Payment Village at PHDays 11: ATM hacking

The Positive Hack Days 11 forum, which took place May 18–19, 2022, was truly epic. The bitterly fought ATM hacking contest featured no fewer than 49 participants. How cool is that? The winner of this year’s prize fund of 50,000 rubles, with the handle Igor, was the first to hack the virtual machines. And he wasn’t even at the event! 🙂

Besides Igor, eight other participants picked up prizes this year for their VM-hacking skills. They were: drd0cvientvrazovdurcmzxcvcxzas7asg_krdhundred303, and drink_more_water_dude. A big thank-you to everyone who took part, and for those who weren’t at PHDays, here are the links to the virtual machines.

Read more
Payment Village at PHDays 11: ATM hacking
Source: habrahabr

[Translation] Modern Micro-Service Architecture: Key Challenges for System Analysts

We’re continuing to explore micro service architecture. In today’s blog Alexander Solyar, Lead system architect at Innotech, describes the main challenges analysts are facing while working with micro services. He also shares a number of effective solutions and recommendations.

Read more
[Translation] Modern Micro-Service Architecture: Key Challenges for System Analysts
Source: habrahabr

The 2022 National Internet Segment Reliability Research

The National Internet Segment Reliability Research explains how the outage of a single Autonomous System might affect the connectivity of the impacted region with the rest of the world. Generally, the most critical AS in the region is the dominant ISP on the market, but not always.

As the number of alternate routes between ASes increases (the «Internet» stands for «interconnected networks» — and each network is an AS), so does the fault-tolerance and stability of the Internet across the globe. Although some paths are more important than others from the beginning, establishing as many alternate routes as possible is the only viable way to ensure an adequately robust network.

The global connectivity of any given AS, whether an international giant or a regional player, depends on the quantity and quality of its path to Tier-1 ISPs.

Usually, Tier-1 implies an international company offering global IP transit service over connections with other Tier-1 providers. Nevertheless, there is no guarantee that such connectivity will always be maintained. For many ISPs at all «tiers», losing connection to even one Tier-1 peer would likely render them unreachable from some parts of the world.

Read more
The 2022 National Internet Segment Reliability Research
Source: habrahabr

[Translation] Unity: What is a Coroutine and why is there an IEnumerator

The title of the article is a question I was asked in an interview for a Middle position. In this article, we will look at Unity coroutines, what they are, and at the same time we will capture the topic of Enumerator Enumerable in C # and a little secret of foreach. The article should be very useful for beginners.

Read more
[Translation] Unity: What is a Coroutine and why is there an IEnumerator
Source: habrahabr

Top 10 incident response mistakes

Imagine someone withdrew money from a company’s account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image. In this paper, we will describe common mistakes that experts make when responding to security incidents.

Read more
Top 10 incident response mistakes
Source: habrahabr

Top 10 cyberincident investigation mistakes

Imagine someone withdrew money from a company’s account at night. The next morning panic breaks out, leading to yet more problems. The IT department can reinstall a compromised system from scratch or restore it from backup. Reinstalling from scratch will wipe out all traces left by the attackers, and external investigators will have to search for clues in other systems. Restoring from backup carries the risk of accidentally reinstating a compromised image. In this paper, we will describe common mistakes that experts make when responding to security incidents.

Read more
Top 10 cyberincident investigation mistakes
Source: habrahabr

Paysend Connect Meetup

Paysend invites you to its first Paysend Connect meetup, which will take place on September 22 in Belgrade at Karbon space.

At our first meeting, we will talk about the company, the technology stack, the architecture solutions, and show a couple of demos.

Read more
Paysend Connect Meetup
Source: habrahabr

Grow as a UX Designer by Learning Copywriting Basics

Getting a task from a client, UX designers tend to pay attention to the design goals, not the contents of the website/app itself. There’s something completely wrong with it because the visual part might be superb, but when it frames a vague or wordy message, the client’s goals won’t be reached.

To avoid this, a UX designer should dive deeper into the content, analyze it, and restructure it in an interface-friendly way. It doesn’t mean doing the copywriter’s job, it means collaborating. The reality is that sometimes the writing team is used to praising the product (because clients like that), or there is no copywriter involved in the project at all.

Provide proof instead of opinion

An impression is more powerful when the customer can conclude the product’s benefits on their own. Instead of a colorful line of adjectives like “ultimate” or “leading” you should aim at what exactly makes the product that cool. The trick is to be precise, preferably with an example.

Get More Tips
Grow as a UX Designer by Learning Copywriting Basics
Source: habrahabr

[Translation] Unity: Selecting and uploading files by user on WebGL assembly

In this article, we will look at a way to give the user the ability to upload any files, such as textures. And let’s touch on the topic of launching JS functions from C# within Unity. As a result, we will get a script that, by calling just one function, will open a window for selecting files.

Read more
[Translation] Unity: Selecting and uploading files by user on WebGL assembly
Source: habrahabr