Source: https://habr.com/ru/post/3213/More articles:Undocumented features of Windows: breakpoints for registry keysThe brilliance and poverty of test automationThere are two functionsBrowser Fingerprint - anonymous browser identificationFree IOT & GPS service VIALATMHow to remotely and centrally manage patches and software updates in the companyNeurostream - a new chip for deep learningHow does hashCode () work by default?Securing user data: who is responsible for this?The book "Learning Node. Go to the server side. 2nd ed. supplemented and revised "All Articles