Pull to refresh


Genre of science fiction

Show first
Rating limit
Level of difficulty

Chasing a dream: How to become Adventure Builder and make giant spider robot with your own hands

Level of difficultyEasy
Reading time12 min

Have you ever wondered how difficult it is to turn something you have in mind into a real product? For example, would you be surprised to see someone controlling a huge iron robot spider that can turn on the spot and walk obediently to his pilot's directions?

To realize his idea, this persistent designer overcame many obstacles: he invented the mechanism himself, mastered the skills of aluminum welding, laser cutting, 3D printing, created a reduced prototype and built one. His project stands out even among the most interesting self-made devices you've read about.

Please sit back and relax while reading this rather lengthy article. During the scrolling through, you will learn about some remarkable inventor and his resourcefulness, irrepressible life energy and practical advice to help you realize your dreams, and someone, perhaps, will be pushed to tell about his own project.

Become the adventure builder
Total votes 3: ↑3 and ↓0+3

Web application firewalls

Reading time6 min

Web application firewall

Web application firewalls (WAFs) are a type of intrusion detection and prevention system and might be either a hardware or software solution. It is specifically designed to inspect HTTP(s) and analyse the GET and POST requests using the appalling detection logic explained below. Web application firewall software is generally available as a web server plugin.

WAF has become extremely popular and various companies offer a variety of solutions in different price categories, from small businesses to large corporations. Modern WAF is popular because it has a wide range of covered tasks, so web application developers can rely on it for various security issues, but with the assumption that this solution cannot guarantee absolute protection. A basic WAF workflow is shown below.

Its main function is the detection and blocking of queries in which, according to WAF analysis, there are some anomalies, or an attacking vector is traced. Such an analysis should not make it difficult for legitimate users to interact with a web application, but, at the same time, it must accurately and timely detect any attempted attack. In order to implement this functionality, WAF developers usually use regular expressions, tokens, behavioural analysis, reputation analysis and machine learning, and, often, all these technologies are used together.

In addition, WAF can also provide other functionality: protection from DDoS, blocking of IP-addresses of attackers, tracking of suspicious IP-addresses, adding an HTTP-only flag to the cookie, or adding the functionality of CSRF-tokens. Each WAF is individual and has a unique internal arrangement, but there are some typical methods used for analysis.
Read more →
Total votes 15: ↑13 and ↓2+11

How to Painlessly Unite Art with Java, JavaScript, and Graphs or The Story Behind Creating an Interactive Theatre Produc

Reading time9 min
Last year 2018, a theatre production series called Tale of the Century was launched in Estonia. Throughout the year, 22 local theatres presented their interpretations of the past hundred years of Estonian history to the audiences. In the draw, the Russian Theatre was assigned the topic of the future of Estonia.

Total votes 18: ↑17 and ↓1+16

Authors' contribution