The term Firewall network security was originally used to describe physical walls in buildings that were made of concrete or steel. Firewalls functioned to halt the fire from spreading past that room or apartment. It was also designed as a safety feature. It happens to make a great metaphor which is why the current definition still remains valid today. In technical terms, a firewall is network security that looks at incoming and outgoing network traffic and prevents unauthorized access to maintain information security.

Within a computer system, there are internal networks and external networks such as the internet. The internal system is always trusted because only the user has access to this network. However, the internet can be malicious. Several types of malware and cyber hacking codes can infect networks and dramatically damage them instantaneously. As a result, firewall network security features diverse types of methods to combat damaging malware. The method for intrusion prevention depends on the type of firewall in effect and the predicted dangers.
Tags: technology
sophiaa 13 february 2019, 10:36

Structured Wiring
Network Cabling Services by ExterNetworks offers Cat 5e plenum cable installation for up to 150 ft. and 300 ft. The cabling is to be done on the same floor, and no drilling and coring are required. The technicians are highly-qualified and provide best-in-class customer service experience.

ExterNetworks sets the industry standards for seamless and reliable network cabling solutions for various projects. As a leader in Managed IT Services, we ensure that all of your structured cabling, network wiring, and network cabling installation will meet your project requirements with an on-going commitment to top-notch services & customer satisfaction.
shravaniv 11 december 2018, 11:14


Firebird, MySQL, and PostgreSQL are probably the most famous representatives of DBMS. Naturally, these projects often are compared with each other - by functionality, usability, etc. We have decided to perform our own code quality comparison of these projects.

The article gives a review of bugs, detected using PVS-Studio static code analyzer. A 'direct' approach of comparing by the number of warnings in this case is badly applicable, so you have to find other ways to compare. For example, you can analyze projects for potential vulnerabilities, as well as to see which of the most interesting errors will be found. By undertaking such a review, you can estimate, which code is better, and find out who will emerge victorious from this battle.

Read more -
Kate Milovidova 30 november 2017, 13:10

Honestly I warn: take this text with a certain amount of skepticism. I just recently started to get acquainted with the internals of PHP, but I would like to tell you about what is happening behind the scenes bug # 75237 .
Papay 20 november 2017, 13:25

Is the rabbit hole deep?


How many minutes do you need to understand what the chip is?

Francis Bacon in 1620 divided the sources of human error in the way of cognition into four groups, which he called "ghosts" or "idols" (Latin idola).

"Ghosts of the genus" stem from human nature itself, they do not depend on either culture or individuality of a person. "The human mind is like an uneven mirror, which, mixing the nature of things, reflects things in a distorted and disfigured form."
Papay 18 november 2017, 12:52

The inspiration for writing this article was obtained after reading a similar publication for the x86 architecture [1].
This material will help those who want to understand how the programs are built from the inside, what happens before entering the main and why all this is done. Also I'll show you how to use some of the features of the glibc library. And in the end, as in the original article [1], the traversed path will be visually represented. Most of the article is a parsing of the glibc library.
So, let's start our trip. We will use Linux x86-64, and as a debugging tool - lldb. Also sometimes we will disassemble the program with objdump.
The source text is normal Hello, world (hello.cpp):
#include <iostream>
int main()
std::cout << "Hello, world!" << std::endl;
Tags: abi, glibc, startup
Papay 17 november 2017, 14:25

Something is happening. People are unhappy. The specter of civil unrest is pursued by our programming communities.

For the first time a significant number of web developers openly question the web platform. Here is a typical article and discussion of . I could list more, but if you are sufficiently interested in programming to read this article, you probably already read this year at least one pompous recitation about the current state of web development. This article is not one of those. I can not compete in bullying the existing status quo with people who have to deal with web development every day. This is another article.

It's you, the front end hacker
Papay 16 november 2017, 12:17

Slightly less than the fastest, portable, 64-bit hash function, with decent quality.
Yes, in the air and in the king, about like that. Read on?
Instead of Disclaimer We drop the definition of hash functions along with a detailed listing of properties and requirements for their cryptographic application, assuming that the reader either owns the necessary knowledge minimums, or will make up for them . Also we agree that here and further we mean non-cryptographic (cryptographically non-persistent) hash functions, unless otherwise specified.
xially 9 november 2017, 10:16

In fact, it's been two days already, but no one has yet written an article on Habr, so I will have to eliminate this omission, which I do with pleasure.
So, what's new in this version of PostgreSQL?
First, the versioning itself has changed. Prior to the "dozens", we observed a lot of minor versions of 9.x that came out about once a year and at the same time introduced serious, far from minor changes. Therefore, since version 10, it has been decided to number 10, 11, 12, etc. By the way, MySQL seems to have gone the same way, jumped from 5.7 to 8.0
Okay, it's all trivia, let's move on to the essence of the question
xially 8 november 2017, 15:03

 image As a continuation of the research publications of our company on the internal mechanisms of the world's largest messengers. Today we will look at WhatsApp in its current state. In fact, the insides have not changed much over the past three years, the changes there are rather cosmetic.

In this article we will look in detail how to study the protocol of the messenger, answer the question "Can WhatsApp read our correspondence?" And I will attach all the necessary code in PHP.
xially 7 november 2017, 14:48
1 2 3 4 5 ...