20 years of payment processing problems
Electronic payment systems have existed on the Internet for a long time, and some bugs in them are twenty years old. We’ve found critical vulnerabilities allowing us to steal money and drive up the balance. Today we will analyze typical implementations of payment processing and related security issues: https://amp.gs/jGGgW
Electronic payment systems have existed on the Internet for a long time, and some bugs in them are twenty years old. We’ve found critical vulnerabilities allowing us to steal money and drive up the balance. Today we will analyze typical implementations of payment processing and related security issues: https://amp.gs/jGGgW
Designing Converting Landing Pages
“Here are some tips, backed up by my 10-year experience as a UX/UI Director in agencies and product-led companies. These alone will give a nice increase in your conversion rate, I guarantee”: https://amp.gs/jGGsS
“Here are some tips, backed up by my 10-year experience as a UX/UI Director in agencies and product-led companies. These alone will give a nice increase in your conversion rate, I guarantee”: https://amp.gs/jGGsS
Modern Microservice Architecture: Design Principles
First mentions of micro service architecture application go back to the previous decade. Today this approach became the industry standard. Alexander Solyar, Lead software architect at Innotech, dives into details, shares professional insights and practical rules for working with micro services: https://habr.com/en/company/innotech/blog/684928/?utm_source=telegram.me&utm_medium=social&utm_campaign=modern-microservice-architecture-design
First mentions of micro service architecture application go back to the previous decade. Today this approach became the industry standard. Alexander Solyar, Lead software architect at Innotech, dives into details, shares professional insights and practical rules for working with micro services: https://habr.com/en/company/innotech/blog/684928/?utm_source=telegram.me&utm_medium=social&utm_campaign=modern-microservice-architecture-design
Unity: Selecting and uploading files by user on WebGL assembly
In this article, we will look at a way to give the user the ability to upload any files, such as textures. And let’s touch on the topic of launching JS functions from C# within Unity: https://habr.com/en/post/684936/?utm_source=telegram.me&utm_medium=social&utm_campaign=unity-selecting-and-uploading-files-by
In this article, we will look at a way to give the user the ability to upload any files, such as textures. And let’s touch on the topic of launching JS functions from C# within Unity: https://habr.com/en/post/684936/?utm_source=telegram.me&utm_medium=social&utm_campaign=unity-selecting-and-uploading-files-by
Grow as a UX Designer by Learning Copywriting Basics
Getting a task from a client, UX designers tend to pay attention to the design goals, not the contents of the website/app itself: https://habr.com/en/post/685232/?utm_source=telegram.me&utm_medium=social&utm_campaign=grow-as-a-ux-designer-by-learning-copywr
Getting a task from a client, UX designers tend to pay attention to the design goals, not the contents of the website/app itself: https://habr.com/en/post/685232/?utm_source=telegram.me&utm_medium=social&utm_campaign=grow-as-a-ux-designer-by-learning-copywr
Paysend Connect Meetup
Paysend invites you to its first Paysend Connect meetup, which will take place on September 22 in Belgrade at Karbon space: https://habr.com/en/post/685926/?utm_source=telegram.me&utm_medium=social&utm_campaign=paysend-connect-meetuppaysend-invite
Paysend invites you to its first Paysend Connect meetup, which will take place on September 22 in Belgrade at Karbon space: https://habr.com/en/post/685926/?utm_source=telegram.me&utm_medium=social&utm_campaign=paysend-connect-meetuppaysend-invite
Top 10 cyberincident investigation mistakes
Imagine someone withdrew money from a company’s account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image.
In this paper, we will describe common mistakes that experts make when responding to security incidents: https://habr.com/en/company/pt/blog/686478/?utm_source=telegram.me&utm_medium=social&utm_campaign=top-10-cyberincident-investigation-mista
Imagine someone withdrew money from a company’s account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image.
