Habr
1.25K subscribers
2.06K photos
3 files
1.64K links
Habr.com ⬝ English edition
Download Telegram
“It’s the first article in the series about Mina and Mina Tools. In this article, I will introduce you to my tool for monitoring the Mina nodes”

Mina Monitor — convenient monitoring your Mina nodes: https://amp.gs/j1nhz
“I am not an economist, but in light of current events with cryptocurrencies and the economy in general, I would like to share my thoughts on some kind of ideal economy, around which everything is happening now”

The Ideal Economy: https://amp.gs/j1nJP
“Let’s talk about app architecture and the approach I apply as an iOS software engineer in a few companies. My team and I were trying to build something solid without slipping into a dense swamp where following the rules distracts you from actual business domain code. As a result, we got something that works for us and good enough to be told from my point of view”

Composable Contexts Architecture: https://amp.gs/j1xSO
What’s new in C# 10: overview.

This article covers the new version of the C# language — C# 10. Compared to C# 9, C# 10 includes a short list of enhancements. Below we described the enhancements and added explanatory code fragments. Let’s look at them: https://amp.gs/j1kC0
Using the Machine Learning model to detect credit card fraud.

The credit limit available in credit cards would allow us to purchase even when our bank balance is insufficient. But this is great news for cyber attackers eyeing your money: https://amp.gs/j17Xm
Best Digital Communication API Providers in 2021: All that You Must Know.

Unlike other tools, these real time communication APIs have spread their impact over all industries and have successfully grabbed the attention of proficient developers too: https://amp.gs/j1PnW
Q3 2021 DDoS attacks and BGP incidents.

The third quarter of 2021 brought a massive upheaval in the scale and intensity of DDoS attacks worldwide: https://amp.gs/j1hBT
“I created a new console for Microsoft System Center Orchestrator. It doesn’t require Silverlight”

WebSCO — new console for System Center Orchestrator: https://amp.gs/j19rM
OWASP Top Ten and Software Composition Analysis.

The OWASP Top Ten 2017 category A9 is dedicated to using components with known vulnerabilities. To cover this category in PVS-Studio, developers have to turn the analyzer into a full SCA solution.

How will the analyzer look for vulnerabilities in the components used? What is SCA? Let’s try to find the answers in this article: https://amp.gs/j193y
“On the Stack Overflow website, we frequently see questions about how to look for bugs of a certain type. We know that PVS-Studio can solve the problem”

How to sympathize with a question on Stack Overflow but keep silent: https://amp.gs/j1958
How to make a parallel book for language learning. Part 1. Python and Colab version.

We will use the lingtrain_aligner tool. It’s an open-source project on Python which aims to help all the people eager to learn foreign languages: https://amp.gs/j1JY0
“Everyone who runs the static analyzer on a project for the first time is slightly shocked by hundreds, thousands or even tens of thousands of warnings. It may be frustrating. Is my code so terrible? Or is the analyzer lying? In any case, filtering by the severity changes the situation, not completely though. That’s why we thought about how we could improve the first experience with the analyzer. Let me show you the new feature step by step…”

Best warnings of static analyzer: https://amp.gs/j1JCn
Modix3D Large Scale 3D Printers: Print Parts Up to 1.8 Meters.

This article covers 3D printer manufacturer Modix and its professional large-scale 3D printers. It includes the history of the brand, its products, their functions and possible applications: https://amp.gs/j1JqF
“Everyone is used to moving an ensemble by moving its data files. It seems easy and obvious but our Clickhouse cluster had more than 400 TB replicated data”

Extending and moving a ZooKeeper ensemble: https://amp.gs/j1Jcc
“Sometimes, when writing an article, we come across interesting situations or epic errors. Of course, we want to write a small note about it. This is one of those cases”

How a PVS-Studio developer defended a bug in a checked project: https://amp.gs/j1KEM
Introduction to Shining3D.

This manufacturer is among the few companies that offer a comprehensive ecosystem of 3D digitization solutions, covering not only 3D printing, but 3D scanning and software solutions for engineering and medical teams.

Part 1: https://amp.gs/j1K2z
Part 2: https://amp.gs/j1K2t
“SSH, the secure shell, is often used to access remote Linux systems. Because we often use it to connect with computers containing important data, it’s recommended to add another security layer, such as the second factor”

MFA-protected SSH access to Ubuntu servers with LDAP or Azure AD Credentials and hardware or software tokens: https://amp.gs/j1Hrt
How to detect a cyberattack and prevent money theft.

Let’s find out how to detect an attack at each of its stages and minimize the risk, as well as analyze two common scenarios of such attacks — money theft manually using remote control programs and using special malware, a banking trojan: https://amp.gs/j1o57
“We often check retro games. In our company, many developers like to find interesting projects for themselves. They feel nostalgic when they’re studying these projects. But we need to run retro games on something, right? This time we checked a project that helps to run old games on modern hardware”

PVS-Studio searches for bugs in the DuckStation project: https://amp.gs/j1MtD
Multiple heads are better than one in real world calculations.

Now, a team of University of Maryland-led quantum engineers report that multiple qubits may be better than one when it comes to error-corrections: https://amp.gs/j1MPF