Nowadays, embedded process and its environment tracking system designed to prevent various unauthorized code modifications is no surprise to anyone: almost any somewhat popular multi-player game project has something similar. In this article we will analyze the…
CONTINUE READING 🡒 Getting acquainted with Liferay
Enterprise Information Portals (EIP) have gradually been transformed from fashion to an irreplaceable business tool providing employees with a single point of access to data, tools for management of business processes and information exchange facilities. The Liferay…
CONTINUE READING 🡒 Everything-you-need-to-know about python interpreters
Python itself is, of course, a programming language. But many people mistakenly believe that Python is the very thing that comes with most of the *nix systems and can be launched by typing "python" in the console.…
CONTINUE READING 🡒 Automation for OS X: the JavaScript way
JavaScript has steadily been among the most popular programming languages in the recent years. Numerous frameworks and development for popular platforms have secured the success and erased the memories of the nasty clichés of the past. The…
CONTINUE READING 🡒 Let’s learn the programming language respected by Boeing
For many years, I have been a fan of development for Windows and wrote pretty much about it to this best computer magazine ever. I switched to Mac OS and UNIX with time. Working in Mac OS,…
CONTINUE READING 🡒 Let’s tame data streams with Python
Information is currently gradually becoming "new oil" in terms of value. The only problem is that the volumes of data to be processed are growing by leaps and bounds. The sizes of files are sometimes larger than…
CONTINUE READING 🡒 Making UNIX daemon from Apache Tomcat
Apache Tomcat is a server of web applications primarily used in commercial environment not only as an application platform, but also as a component of large projects related with providing of a web-interface. In corporate sector, security…
CONTINUE READING 🡒 A saga about a packer which can prepare similar OS…
Since the beginning of dynamic Web development, а synchronization problem has emerged concerning a set of software programs, its versions and configurations in production and development environments. The developer of Vagrant has invented a new tool which…
CONTINUE READING 🡒 Prepare for Vaadin, an extremely powerful Java framework for enterprise…
In a client-server architecture, Java applications are most often located on the server side, and web interfaces are created by separate groups of front-end developers using JavaScript. Java does not provide any useful tools to develop modern…
CONTINUE READING 🡒 Review of OpenLMI administration tools
Linux supports a highly versatile set of administration tools. On the one hand, it is good — users have options. But, on the other hand, this very variety is not quite suitable for a corporate sector, as…
CONTINUE READING 🡒 The Reincarnation Of Little Red Riding Hood
Relatively recently, we saw the release of Red Hat Enterprise Linux 7, a distribution that is rightly considered to be the number one in the corporate sector. Without waiting for its clones, we decided to look at…
CONTINUE READING 🡒 Let us see the Impact!
Bug Bounty—vulnerability reward programs for vendors—become more and more widespread. And sometimes, vulnerabilities search detects some evidently insecure areas (e.g., self-XSS) the threat of which is hard to prove. But the larger (or even the smarter) is…
CONTINUE READING 🡒 Swiss knife for iPhone
Only lazybones know nothing about Cydia today. Such words as jailbreak, tweak and unofficial app store have long ago come into general use of every more or less competent user of an i-device. On the other hand,…
CONTINUE READING 🡒 Practical Experience in “Combat” Use of OpenStack
OpenStack is a very fashionable word in today’s IT media space. Virtually everyone heard about it, but not so many have seen it in action. Moreover, only a few dared to taste it in a “serious way”.…
CONTINUE READING 🡒 Manipulating clouds
If I started the article with describing all the advantages of cloud storage of data, you would think that I had been just thawed after twenty years of anabiosis, or that I use overdoses of hypnotics :).…
CONTINUE READING 🡒 Squeezing the Most Out of Pebble
Often, you find yourself in a situation when it is not convenient to use your smartphone or get it out of pocket, such as when it rains, while driving a car, at a meeting... Or you may…
CONTINUE READING 🡒 Reach the root! How to gain privileges in Linux?
In the previous article we have already reviewed several methods regarding the boosting of privileges to a system ones in terms of Windows. As it turned out, there are plenty of ways to do that and which…
CONTINUE READING 🡒 How to build kernel modules and native Linux applications for…
Android devices are good by any definition, but sometimes they extremely lack features and utilities available in desktop Linux. Separate instruments, such as Terminal IDE, partly help, but anyway they do not have some of the desired…
CONTINUE READING 🡒 Let’s get rid of default settings!
When people prepare a server for their resource or set up some other software, they often leave most of the default options in configuration files unchanged. Then the project is provided with more and more functions, and…
CONTINUE READING 🡒 SharePoint Serving the Hacker
SharePoint is a corporate document storage system from Microsoft with CMS capabilities which is strongly bound to Active Directory. You can use Google to find general descriptions of its vulnerabilities but, given that the details of its…
CONTINUE READING 🡒 


















