Pull to refresh

My feed

Type
Rating limit
Level of difficulty
Warning
To set up filters sign in or sign up
Article

SSH for beginners

Level of difficultyEasy
Reading time4 min
Reach and readers410

Programmers, sysadmins, DevOps engineers, and testers are often united by the use of some common technologies. For example, the ability to have remote access to a server would be useful to anyone in the aforementioned anecdotal company. Therefore, in this article, we will cover the basics of working with the SSH protocol at a fundamental level (without generating keys, signatures, moms, dads, and credits). We'll look at 'advanced' usage separately next time. This material was prepared by Max, the author of the YouTube channel PyLounge. Let's go!

Read more
Article

"Clumsy Hands" or a New Level of DPI? An Analysis of the Weekend's XRay and VLESS Blocks

Level of difficultyMedium
Reading time5 min
Reach and readers1K

This weekend was all about 'Connection Reset.' While news channels vaguely reported that 'users are complaining about outages,' we were in chats and on test servers trying to understand the physics of the process.

Read more
Article

Google Antigravity and Gemini 3 Pro: What's Really Changing in Development and Why It's Not a Cursor Killer

Level of difficultyEasy
Reading time11 min
Reach and readers624

On November 18, 2025, Google introduced a new combination: the Gemini 3 Pro model and the Google Antigravity IDE. The first is about controlled reasoning, long context, and multimodality. The second is about multi-agent development with artifacts and "transparent" steps. Headlines immediately flooded the feeds: "Cursor is dead.".

In this article, we break down what exactly Google has launched, why the words "the smartest model" are an exaggeration, how Antigravity differs from Cursor, which development scenarios are already changing, and where it's still too early to abandon your familiar stack.

Read more
Article

TorrServer: How to watch torrents online

Reading time3 min
Reach and readers505

Lately, articles have been coming out about how to watch torrents on a TV. I read them and realize that the topic is not fully covered; people suggest putting in maximum effort for the bare minimum.

What do you need for watching movies at home, and how does it work for me...

Read more
Article

Can Larisa Dolina sue everyone who jokes about her on the internet for 5,000,000 rubles each?

Level of difficultyEasy
Reading time8 min
Reach and readers282

Jokes, memes, AI-generated images—even large companies have jumped on the Dolina bandwagon.

But here's a detail no one has mentioned yet: the name 'Larisa Dolina' is actually an officially registered trademark with Rospatent.

By law, you can claim compensation of up to 5,000,000 rubles for each trademark infringement. And from January 3, 2026, this limit will increase to 10,000,000 rubles.

It seems absurd to sue for money over internet jokes. But what do you think of the apartment ruling itself?

I am an intellectual property lawyer. Trademarks, patents, and copyrights are my profession.

How many more apartments do you think Dolina will be able to buy with the compensation money?

Let me show you what Dolina has registered with Rospatent, and using the best jokes as examples, we'll analyze the risks for everyone who has jumped on this topic.

Read more
Article

Free VPN with a Russian IP

Reading time3 min
Reach and readers453

A couple of weeks ago, I launched "Reverse VPN" – a VPN with a Russian IP for accessing websites that are unavailable from abroad. I've already been contacted by more than 1,000 people. I was able to help most of them. A huge thank you to everyone for the donations and kind words!

Read more
Article

Analysis of Telegram Accounts

Reading time4 min
Reach and readers392

Welcome back, dear readers! We are continuing our 'SHKH' series of articles, and today our main course is Telegram. In earlier articles, we looked at ways to find a target user's accounts by their nickname, after which we conducted reconnaissance on their account on the VKontakte social network. At this stage, our important goal is to find out the user's phone number, as the number can be a good starting point for reconnaissance and can reveal even more details about its owner. In the last article we tried to find out the number using a VKontakte page, and in this one, as you might have guessed from the title, we will try to find out as much information as possible about a Telegram account. This material has been edited and republished due to the blocking of the previous material by the RKN (Roskomnadzor) in the Russian Federation.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is published solely for familiarization and study of the mechanisms of the technologies used.

Read more
Article

Notes on Spammers – 2023: Non-binarity in the service of "solid" business

Level of difficultyEasy
Reading time9 min
Reach and readers317

Fig. 1: Part of the spammers' gender identity spectrum.

