Unexpectedly: TON above $6.2 - for the first time since Pavel Durov's arrest. The coin has grown by 15% in the last 24 hours.
Finally, they remembered about it.
Breaking hashes CityHash64, MurmurHash2/3, wyhash and more
Hash functions are incredibly beautiful mathematical objects
They can map arbitrary data to a small range of fixed-size output data in such a way that the mapping is deterministic, although it may appear random
In this article, we will look at the dark side of hash functions: situations when things go wrong
- And the author will also show how to create very specific pairs of strings that can be concatenated in such a way that when concatenating k strings, any of the 2k combinations will have the same hash regardless of the seed used for the hash function
In beta version iOS 18.2, the option to change default applications has appeared. You can set up your messenger, call app, email, and password manager.
For now, iPhone only recognizes alternative email clients. We have replaced it with Gmail - now, if you click on someone's email address in any application, it opens exactly that.
In theory, this means that Siri with Apple Intelligence will be useful in searching for data from third-party applications, not just from iCloud. But we will only find out after the operating system release.
S.T.A.L.K.E.R 2 has been released and along with it - the first reviews. The project has scored 74 out of 100 on Metacritic.
The sequel is praised for its gorgeous open world, enjoyable difficulty, and gameplay. It is criticized for its somewhat dull story, abundance of bugs, and occasional performance issues - despite 14 years of preparation for the second part.
You can already play it on PC and Xbox Series X/S.
Fail of the day: a blogger lost the seed phrase from his bitcoin wallet. It contained 4 BTC, which are now worth over $368,000.
For several days, Vinetero searched for the note with the key in his home library - literally, among paper books. He couldn't find anything.
Recently, he was hospitalized due to stress. Plus, one more phobia.
π How to create an anonymous website in Tor
Onionshare is a free open-source program that allows you to easily and securely share files and host websites on the Tor network
Features of onion sites:
β The website address ends with .onion instead of the usual .com or .net. For example: xxxxxxxx.onion.
β Access to the site is only possible through the anonymous Tor network, regular browsers will not be able to open a .onion site.
β Traffic between the user and the onion site is encrypted and routed through Tor nodes to ensure anonymity.
β Anonymity when creating the site".
QwakMyAgent is a PowerShell script that is a previously unknown custom module agent for Mythic. When executed, this script sends information about the infected system, periodically receives and processes commands from the server.
The initial infection vector was not detected. It is known that after compromising host systems, attackers established connections with hosts through the WinRM service and executed HTA scripts available via URL links using the system utility mshta.exe.
Experts warn of the possibility of using QwakMyAgent to conduct large-scale cyber attacks on enterprises of any size. To protect against such threats, it is necessary to ensure timely updating of security measures and network security monitoring.
F.A.C.C.T. company recommends all PowerShell users to take additional security measures to prevent possible infection by the QwakMyAgent agent. It is recommended to use only official and verified script sources, as well as regularly update antivirus databases and software.
Be vigilant and protect your data from cyber threats!
In the world of server virtualization, there are several popular technologies such as VPS (Virtual Private Server), VDS (Virtual Dedicated Server), and RDP (Remote Desktop Protocol). While they all provide the ability to remotely manage a server, they have their own features and differences.
A Virtual Private Server (VPS) is a virtualized instance of a server that runs on a shared physical server. Each VPS has its own operating system, resources, and configuration. VPS is typically used for hosting websites, applications, and other services. The user accesses the VPS through SSH or RDP (depending on the operating system).
Example command for connecting to VPS via SSH:
ssh username@hostname
A Virtual Dedicated Server (VDS) is a more powerful and performance-oriented variant of a virtualized server. VDS also runs on a shared physical server but allocates more computational resources and memory for each instance. This makes VDS more suitable for larger projects and applications.
Example command for managing VDS via RDP:
mstsc
Remote Desktop Protocol (RDP) is a remote management protocol that allows a user to connect to a remote computer or server and control it through a graphical interface. RDP is commonly used for remote access to Windows servers.
Example command for connecting to a remote server via RDP:
mstsc /v:hostname
So, VPS, VDS, and RDP are different server virtualization technologies, each with its own features and advantages. The choice between them depends on the specific needs of the project and the level of management required by the user.
Connecting to a VPS (Virtual Private Server) is the first step in working with a remote server where you will host your projects. Initial server setup upon the first connection is crucial to ensure the security and efficient operation of your project. In this article, we will discuss the basic steps to take when connecting to a VPS for the first time.
The first step after connecting to a VPS is to update all system packages to the latest versions. Use the following commands to do this:
sudo apt update
sudo apt upgrade
To ensure server security, you should take the following steps:
Additional software installation may be required to work with your project. For example, for the Apache web server:
sudo apt install apache2
If you plan to use your VPS for hosting a website, you should set up a domain name. Specify the server's IP address in the domain settings with the registrar.
After completing all of these steps, your VPS will be ready to work with your projects. Remember that security and regular system updates play an important role in maintaining the stability and security of server operation.
Virtual Private Servers (VPS) have become one of the most popular hosting solutions for websites and applications. They provide users with the ability to have full control over their server without making significant investments in hardware.
To connect to a VPS server, several steps need to be taken.
The first step is to access the VPS server via SSH (Secure Shell). You will need the server's IP address, username, and password. An example command to connect to the server:
ssh username@ip_address
After entering the command to connect to the server, the system will prompt you to enter the password. Upon successful password entry, you will be connected to the VPS server.
Now you have full access to the server and can manage it as you see fit. You can install applications, configure settings, and much more.
Connecting to a VPS server via SSH allows you to work with the server remotely and securely, as long as you have internet access. This method is the most secure way to manage a server.
In conclusion, connecting to a VPS server is relatively simple but requires some command line skills. However, once you understand the basic SSH commands, you will be able to easily manage your server and deploy applications on it.