Pull to refresh

Development

Show first
Rating limit
Level of difficulty

How to Not Lose Access to Telegram and Protect Yourself from Hacking

Level of difficultyEasy
Reading time8 min
Reach and readers325

It's been two years since I posted a video and a post about how I recovered my friend's Telegram account using JavaScript. Since then, I've helped over a hundred people regain access to their accounts. Then the method stopped working

I decided to gather the important security aspects of your Telegram account in one place.

Read more

Local Chatbot Without Limits: A Guide to LM Studio and Open LLMs

Level of difficultyEasy
Reading time11 min
Reach and readers561

In this article, we will not only install a local (and free) alternative to ChatGPT, but also review several open LLMs, delve into the advanced settings of LM Studio, connect the chatbot to Visual Studio Code, and teach it to assist us with programming. We will also look at how to fine-tune the model's behavior using system prompts.

Read more

SQL Window Functions in Simple Terms with Examples

Reading time4 min
Reach and readers252

Hello everyone!

I want to note right away that this article is written exclusively for people who are just starting their journey in learning SQL and window functions. It may not cover complex applications of functions or use complicated definitions—everything is written in the simplest language possible for a basic understanding.

P.S. If the author didn't cover or write about something, it means they considered it non-essential for this article)))

For the examples, we will use a small table that shows student grades in different subjects. In the database, the table looks like this:

Read more

Installing macOS or How to Turn Your PC into a Hackintosh

Level of difficultyMedium
Reading time24 min
Reach and readers342

Hello, Habr!

I've been putting off writing this article for a long time, but the time has come.

There are quite a few materials on the internet about how to run macOS on regular, IBM-compatible PCs. Their problem is exactly the same as with Wine, which I also wrote my own article about - they are too... vague on the details of how to create an installation media and what to do after installation.

In this article, I will be following the guide from Dortania. There is a Russian version, but it's always older than the most current one, so I will use the original. I will also be taking some screenshots and links from there.

Before we begin, I'd like to enlighten those who are not aware of what a Hackintosh is.

A Hackintosh is the process of installing macOS on regular PCs. What's the difficulty?

All MacBooks use their own hardware (at least now, in 2025). They used to use different processors - in classic Macintoshes they used processors from Motorola. Later models featured processors from IBM PowerPC (during this period they were called PowerMacs). And in the early 2000s, Apple switched to Intel processors. It was during this period that the system we are most interested in appeared - OSX, later renamed to macOS.

Read more

C4 Architecture Modeling Notation — Diagram Examples and Tools

Level of difficultyMedium
Reading time18 min
Reach and readers316

When the question of describing a system's architecture arises, there are several main solutions for where and how to do it. Among the popular notations for visualizing architecture diagrams, one can choose C4, developed by Simon Brown.

In this article, I want to show an example of applying the C4 notation, which you can use as a guide in your work, as well as tools for creating it. In particular, I highlight Structurizr.

This article is useful for system analysts, architects, developers, project managers, and anyone involved in creating and making decisions about project architecture.

Read more

Using Xray as a VPN

Level of difficultyEasy
Reading time5 min
Reach and readers542

Since I'm a fan of self-hosting, I have a home infrastructure:

Orange Pi - a media server;

Synology - a file dump;

Neptune 4 - a 3D printer with a web interface and a camera feed. And I'd like to have secure access to it externally via my phone and PC, while also having internet access outside the RF. I used to use OpenVPN for these needs, but it's no longer reliable. So I started studying the documentation for an excellent tool from our Chinese comrades - Xray!

What you'll need:

A server with an external IP for the infrastructure. In my case, it's an Orange Pi, hereinafter - Bridge

The server you want to access - Server

A server outside the RF for internet access. Hereinafter - Proxy

A client of your choice. Hereinafter - Client

Client and server on Linux - Xray-core, which can be installed via the official Xray installation script

Client for Android - v2rayNG

More clients can be found in the Xray-core repository

Let's take the VLESS-TCP-XTLS-Vision-REALITY configuration file as a base and start reading the Xray documentation

Routing is done on the client. For example, if the client accesses the xray.com domain, we route the traffic to the Bridge, and for all other connections - to the Proxy. Then the Bridge routes the traffic to the Server if the client accessed server.xray.com.
It looks like this:

Read more

SSH for beginners

Level of difficultyEasy
Reading time4 min
Reach and readers285

Programmers, sysadmins, DevOps engineers, and testers are often united by the use of some common technologies. For example, the ability to have remote access to a server would be useful to anyone in the aforementioned anecdotal company. Therefore, in this article, we will cover the basics of working with the SSH protocol at a fundamental level (without generating keys, signatures, moms, dads, and credits). We'll look at 'advanced' usage separately next time. This material was prepared by Max, the author of the YouTube channel PyLounge. Let's go!

Read more

"Clumsy Hands" or a New Level of DPI? An Analysis of the Weekend's XRay and VLESS Blocks

Level of difficultyMedium
Reading time5 min
Reach and readers503

This weekend was all about 'Connection Reset.' While news channels vaguely reported that 'users are complaining about outages,' we were in chats and on test servers trying to understand the physics of the process.

Read more

Google Antigravity and Gemini 3 Pro: What's Really Changing in Development and Why It's Not a Cursor Killer

Level of difficultyEasy
Reading time11 min
Reach and readers395

On November 18, 2025, Google introduced a new combination: the Gemini 3 Pro model and the Google Antigravity IDE. The first is about controlled reasoning, long context, and multimodality. The second is about multi-agent development with artifacts and "transparent" steps. Headlines immediately flooded the feeds: "Cursor is dead.".

In this article, we break down what exactly Google has launched, why the words "the smartest model" are an exaggeration, how Antigravity differs from Cursor, which development scenarios are already changing, and where it's still too early to abandon your familiar stack.

