WiX.Py: we collect MSI package "in three lines"

No time and no desire to learn kilometer WiX files to assemble an MSI installer for your project, while plunging into the abyss of MSDN? Want to build an installer, describing it in simple and understandable terms, in a few lines? Is there a clinical tendency to cross-platform and build on Linux & Docker? Well then, you under the cut!
our project is cross-platform vector graphics editor and encountered a couple of months ago.
 
We knew about WiX Toolset (Windows Installer XML), but even a cursory review of the tutorials on the official site brought sadness and despondency - without serious ...
+ 0 -

Powering IT equipment: safety or security? part 2

Powering IT equipment: safety or security? part 2We continue the article, the purpose of which is to share experience and show key features and frequent mistakes arising in the design and organization of power supply subsystems of IT infrastructure and data center in general. But I would like to slightly expand the audience and devote several sections to basic elements of electrical safety and protection of equipment and people.
 
 
Those who missed the first part or wants to remember the first part of you can go here .
 
 
For those who understand what an automaton and RCD are, for which they are needed, what they are protecting from - ...
+ 0 -

Expand the LINSTOR store for Proxmox

Expand the LINSTOR store for Proxmox
 
LINBIT recently released their new solution for orchestrating and managing multiple DRBD arrays.
 
For example, you can have several nodes and each will have its own LVM or ZFS pool in which LINSTOR will automatically create new volumes and replicate them between nodes using the DRBD protocol.
 
LINSTOR supports thin-provisioning, snapshots and many other interesting things.
 
This solution is well suited for virtual machines and containers.
 
LINSTOR Satellites
 
I believe that you already have a Proxmox cluster, I have three nodes pve1 , pve2 and pve3 ...
+ 0 -

Seven "NOT" monitoring of IT infrastructure

Throughout my work, I periodically observed situations when the introduction of monitoring in the company did not bring the expected results. Monitoring worked poorly or did not work at all. Analyzing such situations, I understood that their reasons were almost always the same. Although they all lay on the surface, I met them all the time and therefore decided to put them together so that you were warned and armed.
 
 
Seven "NOT" monitoring of IT infrastructure  
 

1. HE implement the monitoring tool


 
If IT departments receive only a monitoring tool, effective and demanded monitoring will not arise by itself. Instead of implementing the ...[/h]
+ 0 -

Conference DEFCON 22. Andrew "Zoz" Brooks. Do not screw up! Part 1

So, our topic today is disobedience and disobedience. Disobedience is what makes hackers the way we are. Our lesson is to use things in such a way that they are not intended or that are not allowed. Sometimes the best way to show that some things can be done better is to break the rules. But there is a greater way - the violation of unjust laws.
 
 
Henry Thoreau wrote in his essay Civil Disobedience: "Unjust laws exist, whether we obediently obey them, or try to change them, while continuing to obey them, or violate them immediately"?
 
 
Conference DEFCON 22. Andrew "Zoz" Brooks. Do not screw up! Part 1 ...
+ 0 -

Why not rent a VPS /VDS for 200 rubles or how to choose a virtual server

The article was prompted by a topic on forum.searchengines.guru , where often people try to find VPS cheaply, build and monitor millions of directories that are almost useless for users, except for their creators (and I'll explain why later), in order to find the cheapest offer, which is the biggest mistake in the case of a novice webmaster underestimating the possibility of hosting or overestimating the use a cheap virtual server in its case. The whole truth about VPS (KVM) E5-2650 v4 (6 Cores) 10GB DDR???GB SSD 1Gbps from $ 20 or how to divide the server correctly? we ...
+ 0 -

Conference DEFCON 16. Fedor, hacker InSecure.org. NMAP Scanning Internet

Conference DEFCON 16. Fedor, hacker InSecure.org. NMAP Scanning InternetGood afternoon, my name is Fedor, I'm from InSecure.org and I am the author of the security scanner project Nmap , released in 1997. I would like to thank everyone who came here, and myself Defcon For the fact that they invited me here. I'm a big fan of such conferences, where people can come who have a real passion for amateur technologies, but do not have companies that are willing to pay thousands of dollars for a ticket.
 
 
I want to warn you that this is not a conversation about how to conduct cross-site scripting attacks on social networks or how to hack channels ...
+ 0 -

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1I welcome all and thank you for making my presentation complete the DEFCON conference this year. I really appreciate it and will try not to disappoint you. My name is Matt Uyr, I am a graduate student at the University of Florida. Before we start talking about hacking passwords, I want to say that I'm working with a very good team, and to name its members right now. This is my supervisor, Professor, Dr. Sidir Eggrvol, who put his hand to my presentation and Professor Breno de Medeiros. I would also like to thank the National Institute of Justice and the National Center for Criminal Research "White ...
+ 0 -

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2

DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 1
 
 
If you do not follow any rules for creating passwords, the password may look like a simple list of PHP . People hate rules, hate phrases and do not want to use them. If you give them the will, they will type any trivial password and will assume that the deal is done. In this case, it's safer if they do not use simple base words, so it's better to use large input dictionaries.
 
 
DEFCON 17. Hacking 40?000 passwords, or how to explain to your roommate why the electricity bill has increased. Part 2  
 
The ...
+ 0 -

As a cloud provider to manage software licenses - will help the blocker

Company Red Hat presented a block system that helps cloud providers determine how customers use their services. As a result, vendors are able to offer new, more user-friendly payment models and identify fraud with software licenses.
 
 
More details about the Red Hat system and other block-based solutions in this area, we tell further.
 
 
As a cloud provider to manage software licenses - will help the blocker

 
/photo PxHere PD
 
 

About the system Red Hat


 
Red Hat offer to apply block to monitor how and how much (on time) the customer ...[/h]
+ 0 -