Source: https://habr.com/ru/post/244/More articles:PENTESTIT. Practical Information Security: The Results of 2014, Part IIPrinciples of Business Application MonitoringThe simplest cardiograph on the ArduinoAccess to thousands of personal data of users of Beeline Wired Internet was obtainedCTOcast # 3: Conversation with Sergey ChernyshevGerman telecom operators are the most profitablejQuery File Tree - jQuery file browserAngularJs $ parse hacksInformation Project Management MethodologiesHedgehog with a snake in one basket, and also a little about the lack of a schemeAll Articles