Source: https://habr.com/ru/post/35386/More articles:Pwn iNt All! We find vulnerabilities in scripting engines and open usermode-mechanisms for protecting Windows. Part 1Guide to background work in Android. Part 4: RxJavaHow we broke CephComparison of LAN scanning toolsOpen free webcast of the conference Mobius 2018 PiterConference SMARTRHINO-2018Different facets of a digital enterpriseA little about physics in almost Agar IO on aicups.ruMap matching and processing of raw GPS data on an industrial scaleTelecom's digital transformation, or how operators “go” to ITAll Articles