Apple Company has based its system – OS X – on the core of the BSD system. It was based on NetBSD(ports, kernel, commands line), OpenBSD (security issues eg. The firewall code in Apple’s macOS is based on OpenBSD’s PF firewall code) and FreeBSD(Much of FreeBSD’s codebase has become an integral part of OS X) […]Read More Mac OS X – Apple system bases on BSD (Unix) architecure
Sometimes antivirus software and active firewalls do not protect your computer or system sufficiently and fully. One of the main attacks by hackers is to exploit system vulnerabilities with a so-called exploit. Below you can see a Windows 8.1 system with an anti-virus system installed (no name is given) and an active firewall. Despite these […]Read More Exploits and their impact on security – take care of system updates!
WordPress is a sensational CMS platform for creating professional websites, enjoying great popularity alongside other frameworks. It is very often used by bloggers. As it turns out, websites hosted even by external providers are vulnerable to hacking attacks aimed at taking over the administrator’s rights, changing or even removing the content of the website. Putting […]Read More WordPress – protection against hacking attacks or intrusion attempts
I would like to officially announce the commencement of the provision of an additional service performed by my company, which is Data Recovery.The scope of activities that enter the new sector is: Data recovery from hard drives Data recovery from memory cards (SD, xD, CF, MS etc.)Recovering photos or videos from apartments, cameras or other devicesPartition […]Read More Data recovery center – a new service provided by my company JRB System
Socket.io (www.socket.io) is POWERFULL and one of the most famous and professional library to real time communication. Socket.IO enables real-time bidirectional event-based communication. It works on every platform, browser or device, focusing equally on reliability and speed. Most well-known usage this library: Real-time analytics – Push data to clients that gets represented as real-time counters, charts or logs. Binary […]Read More Socket.io and Cross Domain Communication
In this article we will focus on setting up node.js cluster for socket.io. Socket.io is doing multiple requests to perform handshake and establish connection with a client. With a cluster those requests may arrive to different workers, which will break handshake protocol. To solve this problem we can use perfect solution based on sticky-sessions module. […]Read More Setting up node.js cluster for socket.io – A simply way to performance
Security protection applied on http/https server and the mechanisms used regardless of the distribution you are using (e.g. express, feathers, total.js, etc) do not secure socket.io. This is a separate issue that we will look at in this article. We will focus on the 3 most known security mechanisms. In this article we focus on security protection […]Read More Socket.io – Security protection based on local server Token – part 1/3
If you are building a Node application with Express or with another framework built on express e.g. feathers.js , Koa.js, Kraken, Sails, socket.io or another frameworks listed on http://expressjs.com/en/resources/frameworks.html, you can use the express-rate-limit middleware to protect Your solution from Brute Force and DDOS Attacks. This middleware prevents website, public REST API, and/or endpoints such as password reset from […]Read More Node.js – Protection from Brute Force and DDOS Attacks
Agrippa Solutions from Norway (https://www.agrippa.no) is listed on official site expressjs.com and selected from all companies over the world.
Created by me implementation for Agrippa Solutions from Norway (https://www.agrippa.no) is listed on official site IBM on expressjs.com where You can see IBM selected only 21 he best implementation of node.js solutions from whole the world. I am proud that I can create such solution on node.js. https://expressjs.com/en/resources/companies-using-express.htmlRead More Agrippa Solutions from Norway (https://www.agrippa.no) is listed on official site expressjs.com and selected from all companies over the world.
The main targets of the air raids on the Third Reich were not the factories of weapons (tanks, planes, naval ships) or ammunition, as it might seem, but FACTORIES OF BEARINGS. The bombing plan was developed by a specially created cell in the USA, which included MATHEMATICS (Abraham Wald). The Applied Mathematics Panel was established […]Read More The role of mathematicians in the Allied carpet raids on the main goal of the Third Reich