I rejoice when I receive spam, because it gives me an opportunity to replenish the budget of my beloved country (where the money for pensions, hospitals, schools, duck houses, and now even Counter-Strike comes from, if you know what I mean). I carefully forward every message I receive from spammers to the FAS, giving it the opportunity to replenish the budget not with a paltry 2-500 thousand rubles fine, but up to 1 million, and then I enjoy the materials of the "investigations" that shed light on the dirty underbelly of "solid business" and its non-binary accomplices. Lies, document forgery, and so on and so forth—just like last year, and before… and something else about the prosthetic paws of regulatory authorities.
Read more →
Article

Roskomnadzor tries to block EVERYTHING, plus a red alert level at OpenAI

Reading time9 min
Reach and readers550

The most interesting finance and tech news from Russia and the world for the week: RKN blocked FaceTime, Snapchat, and Roblox, visa-free travel with China and Saudi Arabia, Russia was added to the EU's money laundering blacklist, home surveillance cameras were hacked in South Korea, Musk's Twitter was fined in Europe, and rumors of a 'garlic' model from OpenAI.

Read more
Article

How Crazy Grannies Can Sue You for Your Apartment: The Most Complete Breakdown from a Lawyer

Level of difficultyEasy
Reading time27 min
Reach and readers288

For the past couple of months, the real estate market has been in an uproar: everyone is afraid of demonic granny-owners who seize apartments through the courts from unsuspecting buyers. In this comprehensive guide, we will break down all aspects of this problem with a professional litigation lawyer: from chilling court stories to the most reliable ways to protect yourself from such risks. In short, it's going to be fun!

Read more
Article

A brief overview of XHTTP for VLESS: what, why, and how

Level of difficultyMedium
Reading time6 min
Reach and readers2.5K

We were asked to talk about the protocol technology XHTTP in the context of XRay, VLESS, and others. You asked for it, so here it is!

First, a bit of history. The classic use of VLESS and similar proxy protocols (including with XTLS-Reality) involves the client connecting directly to a proxy server running on some VPS. However, in many countries (including Russia), entire subnets of popular hosting providers have started to be blocked (or throttled), and in other countries, censors have begun to monitor connections to 'single' addresses with high traffic volumes. Therefore, for a long time, ideas of connecting to proxy servers through CDNs (Content Delivery Networks) have been considered and tested. Most often, the websocket transport was used for this, but this option has two major drawbacks: it has one characteristic feature (I won't specify it here to not make the RKN's job easier), and secondly, the number of CDNs that support websocket proxying is not that large, and it would be desirable to be able to proxy through those that do not.

Therefore, first in the well-known Tor project for bridges, the meek transport was invented, which allowed data to be transmitted using numerous HTTP request-response pairs, thus allowing connections to bridges (proxies) through any CDN. A little later, the same transport was implemented in the briefly resurrected V2Ray. But meek has two very significant drawbacks that stem from its operating principle: the speed is very low (in fact, we have half-duplex transmission and huge overhead from constant requests-responses), and due to the huge number of GET/POST requests every second, free CDNs can quickly kick us out, and paid ones can present a hefty bill.

Read more
Article

A guide to bypassing 'whitelists' and setting up a chain: working options and why your VPN might not be working

Reading time4 min
Reach and readers1.6K

Hello everyone, in this article I will explain how many people manage to bypass whitelists, and what the root of the problem is. If you are a 'newbie' and don't want to bother with all the setup, at the <a href="#services"> end of the article</a> I've listed services that are mentioned in discussions.

Direct connect VLESS + Reality to Europe (Amsterdam, Germany, Finland) is being shaped for almost everyone. TSPU has mastered a new tactic: they don't terminate the session via RST, but simply 'freeze' it. As soon as the data volume in a single TCP session exceeds 15-20 KB, packets stop arriving. The connection hangs until the client times out.

Read more
Article

Best free VPNs for PC and smartphone 2025 (that work)

Level of difficultyEasy
Reading time6 min
Reach and readers628


Free VPNs.

In recent years, internet traffic filtering using TSPU has intensified in the Russian Federation. Hundreds of websites and internet services have been blacklisted and blocked. They can only be accessed via a VPN. However, the most popular VPNs have also been blocked.

