Why not rent a VPS /VDS for 200 rubles or how to choose a virtual server

The article was prompted by a topic on forum.searchengines.guru , where often people try to find VPS cheaply, build and monitor millions of directories that are almost useless for users, except for their creators (and I'll explain why later), in order to find the cheapest offer, which is the biggest mistake in the case of a novice webmaster underestimating the possibility of hosting or overestimating the use a cheap virtual server in its case. The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? we ...
+ 0 -

Conference DEFCON 16. Fedor, hacker InSecure.org. NMAP Scanning Internet

Conference DEFCON 16. Fedor, hacker InSecure.org. NMAP Scanning InternetGood afternoon, my name is Fedor, I'm from InSecure.org and I am the author of the security scanner project Nmap , released in 1997. I would like to thank everyone who came here, and myself Defcon For the fact that they invited me here. I'm a big fan of such conferences, where people can come who have a real passion for amateur technologies, but do not have companies that are willing to pay thousands of dollars for a ticket.
 
 
I want to warn you that this is not a conversation about how to conduct cross-site scripting attacks on social networks or how to hack channels ...
+ 0 -

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1I welcome all and thank you for making my presentation complete the DEFCON conference this year. I really appreciate it and will try not to disappoint you. My name is Matt Uyr, I am a graduate student at the University of Florida. Before we start talking about hacking passwords, I want to say that I'm working with a very good team, and to name its members right now. This is my supervisor, Professor, Dr. Sidir Eggrvol, who put his hand to my presentation and Professor Breno de Medeiros. I would also like to thank the National Institute of Justice and the National Center for Criminal Research "White ...
+ 0 -

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1
 
 
If you do not follow any rules for creating passwords, the password may look like a simple list of PHP . People hate rules, hate phrases and do not want to use them. If you give them the will, they will type any trivial password and will assume that the deal is done. In this case, it's safer if they do not use simple base words, so it's better to use large input dictionaries.
 
 
DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2  
 
The ...
+ 0 -

UPS and battery array: where to put? Yes, you wait

UPS and battery array: where to put? Yes, you waitUntil now, the problem of accumulation (accumulation) of electricity existed without any global changes, a technological breakthrough in this area no one could offer. It was the same battery Gaston Plante 1859 , modified by various auxiliary technologies and equipped with improvements in the field of electrochemical processes, the fight against the release of hydrogen, other materials of the hull, etc. At the turn of the beginning of 2000 appeared a different kind of ...
+ 0 -

Spy tricks: to remain in secret

About cryptosystems and machines was mentioned more than once in previous articles. But how to ensure the safe transfer of keys and codes, without which the work of secret services and spies would be equal to "0". There is an International Spy Museum, the exhibits of which are thousands of all sorts of spyware and accessories, often these are ordinary everyday items. Earlier, one of the resources published the top-10 of the most famous and unknown spy things of this museum. Among them (sorry, but not always items of use):
 
 
Spy tricks: to remain in secret ...
+ 0 -

Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core

Part 1 Part 2 Part 3 Part 4
 
 

A new stack of AMD products


 
Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core  
 
The kingdom for high performance. When it comes to data processing, bandwidth becomes a key factor: the more a user can do, the more projects will be executed, and the number of contracts will increase accordingly. Workstation users often calculate bottlenecks in the system and like to throw resources to solve the problem, whether it's core, memory, or graphics acceleration. The second-generation Threadripper, known as Threadripper ? goes beyond the old kernel-to-price ratio: the 2990WX provides 32 cores and 64 threads for just $ ...[/h]
+ 0 -

Strength check: Termite LT45? LXI

By the beginning of the 1990s, modern personal computers, simply PCs, had replaced cryptographic machines and other specialized cryptographic devices. Often, it was necessary and necessary to work with such encryption machines in the military conditions. Therefore, reliability and strength are the two most important parameters in the development and creation of military portable PCs. Remain unharmed and fully functioning, passing fire, water and copper pipes!
 
 
Strength check: Termite LT45? LXI  
CryptoMuseum
 
 
 
 
Thank you for staying with ...
+ 0 -

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space mission

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space missionSomeone likes to go to the movies, someone likes to go to clubs, someone likes to go to museums - and I've long dreamed of walking around data centers, looking at everything with my own eyes, chatting with those who work there. But to organize all this seemed unreal. Fortunately, a certain recognizability, which earned poiskvps.ru for these years, and which now, sometimes, surprises me - simplified the most difficult: acquaintance. So for the last two months I visited two data centers. What I saw interesting in St. Petersburg, I still plan to write later. And today I will tell you how I saw ...
+ 0 -

10 of the fastest supercomputers in the world. 2018

Two months ago, in June, the Top500 list was published. Top500 is a project to compile ratings and descriptions of the 500 most powerful publicly known computing systems in the world. The current list of supercomputers is published twice a year (June /November). The project is just celebrating its anniversary (25 years) and, what can not but rejoice, the list was updated in comparison with the previous ones, it included 133 new systems, and the first places are occupied by new favorites.
 
 
10 of the fastest supercomputers in the world. 2018  
 
It seems that they accumulated all the world's digatal power. Meet the 10 fastest supercomputers in the world ...
+ 0 -