TON is preparing to enter the US market. The new president of the TON Foundation says that soon the country will become a global crypto center.
When Donald Trump takes office, cryptocurrencies will be less strictly regulated in the country. These were pre-election promises.
Toncoin rose by 3% against the background of the news.

In the transition from AliExpress, malicious software for Windows was found. Inside the SPI memory, there was a suspicious file with the extension .exe.
A cybersecurity expert went further and found a specific program. It turned out that it can memorize keyboard input - this is enough for hackers to be able to determine your passwords for social networks.

Neural networks are being trained on Minecraft. It turns out that the game is perfect for training AI in an environment close to reality.
Based on the game, the TeamCraft tool was created, which teaches AI to build, engage in agriculture and blacksmithing, or simply explore the world.
TeamCraft can simplify the creation of characters for video games with realistic behavior. Finally, smart companions will appear in games.

Nvidia has unveiled the new RTX 50xx generation graphics cards. The flagship RTX 5090 is immediately 1.5 times more powerful than the RTX 4090.
All cards:
- RTX 5090: 21760 CUDA cores, 32 GB of memory, and a 1000 watt power block. Priced at $1999.
- RTX 5080: 10752 CUDA cores, 16 GB of memory, and an 850 watt power block. Sales start at the end of January, priced at $999.
- RTX 5070 Ti: 8960 CUDA cores, 16 GB of memory with a 750 watt power block. Priced at $749.
- RTX 5070: 6144 CUDA cores and 12 GB of memory, requiring 650 watts, it will perform at the level of the RTX 4090, but for $549.
The main feature is the DLSS 4 technology for additional FPS. In the same Cyberpunk game, the RTX 5090 graphics card will output 238 frames compared to the previous 106.

The feature that will simplify your life. In Gmail, you can create different email addresses within one Google account:
1. Use the domain googlemail.com. For any mail system, [email protected] and [email protected] are two different addresses. In fact, it is one address and emails will come to one mailbox.
2. Use periods in the address. Gmail does not see periods, so if you enter the address [email protected], emails will come to [email protected].
3. Use "+" and additional characters. Everything after the plus sign Gmail will also ignore. Thus, you can create [email protected] or [email protected].
This address should be used when leaving an email on untrustworthy sites. In mail, you can filter messages by a specific address and delete all unwanted messages at once.

Elon Musk is now Kekius Maximus. The richest person on the planet has renamed himself on Twitter and set Pepe the frog as his avatar.
The most honest rebranding.

What is QwakMyAgent?

QwakMyAgent is a PowerShell script that is a previously unknown custom module agent for Mythic. When executed, this script sends information about the infected system, periodically receives and processes commands from the server.


The initial infection vector was not detected. It is known that after compromising host systems, attackers established connections with hosts through the WinRM service and executed HTA scripts available via URL links using the system utility mshta.exe.


Experts warn of the possibility of using QwakMyAgent to conduct large-scale cyber attacks on enterprises of any size. To protect against such threats, it is necessary to ensure timely updating of security measures and network security monitoring.

Characteristics of the QwakMyAgent agent:



  • A new Mythic agent that uses PowerShell for its operation.

  • Sends information about the infected system to malicious actors.

  • Receives and executes commands from a remote server.

  • The exact method of agent distribution is unknown.


F.A.C.C.T. company recommends all PowerShell users to take additional security measures to prevent possible infection by the QwakMyAgent agent. It is recommended to use only official and verified script sources, as well as regularly update antivirus databases and software.


Be vigilant and protect your data from cyber threats!

What is the difference between VPS, VDS, and RDP?

In the world of server virtualization, there are several popular technologies such as VPS (Virtual Private Server), VDS (Virtual Dedicated Server), and RDP (Remote Desktop Protocol). While they all provide the ability to remotely manage a server, they have their own features and differences.


VPS (Virtual Private Server)


A Virtual Private Server (VPS) is a virtualized instance of a server that runs on a shared physical server. Each VPS has its own operating system, resources, and configuration. VPS is typically used for hosting websites, applications, and other services. The user accesses the VPS through SSH or RDP (depending on the operating system).


Example command for connecting to VPS via SSH:


ssh username@hostname

  • Has its dedicated resources

  • More flexible and customizable

  • Can be managed through SSH


VDS (Virtual Dedicated Server)


A Virtual Dedicated Server (VDS) is a more powerful and performance-oriented variant of a virtualized server. VDS also runs on a shared physical server but allocates more computational resources and memory for each instance. This makes VDS more suitable for larger projects and applications.


Example command for managing VDS via RDP:


mstsc

  • Allocates more computational resources

  • Suitable for large projects

  • Managed through RDP (Remote Desktop Protocol)


RDP (Remote Desktop Protocol)


Remote Desktop Protocol (RDP) is a remote management protocol that allows a user to connect to a remote computer or server and control it through a graphical interface. RDP is commonly used for remote access to Windows servers.


Example command for connecting to a remote server via RDP:


mstsc /v:hostname

  • Managed through a graphical interface

  • Suitable for Windows servers


So, VPS, VDS, and RDP are different server virtualization technologies, each with its own features and advantages. The choice between them depends on the specific needs of the project and the level of management required by the user.

"What should be done when first connecting to a VPS?"

Connecting to a VPS (Virtual Private Server) is the first step in working with a remote server where you will host your projects. Initial server setup upon the first connection is crucial to ensure the security and efficient operation of your project. In this article, we will discuss the basic steps to take when connecting to a VPS for the first time.


1. Updating the System:


The first step after connecting to a VPS is to update all system packages to the latest versions. Use the following commands to do this:


sudo apt update
sudo apt upgrade

2. Security Configuration:


To ensure server security, you should take the following steps:



  • Change the SSH port for server connection;

  • Create a new user with admin rights and disable root user access;

  • Configure a firewall to block unnecessary ports;

  • Install and configure Fail2Ban to protect against service attacks.


3. Installing Necessary Software:


Additional software installation may be required to work with your project. For example, for the Apache web server:


sudo apt install apache2

4. Setting Up a Domain Name:


If you plan to use your VPS for hosting a website, you should set up a domain name. Specify the server's IP address in the domain settings with the registrar.


After completing all of these steps, your VPS will be ready to work with your projects. Remember that security and regular system updates play an important role in maintaining the stability and security of server operation.

How to connect to a VPS server?

Virtual Private Servers (VPS) have become one of the most popular hosting solutions for websites and applications. They provide users with the ability to have full control over their server without making significant investments in hardware.


To connect to a VPS server, several steps need to be taken.


Step 1: Accessing the VPS Server


The first step is to access the VPS server via SSH (Secure Shell). You will need the server's IP address, username, and password. An example command to connect to the server:


ssh username@ip_address

Step 2: Entering the Password


After entering the command to connect to the server, the system will prompt you to enter the password. Upon successful password entry, you will be connected to the VPS server.


Step 3: Managing the Server


Now you have full access to the server and can manage it as you see fit. You can install applications, configure settings, and much more.


Connecting to a VPS server via SSH allows you to work with the server remotely and securely, as long as you have internet access. This method is the most secure way to manage a server.


In conclusion, connecting to a VPS server is relatively simple but requires some command line skills. However, once you understand the basic SSH commands, you will be able to easily manage your server and deploy applications on it.