Настройка домена ALD в Astra Linux

Я администрирую серверы на базе Astra Linux и хочу рассказать о своем видении настройки ALD домена: серверной части, клиентской, использовании файла hosts (по сравнению с DNS сервером). Также дам описание настройки резервного сервера.

ALD мне интересен в первую очередь потому, что уже имеет интеграцию с Astra Linux. Статья будет вам полезна, если вы собираетесь узнать больше о Astra Linux не только из официальной wiki. Кроме того, эту операционную систему (вместе с рядом других решений компании «Астра») смогут поставить на виртуальную машину клиенты публичного облака #CloudMTS.

Read more
Настройка домена ALD в Astra Linux
Source: habrahabr

How to be an effective engineer?

This question comes up for a lot of us as we trying to advance our career and reach new heights. At the moment when I was challenged by it, I came across a wonderful book by Edmond Lau «Effective Engineer».

As always going through the book, I write new thoughts down. And today I want to share the compilation of things that I have found useful from the book. This is by no means an ad for the book, but I think it has some really interesting approaches for us to explore together.

Read more
How to be an effective engineer?
Source: habrahabr

Let’s Discuss the Lorentz Transforms – Part 1: Einstein’s 1905 Derivation

Even as I am posting this, I can see that my previous post received a hundred and twenty plus views, but no comments yet. I am saying again that my pursuit is not to give an answer, but to ask a question. I only wonder if there is in fact no answer to the questions I am asking – but anyway, I will continue asking them. If you know how to deal with the problems I am setting – or happen to understand they are not problems at all, I will be most grateful for a constructive input in the comments section. I am sorry to say I was unable to make this post sound as light and unpretentious as the previous one. This one deals with harder questions, is a little wordy, and requires at least elementary knowledge of calculus to be read properly.

In my previous post we discussed the ‘Galilean’ velocity composition used for introduction or substantiation of relative simultaneity. It is not the only point where Einstein resorts to sums c + v or c – v: he does that actually to deduce the Lorentz transforms, notwithstanding the fact that a corollary of the Lorentz transforms is a different velocity composition which makes the above sums null and void. It looks like the conclusions of this deduction negate its premises – but this is not the only strange thing about Einstein’s deduction of the Lorentz transforms undertaken by him in his famous 1905 article.

In Paragraph 3 of that paper Einstein is considering the linear function τ (the time of the reference frame in motion) of the four variables x′ = x – vt, y, z, and t (the three spatial coordinates and time of the frame of reference at rest) and eventually derives a relation between the coefficients of this linear function.

Read more
Let’s Discuss the Lorentz Transforms – Part 1: Einstein’s 1905 Derivation
Source: habrahabr

[Translation] What causes testers and developers to feud and how to avoid it

Testers and developers are the driving force of any IT enterprise. Their work directly influences the quality of the final product. Pavel Petrov, our Lead tester-engineer of the risk detection monitoring service for corporate clients, shares his insights on building a productive relationship between two different IT camps.

Read more
[Translation] What causes testers and developers to feud and how to avoid it
Source: habrahabr

Payment Village at PHDays 11: ATM hacking

The Positive Hack Days 11 forum, which took place May 18–19, 2022, was truly epic. The bitterly fought ATM hacking contest featured no fewer than 49 participants. How cool is that? The winner of this year’s prize fund of 50,000 rubles, with the handle Igor, was the first to hack the virtual machines. And he wasn’t even at the event! 🙂

Besides Igor, eight other participants picked up prizes this year for their VM-hacking skills. They were: drd0cvientvrazovdurcmzxcvcxzas7asg_krdhundred303, and drink_more_water_dude. A big thank-you to everyone who took part, and for those who weren’t at PHDays, here are the links to the virtual machines.

Read more
Payment Village at PHDays 11: ATM hacking
Source: habrahabr

[Translation] Modern Micro-Service Architecture: Key Challenges for System Analysts

We’re continuing to explore micro service architecture. In today’s blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations.

Read more
[Translation] Modern Micro-Service Architecture: Key Challenges for System Analysts
Source: habrahabr

The 2022 National Internet Segment Reliability Research

The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always.

As the number of alternate routes between ASes increases (the «Internet» stands for «interconnected networks» — and each network is an AS), so does the fault-tolerance and stability of the Internet across the globe. Although some paths are more important than others from the beginning, establishing as many alternate routes as possible is the only viable way to ensure an adequately robust network.

The global connectivity of any given AS, whether an international giant or a regional player, depends on the quantity and quality of its path to Tier-1 ISPs.

Usually, Tier-1 implies an international company offering global IP transit service over connections with other Tier-1 providers. Nevertheless, there is no guarantee that such connectivity will always be maintained. For many ISPs at all «tiers», losing connection to even one Tier-1 peer would likely render them unreachable from some parts of the world.

Read more
The 2022 National Internet Segment Reliability Research
Source: habrahabr

[Translation] Unity: What is a Coroutine and why is there an IEnumerator

The title of the article is a question I was asked in an interview for a Middle position. In this article, we will look at Unity coroutines, what they are, and at the same time we will capture the topic of Enumerator Enumerable in C # and a little secret of foreach. The article should be very useful for beginners.

Read more
[Translation] Unity: What is a Coroutine and why is there an IEnumerator
Source: habrahabr

Top 10 cyberincident investigation mistakes

Imagine someone withdrew money from a company’s account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image. In this paper, we will describe common mistakes that experts make when responding to security incidents.

Read more
Top 10 cyberincident investigation mistakes
Source: habrahabr