Source: https://habr.com/ru/post/undefined/More articles:Qrator Labs Annual Network Security and Availability ReportHunting techniques and tactics of attackers using Prefetch filesRadioactive products. Gamma spectrometer. Part 2We make the terminal fly (part 1)Why does a hardware startup hackathon needetcd 3.4.3: storage reliability and security research.NET Interactive is here! | .NET Notebooks Preview 2HighLoad ++, Anastasia Tsymbalyuk, Stanislav Tselovalnikov (Sberbank): how we became MDAPRESENT - Ultra-Lightweight Block Encryption (translation of the original PRESENT: An Ultra-Lightweight Block Cipher).NET Documentation: What's New for JanuaryAll Articles