Source: https://habr.com/ru/post/30663/More articles:nginx, memcached and SSIWeb application vulnerabilities: users hitThe creators of the film Zero Days shed light on the authors of StuxnetGraphical user interface as a reflection of the real world: the shadows and the rise of elementsUpdated Cisco CCNA Certification ProgramBig Data analytics and supply chain evolutionWhat to do with the found vulnerability and what to do if there is no Bug Bounty program?PVS-Studio confesses love to LinuxImportant user experience lessons from the development of the combat HUD for the Dreadnought gameMulti-touch hologramAll Articles