Source: https://habr.com/ru/post/35299/More articles:Never Fail Twice, or how to build a monitoring system from scratchAlice, Google Assistant, Siri, Alexa. How to write applications for voice assistantsSecurity Week 12: card games, hand-driven malware and a healthy approach to leaksMessengers, it's time to take the next step.Self-Managed Virtual Infrastructures: VMware Updates vRealize SuiteMassive attack on ciscoThymeleaf Tutorial: Chapter 20. Appendix C: Markup Selector SyntaxBetter way To CodeWhy put up a management interface or attack on a Cisco Smart Install on the InternetThe path of the IT-manager (part # 2)All Articles