ITKarma

All flows

What is threat hunting, and how to hunt cybercriminals correctly

Threat hunting or TH - proactive search for signs of hacking or the functioning of malicious programs that are not detected by standard protection tools...

Dynamic learning and its principles

Education is not read articles, books, courses attended, conferences attended or meetings. All of the above is important, but there is a second component, about which so far little has been said...

Video Services Security

The basic requirements for services for organizing video conferencing are quality, reliability and security...

OSINT tools to speed web research

Almost everyone periodically needs to sort out a new field, conduct research, or quickly find very highly specialized information. But the search engine does not always understand us...

10 Preferred Python Code Refactoring Techniques

Make your Python code more readable and efficient Python is a general-purpose programming language widely used in scientific computing, artificial intelligence, web development, financial modeling, and many other fields...

Zones in Dart: Open Heart Surgery for Surroundings

Hello! My name is Dima, I am a frontend developer at Wrike. We write the client part of the project on Dart, however we have to work with asynchronous operations no less than on other technologies...

Armored Warfare: Armata Project. Chromatic Aberration

Armored Warfare: Armata Project is a free tank-based online action game developed by Allods Team, game studio MY. GAMES...

Learning quantum programming in Python with examples. Yandex Report

Today, anyone can use the methods of quantum programming, write simple Python code and run it on a real quantum computer...

Mitm apartment-wide attack

Many companies today are concerned about ensuring the information security of their infrastructure, some do so at the request of regulatory documents, and some from the moment the first incident occurs...

Front-end training: making clones of Discord, Jira, SoundCloud, Apple Stock, chess, dubbing and exchange rates

We bring to your attention ideas/tasks (not solutions) for self-study and hone mastery. SoundCloud clone SoundCloud is an online platform for distributing audio and sharing music...

We work in IntelliJ IDEA on weak hardware

Found a secret repository on the JetBrains github called Projector. Thanks to him, he wrote a piece of code in IntelliJ IDEA running on an Android tablet. I’m telling you how to repeat it...

How to enable encryption in JetBrains Projector

Projector is a way to run IntelliJ IDEA on a remote server. Recently, I wrote an article about this, but I kept silent about the important thing for any paranoid - encrypting data on a web socket...

Can services make presentations without you and do they have AI?

We continue the theme of design development with machines. Lebedev Studio presented its service, where the logos are made by artificial design intelligence...

Critical Algorithm Development: Implementation

Design Implementation Integration When I just started my career in professional development, I did not understand why open source was needed. I did not understand side projects, for that matter...

TextRadar fuzzy search algorithm. Index (part 3)

In previous publications ( part 1 and part 2 ) the basic approaches used in the TextRadar fuzzy search algorithm and the features of solving practical problems were considered...

How I looked for simple loops

I woke up somehow in the late afternoon and decided - it's time, it's time to make a new feature in my library. And for one, check the graph for cycles to repair and speed up...

A brilliant algorithm for creating mazes in the Entombed game, which they still can not solve

In 2017, two scientists, Canadian John Aycock and British Tara Copplestone, published an analysis of the classic game Entombed for the Atari 2600 game console...

The best data products are born in the fields

Most of our online orders are collected from retail stores, not from warehouses. This leads to errors between what is displayed on the site and the fact that we can actually collect an online order...

How we control the quality of models for detecting objects in images

Good day. Our names are Tatyana Voronova and Elvira Dyaminova, we are engaged in data analysis at Center 2M. In particular, we train neural network models for detecting objects in images: people, special equipment, animals...

A biased and subjective look at the resume of the developer

Hello! Recently, my colleagues from hh. ru held a webinar, where they reviewed the developer’s resume. I decided to share my point of view on this matter. In this article, we’ll talk about how developers create resumes...