Networks for the most mothers. Part of the fifteenth. QoS

Networks for the most mothers. Part of the fifteenth. QoSSSSM-15. About QoS.
 
Now with the option Pull Request'ov .
 
 
And now we have reached the topic of QoS.
 
Do you know why just now and why this will be the closing article of the entire course of the SDSM? Because QoS is extraordinarily complex. The most difficult thing that was before in the cycle.
 
This is not some magical archiver, which deftly squeezes traffic on the fly and shuffles your gigabit into a hundred-gigabit uplink. QoS is about how to sacrifice something unnecessary, cramming the unintended into the framework of what is allowed.
 
QoS is so entangled in the aura of shamanism ...
+ 0 -

6. Check Point to the maximum. IPS. Part 2

6. Check Point to the maximum. IPS. Part 2  
 
Welcome to the 6th lesson and we continue the IPS theme. Previous lesson was completely devoted to delusions on the IPS account, and we also briefly reviewed the history of the formation of intrusion prevention systems. Strongly recommend to see 5th lesson , before starting this one. This will allow us to penetrate more deeply into the problems of the question. This lesson is already fully devoted to the practical part. For various attacks, we will use the distribution. Kali-Linux with tools such as OpenVAS , Metasploit and Social Engineering ...
+ 0 -

The book «Site Reliability Engineering. Reliability and reliability as in Google »

The book «Site Reliability Engineering. Reliability and reliability as in Google » For almost 20 years, Google has been providing incredibly complex and large-scale systems that are responsive to users' requests. The Google search engine finds the answer to any questions in a fraction of a second, Google maps accurately reflects the earth's landscape, and Google's mail is available in 365/24/7 mode and, in effect, became the first public cloud storage. Are these systems impeccable? No, they also refuse, break down and become obsolete, like any technique. We just do not notice it. The thing is that for more than ten years Google has been developing a unique technology Site Reliability Engineering...
+ 0 -

Show everything that is hidden: the fourth series and backstage IT sitcom from Cloud4Y

The fourth series of mini-sitcom about the struggle of the administrator, the IT manager, the general director on the battlefields with the world's cataclysms, checking bodies, razdolbaystvom and self-pride.
 
 

 
 
Exclusively for Habr users, we are laying out a backstage in which director Boris Kazantsev tells us about the process of filming.
 
 
The fourth series of mini-sitcom about the struggle of the administrator, the IT manager, the general director on the battlefields with the world's cataclysms, checking bodies, razdolbaystvom and self-pride.     Exclusively for Habr users, we are laying out a backstage in which director Boris Kazantsev tells us about the process of filming.   ...
+ 0 -

Mikrotik: reset settings, backups and DualBoot

The analysis of many small, relatively interrelated topics: software and hardware reset, Protected RouterBoot, backups and export configuration, splitting flash memory into partitions.
 
to interact through the Serial interface and one of the Protected RouterBoot destinations does not interfere with the boot process.
 
 
The loader is divided into two parts:
 
 
 
Recovery - comes with the device and it coincides with Factory Firmware.
 
Current - comes with the system package, but is updated separately.
 
 
Mikrotik: reset settings, backups and DualBoot
 
You ...
+ 0 -

We get the difference between binary files using vcdiff

It took me to understand where and how the JPEG file was corrupted during the transfer.
 
VCDIFF - format and algorithm for delta encoding. It is described in RFC 3284 .
 
 
Delta encoding (English Delta encoding) - a way of presenting data as a difference (delta) between successive data instead of the data itself.
Sources:
 
"copy the text copy" (source.txt)
"copy change copy" (target.txt)

 

It is necessary to get the difference between the files:


 
    "changes" (source.txt -> target.txt)
"text" (target.txt -> source.txt)
...
+ 0 -

Guide on the Interface List in MikroTik

Guide on the Interface List in MikroTikThe interface lists appeared in MikroTik RouterOS for a long time, but by observation, not all of them know about it and therefore do not use it.
 
 
Description
 
What is this is clear from the name - Interfaces List, the same as lists of addresses (address list), only with interfaces. Do not confuse it with bridges and bounding interfaces, these are three different technologies for different tasks. This functionality appeared about a year ago and is present in all current (and bugfix) releases of RouterOS 6.
 
 
The main thing that is worth remembering: Interfaces in the lists continue to ...
+ 0 -

Comparison of Parallels RAS with alternative technologies

Comparison of Parallels RAS with alternative technologies  
 
A few years ago, virtual jobs were in demand only at large enterprises of the Enterprise segment with a large number of branches. This, in the first place, was due to the fact that the deployed work environment required expensive complex software and qualified employees to correctly install and configure the system. Today, solutions are becoming more economical, ergonomic and light, and successfully conquer the market for small and medium-sized businesses. This is evidenced by the growing demand for virtualization technologies for workplaces, and many alternative solutions offered on the market. Under ...
+ 0 -

Translation of the third day Slurm: Intensivy on Cubernetes

Soon begins the third and final day of Slurm.
 
Those who do not sleep on Sunday morning, are dedicated.
 
Today, the program is shortened, because the second half of the day is occupied with practical exercises and summing up that we do not broadcast.
 
Theme of the day is
 
9: 00-11: 00 CI /CD, building a de-cluster into a cluster from the ground
 
Installation and configuration of Gitlab
 
Setting up and running the registry on the example of Gitlab
 
Building a CI /CD solution
 
Link to the broadcast: Yutoub Soon begins the third and final day of Slurm. Those who do not sleep on Sunday morning, are dedicated. Today, the program is shortened, because the second half of the day is occupied with practical exercises and summing up that we do not broadcast. Theme of the day is 9: 00-11: 00 CI /CD, building a de-cluster into a cluster from the ground Installation and configuration of Gitlab Setting up and running the registry on the example of Gitlab Building a CI /CD solution Link to the broadcast: Yutoub ...
+ 0 -

A new vulnerability Mikrotik? No, but it's worth checking out your

A new vulnerability Mikrotik? No, but it's worth checking out yourdevices.   On August ? I received a "MikroTik: URGENT security advisory" mailing that a botnet is exploiting the vulnerability of Winbox Service for hacking and infecting devices.  From the text of the mailing it became clear that the vulnerability was still closed on April 2? 2018 in version v???. I started to check the patron devices and found several routers from ???.? one of which was infected.  www.abuseipdb.com/check/???.151   www.abuseipdb.com/check/???.166    If your Mikrotik is not yet updated and the Winbox port is open to everyone, be sure to check the device.  1. Check that the drop ...
+ 0 -