We extend the capabilities of CleanTalk Anti-Spam

We extend the capabilities of CleanTalk Anti-Spam

Checking existing Joomla users for spam


 
 
Spam bot messages (comments) are often disguised as ordinary user messages, but contain sponsored links or text. The main tasks of such messages are, the user's transition to a malicious resource, advertising or links to enhance the positions of their site. This compromises the site and can spoil the reputation, search engines can lower the position of the site in search results.
 
 
We have implemented a spam check, for comments and users who already exist on the site. This allows site administrators to automatically check and identify comments and ...[/h]
+ 0 -

We wrote the code together for one computer for five months. That's what I learned

We wrote the code together for one computer for five months. That's what I learned  
 
The one who came up with the term mob programming , obviously not special in marketing. Who wants to join the gang? The word mob causes images of broken glass and looted shops - the population of Springfield lined up with forks and torches.
 
 
Indeed, a gang or a crowd is something opposite to what you want to see a successful programming session. The crowd is disorganized, inclined to reckless decisions, angry and does not want to compromise. But the group programming has nothing to do with this.
 
Appear.in , stop trying to find reasons to ...
+ 0 -

Always open "Sesame", or Several loopholes in your IT landscape

Always open "Sesame", or Several loopholes in your IT landscape  
 
Fragile vulnerabilities like EthernalBlue or Heartbleed attract a lot of attention, fueling the idea that the main thing is timely patching of system software. However, not everyone remembers that critical configuration defects are not less common and are not always corrected by simple installation of updates.
 
 
I want to say a few words about several such security breaches, since they occur for every second (if not the first) customer and are not corrected for years.
 
 

Letter from the director


 
Social engineering is the No. 1 problem, as it is poorly controlled by traditional protection ...[/h]
+ 0 -

Creating and hosting telegrams for bot. From A to Z

Hello, Habrchians! No matter how tricky the topic of creating a telegram for python3 was, I did not find instructions showing the path from the first line of code to the bot bot (at least all the methods that I saw are a little out of date). In this article, I want to show the process of creating a bot from writing BotFather before the bot is deployed to Heroku.
 
 
The article turned out to be long, I advise you to scroll through the content and click on the item you are interested in.
 
 
P.S. Write if you need an article on creating a more complex bot, i.e. with webhounds, a database with user ...
+ 0 -

About the book "Ensuring the safety of the automated process control system in accordance with modern standards"

About the book "Ensuring the safety of the automated process control system in accordance with modern standards"  
 
How to ensure the functional component of safety management systems? What is the difference between functional security and information security and which of them is "more important"? Does it make sense in certification for compliance with standards? I tried to share my experience in solving these and other issues with the community when I started publishing a year and a half ago on the habr. a series of articles . During this time, from the series of articles there was something more.
 
 
The other day publishing house "Infra-Engineering" published my book ...
+ 0 -

Interview on Data Science: what is expected of you

Interview on Data Science: what is expected of youData Science - area very promising . Over the past year, we in the ERA have received 210 resumes from people who want to engage in Data Science. Of these, 43 people were invited to a technical interview, but they offered seven jobs. If the demand is high, why so?
 
 
We talked to technical interviewers and found out: the problem of many candidates is that they do not represent well, what analysts do. Therefore, their knowledge and skills are not always relevant for work. Someone thinks that the experience with Big Data is enough to work in Data Science, someone is sure that there will be ...
+ 0 -

How to recover the lost text

How to recover the lost textOnce I wrote a large text on SEO on one of the profile forums, the text turned out to be big and efficient. By habit from time to time to be distracted from typing (if this habit is unsuccessful), switching between the tabs of the opera, I, without coordinating the movements of the hand, suddenly, involuntarily took advantage of opera control of the mouse (be it wrong) and
Yes! The bookmark performed the command "Back" And all the text disappeared into oblivion. In desperation, realizing that the text is lost, that I will not recruit a new one by laziness, I'm going to be a liar, a man who does ...
+ 0 -

Creating a network with Internet access in the GNS3 environment on Windows 10

Creating a network with Internet access in the GNS3 environment on Windows 10 GNS3 (Graphical Network Simulator) Is a graphical network simulator that allows you to simulate a virtual network from routers and virtual machines. An indispensable tool for learning and testing. Works on almost all platforms. Great for creating stands on desktop machines.
 
 
Depending on the hardware platform on which GNS3 will be used, it is possible to build complex projects consisting of Cisco routers, Cisco ASA, Juniper, and servers running network operating systems.
 
 
GNS3 has two serious drawbacks:
 
 
 
Strongly demanding of CPU and memory. 10 routers are already heavily loaded ...
+ 0 -

Introducing "npm ci" for fast and more reliable assemblies

From now on, all npm users can take advantage of the new installation command, called "npm ci". The team provides massive improvements in performance and reliability of assemblies for continuous integration and continuous demo processes, providing a consistent and rapid experience for developers using CI /CD in their work. change log .
 
 

What do you think?


 
We want to know how this works for you, including. Questions? Results? Want to share what you and your team have created? [url=http://[email protected]
Which package manager do you use most often in your projects?
.
,
?
? ...[/h]
+ 0 -

DSP in Java

Java is a general-purpose programming language. General-purpose means you can write almost any program. So I tried to write a program that is usually written in C or C ++. Under the cut I'll try to tell you how I decoded satellite images from Meteor-M No. 2 .
 
DSP in Java
Usually the algorithm for obtaining the picture is as follows:
 
 
Record the signal
 
Run SDR # with certain plug-ins and settings and demodulate the signal. The output is a binary file.
 
Start LRPToffLineDecoder and pass the binary file received earlier to the input.
 
From LRPToffLineDecoder save the picture somewhere.
 
 
Apparently...
+ 0 -