The cat-and-mouse story of implementing anti-spam for Mail.Ru Group’s email service and what Tarantool has to do with this

Hey guys!

In this article, I’d like to tell you a story of implementing the anti-spam system for Mail.Ru Group’s email service and share our experience of using the Tarantool database within this project: what tasks Tarantool serves, what limitations and integration issues we faced, what pitfalls we fell into and how we finally arrived to a revelation.

Let me start with a short backtrace. We started introducing anti-spam for the email service roughly ten years ago. Our first filtering solution was Kaspersky Anti-Spam together with RBL (Real-time blackhole list — a realtime list of IP addresses that have something to do with spam mailouts). This allowed us to decrease the flow of spam messages, but due to the system’s inertia, we couldn’t suppress spam mailouts quickly enough (i.e. in the real time). The other requirement that wasn’t met was speed: users should have received verified email messages with a minimal delay, but the integrated solution was not fast enough to catch up with the spammers. Spam senders are very fast at changing their behavior model and the outlook of their spam content when they find out that spam messages are not delivered. So, we couldn’t put up Continue reading

Sponsored Post: Spotify, Aerospike, Exoscale, Host Color, Scalyr, Gusto, LaunchDarkly, VividCortex, MemSQL, InMemory.Net, Zohocorp

Who's Hiring?

  • Spotify is looking for individuals passionate in infrastructure to join our Site Reliability Engineering organization. Spotify SREs design, code, and operate tools and systems to reduce the amount of time and effort necessary for our engineers to scale the world’s best music streaming product to 40 million users. We are strong believers in engineering teams taking operational responsibility for their products and work hard to support them in this. We work closely with engineers to advocate sensible, scalable, systems design and share responsibility with them in diagnosing, resolving, and preventing production issues. We are looking for an SRE Engineering Manager in NYC and SREs in Boston and NYC.

  • IT Security Engineering. At Gusto we are on a mission to create a world where work empowers a better life. As Gusto's IT Security Engineer you'll shape the future of IT security and compliance. We're looking for a strong IT technical lead to manage security audits and write and implement controls. You'll also focus on our employee, network, and endpoint posture. As Gusto's first IT Security Engineer, you will be able to build the security organization with direct impact to protecting PII and ePHI. Read more and apply here.

Fun Continue reading

20%-31% off Select Sony Audio Products Through Sept 3 via Amazon – Deal Alert

Various Sony audio products are currently discounted at Amazon, and will remain discounted only through September 3rd. Some of the highlights are below: 31% off Sony SRSX11 Ultra-Portable Bluetooth Speaker 25% off Sony MDRXB650BT/R Extra Bass Bluetooth Headphones 21% off Sony STRDH130 2 Channel Stereo Receiver 26% off Sony NWE393/B 4GB Walkman MP3 Player 22% off Sony SSCS3 3-Way Floor-Standing Speaker 22% off Sony SACS9 10-Inch Active Subwoofer 24% off Sony SSCS5 3-Way 3-Driver Bookshelf Speaker System 20% off Sony HTCT790 Sound Bar with 4K and HDR Support See the table below for exact prices. Other models may be discounted as well, so be sure to look around once you visit and take advantage of the savings while they're here.To read this article in full or to leave a comment, please click here

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.To read this article in full or to leave a comment, please click here

Attackers deploy rogue proxies on computers to hijack HTTPS traffic

Security researchers have highlighted in recent months how the web proxy configuration in browsers and operating systems can be abused to steal sensitive user data. It seems that attackers are catching on.A new attack spotted and analyzed by malware researchers from Microsoft uses Word documents with malicious code that doesn't install traditional malware, but instead configures browsers to use a web proxy controlled by attackers.In addition to deploying rogue proxy settings, the attack also installs a self-signed root certificate on the system so that attackers can snoop on encrypted HTTPS traffic as it passes through their proxy servers.To read this article in full or to leave a comment, please click here

Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL

Hopefully you were not curious about why McChicken was trending on Twitter. If you checked it out and saw the graphic video of a man engaging in a sexual act with the McDonald’s sandwich, then you might have wished for a miracle cure to unsee it. @geraldtbh But Twitter was not the only place McChicken was trending; it was also trending on Facebook because it was going viral.To read this article in full or to leave a comment, please click here

Facebook axed human Trending News editors, algorithm immediately goes full-on FAIL

Hopefully you were not curious about why McChicken was trending on Twitter. If you checked it out and saw the graphic video of a man engaging in a sexual act with the McDonald’s sandwich, then you might have wished for a miracle cure to unsee it. @geraldtbh But Twitter was not the only place McChicken was trending; it was also trending on Facebook because it was going viral.To read this article in full or to leave a comment, please click here

We’re learning the wrong lessons from airline IT outages

This summer, multiple high-profile organizations have experienced embarrassing and financially costly business disruptions. The explanations and excuses for these service interruptions—delivered by company executives and Monday Morning Quarterbacks alike—fail to address the underlying cause of these issues: lack of rigorous senior management oversight. Southwest Airlines and Delta both experienced widespread consumer dissatisfaction and business outages over the last month due to what executives have blamed on equipment failures. Pundits blame the meltdowns on cobbled-together legacy infrastructure. Both miss the point. On July 20, 2016, Southwest Airlines IT systems went haywire due to a malfunctioning router, cancelling 700 flights and stranding thousands of passengers. Southwest Airlines CEO Gary Kelly characterized the outage as a “once-in-a-thousand-year flood.”To read this article in full or to leave a comment, please click here

We’re learning the wrong lessons from airline IT outages

This summer, multiple high-profile organizations have experienced embarrassing and financially costly business disruptions. The explanations and excuses for these service interruptions—delivered by company executives and Monday Morning Quarterbacks alike—fail to address the underlying cause of these issues: lack of rigorous senior management oversight. Southwest Airlines and Delta both experienced widespread consumer dissatisfaction and business outages over the last month due to what executives have blamed on equipment failures. Pundits blame the meltdowns on cobbled-together legacy infrastructure. Both miss the point. On July 20, 2016, Southwest Airlines IT systems went haywire due to a malfunctioning router, cancelling 700 flights and stranding thousands of passengers. Southwest Airlines CEO Gary Kelly characterized the outage as a “once-in-a-thousand-year flood.”To read this article in full or to leave a comment, please click here

Saving stuff: Your VHS tapes, your data, your car battery, your wrists

Every so often, I find myself with a collection of gadgets that are seemingly unrelated, until I can come up with an overarching theme worthy enough to include them all in the same roundup. Sometimes it’s the “I gotta clean up my desk” theme, sometimes it’s “the vendors are bothering me about where that writeup is.”In this case, it’s a little bit of both, but with a very thinly veiled theme - saving stuff. The following gadgets all aim to save something when you use it. It even works as a “Keith has been saving this stuff in his office until he finally figured out a theme to tie them all together” approach.Explain more, Keith!To read this article in full or to leave a comment, please click here

Up to 22% off Various Microsoft Surface Pro 4 Models – Deal Alert

Surface Pro 4 powers through everything you need to do, while being lighter than ever before. Go from ultraportable tablet to a complete laptop in a snap wherever you are.  The Pro 4 has the Windows you know plus lots of new features you'll love. Various models are now discounted on Amazon: 22% off Microsoft Surface Pro 4 (128 GB, 4 GB RAM, Intel Core M) 17% off Microsoft Surface Pro 4 (256 GB, 8 GB RAM, Intel Core i7e) 16% off Microsoft Surface Pro 4 (256 GB, 8 GB RAM, Intel Core i5) 10% off Microsoft Surface Pro 4 (256 GB, 16 GB RAM, Intel Core i7e) 9% off Microsoft Surface Pro 4 (512 GB, 16 GB RAM, Intel Core i7e) No matter what you're doing, feel like an expert from the get-go.  Use the included Surface Pen to mark-up presentations, sign documents, take notes and much more.  Performance and versatility for professionals, creatives, and more.To read this article in full or to leave a comment, please click here

