Rubric about information security. Detailed description of various vulnerabilities and techniques that are used to carry out attacks. Descriptions of effective methods of protection. History of real hacks. The authors are experts in the field of information security and people who often do not want to reveal their real names.