Traffic monitoring systems in VoIP networks. Part One - Overview

 
3r3-31. In this article we will try to consider such an interesting and useful element of IT infrastructure as a monitoring system for VoIP-traffic.
 
 
Traffic monitoring systems in VoIP networks. Part One - Overview 3r388.
 
The development of modern telecommunication networks is striking: they have advanced far from signal fires, and what seemed unthinkable earlier is now simple and commonplace. And only professionals know what lies behind everyday life and the wide use of the achievements of the information technology industry. The variety of transmission media, switching methods, protocols of interaction between devices and coding algorithms affects the mind of ...
+ 0 -

How to scale down databases in Yandex. Cloud without downtime. An example with three hosts is

+ 0 -

RKN: Using analytics can lead to site blocking.

Incorrect use of Google Analytics and Yandex Metrics analytics services may result in restricted access to the site, Roskomnadzor said. 3r3386.  
3r3386.  
The Tagansky Court of Moscow on December 19 at the suit of Roskomnadzor to the French domain registrar Gandi SAS 3r-38c. ruled 3r3–3100. about blocking the site of "collective voting" 2019.vote. Earlier, on December 1? 3r3-10 was published. Solution 3r3-300. about adding a site to the registry of violators of PD handlers as an interim measure on the lawsuit, and from December ? 2013 began. Restriction of access to the site by providers 3-333100...
+ 0 -

Fault Injection: your system is unreliable if you have not tried to break it

Hi, Habr! My name is Pavel Lipsky. I am an engineer, I work in the company Sberbank-Technology. My specialization is testing the fault tolerance and performance of backends of large distributed systems. Simply put, I break other people's programs. In this post I will talk about fault injection - a testing method that allows you to find problems in the system by creating artificial failures. To begin with, I came to this method, then we will talk about the method itself and how we use it.
 
 
Fault Injection: your system is unreliable if you have not tried to break it ...
+ 0 -

Transferring PBX configuration to 3CX PBX Express service

In this article we will explain how to restore backup copies of existing PBX installations when using 3CX PBX Express. The ability to restore the configuration allows, for example, to move the local server to the cloud, change hosting or restore the PBX in the cloud after a serious local failure. The only requirement when moving the configuration is the option “License data and FQDN name” in the backup must be enabled. 3r3145.  
3r3145.  
Before moving your PBX to the PBX Express service, please note the following: https://pbxexpress.3cx.com and select restore backup. Insert the archive link ...
+ 0 -

Conference DEFCON 18. Troll reverse engineering with the help of mathematics

Trolling with math is what I'm going to talk about. This is not some kind of fashionable hacker stuff, rather, it’s an artistic expression, a funny, intelligent technology so that people would consider you a jerk. Now I will check if my report is ready for display on the screen. It seems everything is going fine, so I can introduce myself. 3r37474.  3r33490. 3r37474.  3r33490. Conference DEFCON 18. Troll reverse engineering with the help of mathematics
3r37474.  3r33490. 3r37474.  3r33490. My name is Frank Tu, it is written frank ^ 2 and @franksquared on Twitter, because Twitter also has some kind of spammer called "frank 2". I tried to apply social engineering to them so that they ...
+ 0 -

Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider

 3r3304. 3r3-31. Today we have collected 17 articles on the security of personal data (PD), new technologies in data centers and the "internal kitchen" 3r-32r. 1cloud
. From these materials, you will learn why a data center has a GPS firewall, how to work with PDs in a public cloud, and how to cool servers with hot water.
 3r3304.
 3r3304. Reading for the weekend: materials about working with PD, reviews of iron in the data center and the “kitchen” of the IaaS provider 3r311.
 3r3304. 3r3197. 3r3198. /Flickr /3r317. Dennis van Zuijlekom
/ CC BY-SA [/i]
 3r3304.
 3r3304. 3r3178. How to handle personal data
 3r3304.
 3r3304.
3r3334. [b] What is the essence of the ...
+ 0 -

Exploit Wednesday December 2018: for tests of time patches to spare - drove

Yesterday, on Tuesday, at about 10 p.m. Moscow, Microsoft rolled out patches for new vulnerabilities, thereby giving a start to the monthly race between security administrators and intruders. While the former are checking whether the installation of updates of critical business servers will drop into a blue screen, the latter will disassemble the code of the updated libraries and try to create working exploits for still vulnerable systems.
 3r3355.
 3r3355. For lovers of details - a short reference to the new vulnerabilities under the cut.
 3r3355.
 3r3355. Exploit Wednesday December 2018: for tests of time patches to spare - drove
 3r3355. ...
+ 0 -

9 circles warehouse automation Lamoda

9 circles warehouse automation Lamoda 
3r3-31. Our warehouse is about the size of two Red Squares and is 5 floors high and works all year round and never sleeps - 24/?364 days a year (the only day off is January 1). We have stored and maintained more than ?00?000 products, every day there are more than 300 operators replacing them. They work with goods coming from all over the world, and collect orders for users from four countries: Russia, Ukraine, Belarus and Kazakhstan. On such a scale, business requires flawless automation. 3r33300.  
3r33300.  
Under the cut, I, Pasha Finkelstein - team leader of the development and automation ...
+ 0 -

Check Point for Check Point Security Settings

Check Point for Check Point Security Settings  
 
Relatively recently, we published an open-access mini-course "3r3-39. Check Point for a maximum of 3r3-3209.". There we tried briefly and with examples to consider the most frequent errors in the Check Point configuration from the point of view of information security. In fact, we told you what the default settings are bad for and how to tighten the screws. The course (unexpectedly for us) received pretty good reviews. After that, we received several requests for a brief “squeeze” of this material - 3r3144. security checklist [/b] . We decided that this is a good idea, and therefore we publish this ...
+ 0 -