In this paper, we will describe common mistakes that experts make when responding to security incidents: https://habr.com/en/company/pt/blog/686478/?utm_source=telegram.me&utm_medium=social&utm_campaign=top-10-cyberincident-investigation-mista
Unity: What is a Coroutine and why is there an IEnumerator
In this article, we will look at Unity coroutines, what they are, and at the same time we will capture the topic of Enumerator \ Enumerable in C # and a little secret of foreach: https://amp.gs/jGfXY
In this article, we will look at Unity coroutines, what they are, and at the same time we will capture the topic of Enumerator \ Enumerable in C # and a little secret of foreach: https://amp.gs/jGfXY
The 2022 National Internet Segment Reliability Research
The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always: https://amp.gs/jGfQu
The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always: https://amp.gs/jGfQu
Modern Micro-Service Architecture: Key Challenges for System Analysts
We’re continuing to explore micro service architecture. In today’s blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations: https://amp.gs/jGkyI
We’re continuing to explore micro service architecture. In today’s blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations: https://amp.gs/jGkyI
Recipe for increasing your productivity
In this article we’re going to discuss techniques of improving the productivity for software developers. We’ll focus on personal throughput — and the reasons why we struggle to complete more work: https://amp.gs/jGkE4
In this article we’re going to discuss techniques of improving the productivity for software developers. We’ll focus on personal throughput — and the reasons why we struggle to complete more work: https://amp.gs/jGkE4
“Every time I turn on my computer it is a wonder. I have no idea what is going on, but it awakes, it becomes alive, and I can communicate with it in its own sublime and subtle language”
It’s alive: https://amp.gs/jGyWs
It’s alive: https://amp.gs/jGyWs
How in-app chats help e-learning platforms to be more interactive?
The last two years made us realize how technology can facilitate and improve communication. Digital technology had its impact in almost every industry including the sensitive education sector: https://amp.gs/jGhjq
The last two years made us realize how technology can facilitate and improve communication. Digital technology had its impact in almost every industry including the sensitive education sector: https://amp.gs/jGhjq
What causes testers and developers to feud and how to avoid it
Pavel Petrov, Lead tester-engineer of the risk detection monitoring service for corporate clients, shares his insights on building a productive relationship between two different IT camps: https://amp.gs/jGvFb
Pavel Petrov, Lead tester-engineer of the risk detection monitoring service for corporate clients, shares his insights on building a productive relationship between two different IT camps: https://amp.gs/jGvFb
“There is one only too obvious problem with relativity of simultaneity in the way it is normally introduced, and I have never found an answer to it — what’s more, I never read or heard anyone formulate it”
Let’s Discuss Relativity of Simultaneity: https://amp.gs/jGvcf
Let’s Discuss Relativity of Simultaneity: https://amp.gs/jGvcf
“We must understand that time is a finite resource, and thinking about leverage makes an engineer focus on what matters most”
How to be an effective engineer: https://amp.gs/jGVmU
How to be an effective engineer: https://amp.gs/jGVmU
Let’s Discuss the Lorentz Transforms
Part 1. Einstein’s 1905 Derivation: https://amp.gs/jG9Ud
Part 2. The Equation of the Sphere, or Is It? https://amp.gs/jG9Ur
Part 1. Einstein’s 1905 Derivation: https://amp.gs/jG9Ud
Part 2. The Equation of the Sphere, or Is It? https://amp.gs/jG9Ur
Elliptic curves and ECDSA: everything to know to sign a transaction in Bitcoin from scratch
This is the complete crash course on the Elliptic Curves Cryptography used in Bitcoin and other blockchains. With code samples and a live demo from scratch: https://amp.gs/jGSxF
This is the complete crash course on the Elliptic Curves Cryptography used in Bitcoin and other blockchains. With code samples and a live demo from scratch: https://amp.gs/jGSxF
“By turning my typewriter into a computer, I was able to recreate the experience of using a teletype. Now I know what it was like to use Unix in the 1960s when it was originally being developed!”
Turning a typewriter into a Linux terminal: https://amp.gs/jGNuQ
Turning a typewriter into a Linux terminal: https://amp.gs/jGNuQ
Millions of users daily use features that facilitate their work with web services. The companies implement them to make their websites easy to use and safe.
Good examples of those are OAuth 2 and OpenID Connect because they allow them to reach it: https://amp.gs/jGius
Good examples of those are OAuth 2 and OpenID Connect because they allow them to reach it: https://amp.gs/jGius