Installation icecast2 server with SSL support for translation via https-protocol

Formulation of the problem. Through a site with a free SSL certificate from Let`s Encrypt placed, an audio broadcast from the local network of the organization is posted. However, in the Internet browser, when you visit the site page, a warning appears about the presence of mixed content, because the broadcast goes through an unprotected http protocol. It is required to eliminate mixed content. For this, it was decided to organize an audio broadcast over the secure https protocol via Icecast2 and IceS2.
 
 
The result of a long search for this solution was the installation of an Icecast2 server ...
+ 0 -

Splunk + Excel. What will happen?

In previous articles, we talked a lot about Splunk . This is a product that allows you to collect and analyze data from any IT system in real time, for example, it can be the results of a web server, mail server , Windows, various applications and so on. Does this mean that if all employees interested in the analysis received at Splunk need to understand the work of the program, make changes to their business processes and do all the analytics only in Splunk? Of course not!
 
 
Splunk + Excel. What will happen?  
 
In this article, we ...
+ 0 -

Playing UWP: Where to start

Hello, Habr! Today we are launching an experimental series of articles. You will immerse yourself in a reality show for self-taught programmers, in which Alexei Plotnikov, one of the members of our Microsoft Developer community, will talk about how he creates the game on UWP. Under the cut - the first part, with the description of the idea of ​​the project and the answer to a simple question: "What do you need to lay down from the very beginning?" Do not forget to leave comments, you can influence the development process.
 
 
Playing UWP: Where to start
 
 
Before st...
+ 0 -

Training FastTrack. "Networking basics." "Scope of network switches, the value of Cisco switches". Eddie Martin

About a year ago, I noticed an interesting and fascinating series of lectures by Eddie Martin, which is incredibly intelligible, thanks to his history and examples from real life, as well as his tremendous experience in teaching, allows him to gain an understanding of quite complex technologies.
 
 
Training FastTrack. "Networking basics." "Scope of network switches, the value of Cisco switches". Eddie Martin  
 
We continue the cycle of 18 articles on the basis of his lectures:
 
 
Training FastTrack. "Networking basics." "Understanding the OSI model." Part one. Eddie Martin. December, 2012
 
 
Training FastTrack. "Networking basics." "Understanding ...
+ 0 -

Automation of updates CleanTalk Anti-Spam for WordPress

Automation of updates CleanTalk Anti-Spam for WordPressIf you serve a couple of sites, then updating the plug-ins does not cause any difficulties. Difficulties appear if you serve a few dozen, or even hundreds of sites.
 
 
CleanTalk Antispam requires frequent updates (we have to release a new version every 1-2 weeks), there are many reasons for this.
 
 
WordPress, as a designer, has a huge number of plugins, themes, widgets, etc. which are not always designed with WordPress Codex, have different architecture and event handling. Therefore, CleanTalk integration errors can occur with different components, especially rare ones.
 
 
Each complex service ...
+ 0 -

Graphs of the message of the President of the Russian Federation 2018

Graphs of the message of the President of the Russian Federation 2018
 
Immediately I will say that the post is not about politics and the message, but about how NOT to do graphics, do not need to do this for anyone, especially for the president, especially when the audience is so vast. "How to lie correctly with the help of statistics" . And so, it's a shame even somehow.
 
Usually less experienced colleagues, I advise you to read Tufti and learn the principles of Gestalt, but in this case In fact, there is a high probability that almost no one noticed these jambs. And I have just profdeformation. From a professional point of view, it's an epic feil. With philistine ...
+ 0 -

The game with ormatas

I suggest you play the game. I give you a square grid on which some cells are painted over, and some may remain empty. We will call it a "template". For example, a grid can be one of these templates:
 
 
The game with ormatas
 
You have a stack of transparent plastic sheets, in size and shape matching the mesh, on which the patterns from the black dots are painted:
 
 

 
It is worth noting that in each of these patterns exactly three points, one point in each row and column. The six combinations shown are the only 3 × 3 meshes that have this property.
 
 
Your task is to collect a subset of transparent sheets and apply them to the template so that the points close all the filled squares, but do not fall into any of the empty ones. You can apply several points to any of the filled ...
+ 0 -

YouTrack 2018.1 release: dependent task fields, personalized localization and much more

Hello! We have released a new version of the project management system - YouTrack ???r3r3278. - and we hasten to share with you innovations.
 
YouTrack 2018.1 release: dependent task fields, personalized localization and much more

 
 
What's new in YouTrack 2018.1?
 
 
 
dependent task fields;
 
personal localization;
 
swimmay based on the date;
 
custom widgets;
 
event Ribbon;
 
support for Markdown;
 
export in Excel format;
 
Terms of use;
 
workflow API updates;
 
improvement of import functionality;
 
mandatory verification of the e-mail address.
 
 
Experimental functionality:
 
 
a new task page;
 
checklist in Markdown.
 
 
Dependent task fields
 
Starting with YouTrack 2018.? ...
+ 0 -

Caching and performance of web applications

Caching allows you to increase the performance of web applications by using previously stored data, such as responses to network requests or results of calculations. Thanks to the cache, the next time the client accesses the same data, the server can service requests faster. Caching is an effective architectural pattern, since most programs often refer to the same data and instructions. This technology is present at all levels of computer systems. There are caches for processors, hard drives, servers, browsers.
 
 
Caching and performance of web applications ...
+ 0 -

Cuckoo 2.0. We assemble the best available platform of the dynamic analysis of malicious files

Cuckoo 2.0. We assemble the best available platform of the dynamic analysis of malicious files
 
Hail the Habr!
 
4 years ago I'm published the instruction to build a platform for dynamic analysis of malicious files Cuckoo Sandbox 1.2. During this time the project managed to build impressive functionality and a huge community, recently updated to version 2.? which for more than a year and a half hung in the stage of Release Candidate.
 
I finally prepared for you the complete manual on the assembly of Cuckoo Sandbox ??? with all the buns that are in the project at the moment, with the packaging of Cuckoo in venv and without using root ...
+ 0 -