A DDoS attack can cause a company to lose legitimate traffic, or in other words, users. That’s why these attacks are often used as leverage to create unfair competition, and victims often include online shops, games, and e-payment systems.
Our Virtual Private Cloud is built on OpenStack. The initial cloud setup and several types of objects can be managed from our API.
To make our service even easier to use, we’ve developed the selvpcclient library. The library is written in Python and covers the entire API, which lets you manage projects, quotas, and resources from your program code and console. Read more
We launched a campaign at the start of July where anyone interested could test out the latest Intel Optane SSDs (see link for more details). It’s no exaggeration to say that the release of the Optane disk is a revolution in the field of information storage. In this article, we’ll be talking the technologies these new disks are based on and the benefits they offer. Read more
Gaming is a global business, and new opportunities are being presented practically every day…for those with the knowhow. The golden rule when it comes to increasing revenue is to constantly increase your player base (number of players). The global market has presented an unprecedented potential for profit growth. The Internet provides over two billion people with access to various kinds of entertainment, and more than half of these people are potential gamers. Read more
Linux is a pleasure to use, and system administrators agree, especially on the last Friday in July, a.k.a. System Administrator Appreciation Day (a.k.a. SysAdmin Day, a.k.a. Sysmas).
In honor of Sysadmin Day, we’ve put together a list of our favorite features and Easter eggs in Linux. Enjoy! Read more
We recently started offering our clients a new firewall. In addition to the Cisco ASA 5512 and Cisco ASA 5508-X, we now offer the Fortinet FortiGate FG-100D.
The initial reaction from most of our clients went something along the lines of, “Why would you suggest this noname product over Cisco?” Truth be told, we had mixed feelings about it here at Selectel, too; however, our experience with these firewalls has shown us that this solution at least deserves a try. Read more
When working with potentially dangerous, unverified, or simply raw software, developers often use sandboxes. These are special environments that isolate or restrict programs and code from accessing data outside the environment. Sandboxes limit the software’s network access, OS interactions, and information from IO devices.
Lately, people have been turning more and more towards containers for launching unverified and non-secure software. Read more
Way back in 2013, we wrote an article on Habrahabr (Russian) about Bitcoin mining. The main idea was that there was little profit in mining due to the difficulty of the algorithms. Things haven’t changed much up to now, and the market has been overtaken by mining behemoths from China, who operate mining farms the size of aircraft hangars.
In this article, we’d like to retract our statement and say that, for the time being, mining can be and is in fact profitable. Read more