Cisco buys into containers with Container X acquisition

Cisco today turned its attention and checkbook onto another hot enterprise market by announcing it intends to buy Container X a nearly 2-year-old startup specializing in virtual container technology.ContainerX describes its technology as a turnkey container platform “designed for enterprise IT to administer as easily as they’ve administered VMware vSphere or Microsoft HyperV over the years, with dev and ops self service. Enterprise IT can set up the platform in under 60 minutes, integrate with various enterprise infrastructure aspects including storage, network, orchestration, LDAP etc, create pools with resource limits, for various dev/ops teams to self service.” the company wrote on its website.To read this article in full or to leave a comment, please click here

Intel’s new Kaby Lake chips for PC: Here’s the company’s vision

New chips can be a reason to upgrade PCs. But does Intel's latest 7th Generation Core chip, code-named Kaby Lake, have enough bite to trigger replacements of old PCs?Intel hopes so. The company is framing Kaby Lake PCs as go-to devices for productivity, virtual reality, and 4K gaming and video.So far, Kaby Lake is off to a good start. About 100 laptops, 2-in-1s, and tablets with Kaby Lake installed will be available from PC makers by the end of this year.On paper, Kaby Lake's launch comes at an inopportune time. PC shipments are slumping, the replacement cycle has slowed to six years, and consumers are instead using smartphones and phablets for computing. Many older PCs are powerful enough to run Windows 10.To read this article in full or to leave a comment, please click here

New ransomware threat deletes files from Linux web servers

A destructive ransomware program deletes files from web servers and asks administrators for money to return them, though it's not clear if attackers can actually deliver on this promise.Dubbed FairWare, the malicious program is not the first ransomware threat to target Linux-based web servers but is the first to delete files. Another program called Linux.Encoder first appeared in November and encrypted files, but did so poorly, allowing researchers to create recovery tools.After attackers hack a web server and deploy FairWare, the ransomware deletes the entire web folder and then asks for two bitcoins (around US$1,150) to restore them, Lawrence Abrams, the founder of tech support forum BleepingComputer.com, said in a blog post.To read this article in full or to leave a comment, please click here

New ransomware threat deletes files from Linux web servers

A destructive ransomware program deletes files from web servers and asks administrators for money to return them, though it's not clear if attackers can actually deliver on this promise.Dubbed FairWare, the malicious program is not the first ransomware threat to target Linux-based web servers but is the first to delete files. Another program called Linux.Encoder first appeared in November and encrypted files, but did so poorly, allowing researchers to create recovery tools.After attackers hack a web server and deploy FairWare, the ransomware deletes the entire web folder and then asks for two bitcoins (around US$1,150) to restore them, Lawrence Abrams, the founder of tech support forum BleepingComputer.com, said in a blog post.To read this article in full or to leave a comment, please click here

U.S. developers have the numbers, but China and Russia have the skills

While the United States and India may have lots of programmers, China and Russia have the most talented developers according to a study by HackerRank, which administers coding tests to developers worldwide.The study looked at the results of 1.4 million of HackerRank's coding test submissions, called "challenges," during the last few years. "According to our data, China and Russia score as the most talented developers. Chinese programmers outscore all other countries in mathematics, functional programming, and data structures challenges, while Russians dominate in algorithms, the most popular and most competitive arena," said Ritika Trikha, a blogger at HackerRank.To read this article in full or to leave a comment, please click here

Laptops are about to get a whole lot faster

SSD prices have dropped so precipitously that as many as half of all laptops sold worldwide in 2018 are expected to have the non-volatile memory in them, according to a new report.DRAMeXchange, a division of TrendForce, said today that prices stabilized for the first time in a year for mainstream client-grade SSDs in the PC-maker market during the current third quarter.Though there are signs of tightening inventories in the SSD supply chain during the second half of this year, DRAMeXchange maintained that the adoption rate in the notebook market will exceed 30% in 2016 and may reach 50% in 2018.To read this article in full or to leave a comment, please click here