Source: https://habr.com/ru/post/25421/More articles:Trojan mobile jar studyClearing HTML tags from attributesTLS decryption of Java application traffic using logsEnglish company blames Facebook for using its proprietary data center project for the Open Compute ProjectWhat answers do I expect at the testing interview?Long live fragrant soap, or how to fix improper scaling of Windows programsAnother article about indexing ajax sites by search engines10 tips on prototyping in SketchNo anonymityGoldrait's Critical Chain. Summary of the bookAll Articles