Read more

Analysis of Telegram Accounts

Reading time4 min
Reach and readers282

Welcome back, dear readers! We are continuing our 'SHKH' series of articles, and today our main course is Telegram. In earlier articles, we looked at ways to find a target user's accounts by their nickname, after which we conducted reconnaissance on their account on the VKontakte social network. At this stage, our important goal is to find out the user's phone number, as the number can be a good starting point for reconnaissance and can reveal even more details about its owner. In the last article we tried to find out the number using a VKontakte page, and in this one, as you might have guessed from the title, we will try to find out as much information as possible about a Telegram account. This material has been edited and republished due to the blocking of the previous material by the RKN (Roskomnadzor) in the Russian Federation.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is published solely for familiarization and study of the mechanisms of the technologies used.

Read more

A brief overview of XHTTP for VLESS: what, why, and how

Level of difficultyMedium
Reading time6 min
Reach and readers840

We were asked to talk about the protocol technology XHTTP in the context of XRay, VLESS, and others. You asked for it, so here it is!

First, a bit of history. The classic use of VLESS and similar proxy protocols (including with XTLS-Reality) involves the client connecting directly to a proxy server running on some VPS. However, in many countries (including Russia), entire subnets of popular hosting providers have started to be blocked (or throttled), and in other countries, censors have begun to monitor connections to 'single' addresses with high traffic volumes. Therefore, for a long time, ideas of connecting to proxy servers through CDNs (Content Delivery Networks) have been considered and tested. Most often, the websocket transport was used for this, but this option has two major drawbacks: it has one characteristic feature (I won't specify it here to not make the RKN's job easier), and secondly, the number of CDNs that support websocket proxying is not that large, and it would be desirable to be able to proxy through those that do not.

Therefore, first in the well-known Tor project for bridges, the meek transport was invented, which allowed data to be transmitted using numerous HTTP request-response pairs, thus allowing connections to bridges (proxies) through any CDN. A little later, the same transport was implemented in the briefly resurrected V2Ray. But meek has two very significant drawbacks that stem from its operating principle: the speed is very low (in fact, we have half-duplex transmission and huge overhead from constant requests-responses), and due to the huge number of GET/POST requests every second, free CDNs can quickly kick us out, and paid ones can present a hefty bill.

Read more

A guide to bypassing 'whitelists' and setting up a chain: working options and why your VPN might not be working

Reading time4 min
Reach and readers524

Hello everyone, in this article I will explain how many people manage to bypass whitelists, and what the root of the problem is. If you are a 'newbie' and don't want to bother with all the setup, at the <a href="#services"> end of the article</a> I've listed services that are mentioned in discussions.

Direct connect VLESS + Reality to Europe (Amsterdam, Germany, Finland) is being shaped for almost everyone. TSPU has mastered a new tactic: they don't terminate the session via RST, but simply 'freeze' it. As soon as the data volume in a single TCP session exceeds 15-20 KB, packets stop arriving. The connection hangs until the client times out.

Read more

Best free VPNs for PC and smartphone 2025 (that work)

Level of difficultyEasy
Reading time6 min
Reach and readers371


Free VPNs.

In recent years, internet traffic filtering using TSPU has intensified in the Russian Federation. Hundreds of websites and internet services have been blacklisted and blocked. They can only be accessed via a VPN. However, the most popular VPNs have also been blocked.

The restrictions can be bypassed through a channel on your own foreign server by buying the cheapest hosting there for a couple of dollars or a ready-made VPS with a VPN installed (such ads can be found on Avito). If you don't have your own server, the only option is to use third-party VPN services that are not yet blocked. The best free VPNs among those that have survived are listed below.

Note. Habr will likely block this article for users from the Russian Federation in compliance with Roskomnadzor's ban on information about circumventing blocks, so it's best to save it immediately after publication or subscribe for updates on Telegram.
Read more →

TOP 10 Sexting Services of 2025: The Best Bots and Platforms for Intimate Chatting

Level of difficultyHard
Reading time6 min
Reach and readers331

In 2025, sexting has become a real trend thanks to sexting neural networks and convenient platforms that make online intimate messaging safe and exciting. With the development of artificial intelligence, online sexting has turned into an art where everyone can enjoy virtual flirting without risk. I tested dozens of services and selected the TOP 10 bots and apps for sexting in Russian, evaluating them based on convenience, anonymity, and the quality of sexual correspondence. These sexting services offer everything: from anonymous sexting to virtual sex chat with self-destructing photos. Let's figure out which sexting chatbots and platforms are worthy of your attention and how they work.

Read more

4 ways to fix goodbyeDPI, how to restore access to YouTube

Level of difficultyMedium
Reading time3 min
Reach and readers346

Lately, there has been a flood of comments that goodbyedpi is not working again, so I decided to make instructions for you on 4 working ways to restore goodbyedpi's functionality. It works differently for everyone, so test them out to see which one suits you. Write in the comments what helped you, maybe some of your own values!

Read more

Reconnaissance using Telegram bots — OSINT in Telegram

Level of difficultyEasy
Reading time4 min
Reach and readers331

Greetings, dear readers! Continuing the SH article series, in this article we decided to focus in more detail on bots in Telegram, as in many cases they are no worse and more effective than common OSINT tools. The bots discussed in this article will mainly concern reconnaissance on Telegram users.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is provided for informational purposes only, and for studying the mechanisms of the technologies used.

Read more

Reality in Whitelists

Level of difficultyMedium
Reading time8 min
Reach and readers376

In a changing network infrastructure, mobile internet users face questions: what resources remain available, and what does this look like on a technical level? This material is the result of a practical study using standard network analysis tools.

No speculation—only measurements, numbers, and technical facts.

Read more