Source: https://habr.com/ru/post/121215/More articles:Global Creative Commons 2011 MeetingAnonymous networks and timing attacks: a low-cost attack on Tarzan and MorphmixAnonymous networks and timing attacks: principles of building secure systems (conclusion)The effect of the second systemEvernote for iOS has the opportunity to share notes on social networks and much more.Autoconfiguration of network interfaces in Debian GNU / LinuxWork with KVM virtual machines. Virtual machine cloningJavaScript Tutorial - on GithubHistory of one virusWorkshop Zend Framework. Part Two: Route and RegistryAll Articles