The restrictions can be bypassed through a channel on your own foreign server by buying the cheapest hosting there for a couple of dollars or a ready-made VPS with a VPN installed (such ads can be found on Avito). If you don't have your own server, the only option is to use third-party VPN services that are not yet blocked. The best free VPNs among those that have survived are listed below.

Note. Habr will likely block this article for users from the Russian Federation in compliance with Roskomnadzor's ban on information about circumventing blocks, so it's best to save it immediately after publication or subscribe for updates on Telegram.
Read more →
Article

TOP 10 Sexting Services of 2025: The Best Bots and Platforms for Intimate Chatting

Level of difficultyHard
Reading time6 min
Reach and readers806

In 2025, sexting has become a real trend thanks to sexting neural networks and convenient platforms that make online intimate messaging safe and exciting. With the development of artificial intelligence, online sexting has turned into an art where everyone can enjoy virtual flirting without risk. I tested dozens of services and selected the TOP 10 bots and apps for sexting in Russian, evaluating them based on convenience, anonymity, and the quality of sexual correspondence. These sexting services offer everything: from anonymous sexting to virtual sex chat with self-destructing photos. Let's figure out which sexting chatbots and platforms are worthy of your attention and how they work.

Read more
Article

4 ways to fix goodbyeDPI, how to restore access to YouTube

Level of difficultyMedium
Reading time3 min
Reach and readers537

Lately, there has been a flood of comments that goodbyedpi is not working again, so I decided to make instructions for you on 4 working ways to restore goodbyedpi's functionality. It works differently for everyone, so test them out to see which one suits you. Write in the comments what helped you, maybe some of your own values!

Read more
Article

How to download, install Office 2024 LTSC from the Microsoft website and activate it permanently?

Level of difficultyMedium
Reading time8 min
Reach and readers2K

Ten years ago, I wrote a couple of articles - How to download the latest Office from the Microsoft website without any App-V / Habr (habr.com) and How to download Microsoft Office 16 from the Microsoft website / Habr (habr.com), using the then little-known Office Deployment Tool.

Time flies. After Office 2016 came Office 2019, Office 2021, and now it's time for Office 2024. Well, let's see what has changed in terms of downloading, installing, and activating the product over the past ten years.

First, let's talk about the versions and editions of Microsoft Office. To avoid being too meticulous in the description, I'll briefly state the most important thing: over the years, the Office lineup has evolved. There are different subscriptions and update plans, new features appear in new versions, and bug fixes and patches for found vulnerabilities are released for older versions.

Microsoft has long since switched to a system of distributing Office family products through various so-called "channels," depending on how often you want to receive new features and updates.

The key difference in the current download and installation of Office from what was relevant in the days of Office 2016 is that you must determine which distribution channel you are going to use - that is, from which channel you are going to install the product itself. For those who would like to study the different distribution channels in detail, I suggest reading the original source - Office updates - Office release notes | Microsoft Learn. For the rest, I'll summarize briefly - Microsoft now prefers to sell everyone a subscription to Microsoft 365 (what was previously called Office 365), with regularly updated features under the so-called Modern Lifecycle Policy. The consumer (boxed, retail) versions of Office 2021 are also distributed under this modern policy. Office 2021, for example, is only supported until October 13, 2026. And older versions follow the so-called Fixed Lifecycle Policy, under which Office 2016 and Office 2019 are only supported until October 14, 2025. In general, they will not stop working after that date, but they will stop receiving updates. And for those of you who use email services based on Microsoft Outlook.com or Office365, and possibly Microsoft Exchange users, with updates released after October 14, 2025, it's time to think about upgrading.

Read more about installing Office 2024
Article

Reconnaissance using Telegram bots — OSINT in Telegram

Level of difficultyEasy
Reading time4 min
Reach and readers802

Greetings, dear readers! Continuing the SH article series, in this article we decided to focus in more detail on bots in Telegram, as in many cases they are no worse and more effective than common OSINT tools. The bots discussed in this article will mainly concern reconnaissance on Telegram users.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is provided for informational purposes only, and for studying the mechanisms of the technologies used.

Read more