
 
What is new is
 
 
Changes in the commercial license
 
Changes on the site
 
Releases
 
 
???r3r31264.
 
???r3r31264.
 
 
Addons

 
 
Qt ...
+ 0 -