ITKarma

All flows

I am root. Linux privilege escalation via SUID/SGID

In the last post , I conducted a “guided tour” on Linux privilege escalation methods. Today I am analyzing the privilege escalation vector through insecure SUID/SGID permissions. Therefore, more console and less words...

Upcoming Linux 5.8 Release: A Million Lines of New Code and 14,000 Changes

Usually, the release of a new version of the Linux kernel is an everyday routine that inspires enthusiasm only for users who expect a specific feature to appear. But now, in anticipation of the release of Linux 5...

As a daughter of Rusnano, who sold thousands of cameras to schools with Rostec, she makes “Russian” cameras with leaky Chinese firmware

Hello! I am developing firmware for surveillance cameras for b2b and b2c services, as well as participating in federal surveillance projects. About how we started, I wrote in the article...

Using Kubernetes Secrets in Kafka Connect Configurations

Kafka Connect is an integration framework that is part of the Apache Kafka project. On Kubernetes and Red Hat OpenShift platforms, you can deploy it using the Strimzi and Red Hat AMQ Streams...

Install and configure LXD on OpenNebula

A translation of the article was prepared ahead of the launch of the Linux Administrator course. In this article, you will find a step-by-step guide to the basics of the OpenNebula cloud-based orchestration system on LXD...

XFS, Reflink and Fast Clone. Made for each other

As we all know, XFS is a high-performance journaling file system created in the bowels of Silicon Graphics. And it’s highly productive because it can handle many parallel I/O streams...

5 modern alternatives to old Linux command line tools

Using more modern alternatives along with old command line tools, you can get more pleasure and even increase productivity...

Configure DRBD to replicate storage to two CentOS 7 servers

A translation of the article was prepared ahead of the start of the Linux administrator. Virtualization and Clustering ”...

Downloading the latest Linux kernel from a floppy disk on a 486th computer

Back in August 2019, I held the Sing-Along Week synchronization contest A MIDI file with a speech synthesizer that sings a song...

Game Code Command & Conquer: bugs from the 90s. Volume One

The American company Electronic Arts Inc (EA) has published in open access the source code of the games Command & amp; Conquer: Tiberian Dawn and Command & amp; Conquer: Red Alert...

Training smart gaming rivals in Unity using the "play with yourself" method using ML-Agents

Hello, Habr! As our regular readers know, we have long and successfully published books by Unity. As part of the study of the topic, we were particularly interested in the ML-Agents Toolkit tools...

Fast life hack for application growth - ASO in other languages

“Need more gold users. . . ” A familiar problem? We’ll show you how to solve it through ASO optimization in other languages. Many games and applications to expand the audience go to foreign markets...

How we outweighed the mechanics of ballistic calculation for a mobile shooter with a network delay compensation algorithm

Hi, I'm Nikita Brigak, the server developer at Pixonic. Today I would like to talk about compensation for lags in mobile multiplayer. A lot of articles have been written about server lag compensation, including in Russian...

Have a drink with Richard Levellord Gray. Online, without SMS and registrations

Who is Richard Levellord Gray Richard is a legendary level game designer, game creator Duke Nukem 3D, SiN , Blood. Richard also created several levels for Quake: Scourge of Armagon...

Hunters, Nutcrackers, and Ellie: How Artificial Gaming Works in The Last of Us

Yesterday, the sequel for the The Last of Us sequel was released, a game that has been one of the most recognizable PlayStation exclusives for seven years...

What do scientific data visualization and game dev have in common - we discuss in the new podcast “ITMO Research_”

This is the second part of the interview with Andrei Karsakov ( kapc3d ), Ph. D. , senior fellow at the National Center for Cognitive Development, associate professor of the Department of Digital Transformations...

Analysis of the Hollow Knight game design. Part 2. Green trail + Mushroom wasteland

deviantart. com/orioto Previous part. Video version below. Green trail The main focus in the development was aimed at the diversity of the world...

"The most dangerous gamer" (about the fourth dimension, about the games Braid, Witness and their mysterious creator Jonathan Blow)

Article of 2012 Video games are now one of the most profitable forms of entertainment in America, as well as one of the most adolescent, stupid and not "loading" the brain. Seriously? At least that's what Jonathan Blow thinks...

Creating shader animation in Unity

I recently worked on the respawn animation and special effects of the protagonist of my game “King, Witch and Dragon”. For this special effect, I needed a couple of hundred animated rats...

Factorio bug fix: the one who does nothing is wrong

In recent patch notes, there was a line “Fixed the creation of land under the player when creating land elsewhere”. You can read more about this here...