Rust Team to Ask Community's Opinion

Rust team, willing to know community's feeadback, launchs the State of Rust Survey 2018
10 August 2018   822

Developers of the programming language Rust announced the opening of the State of Rust Survey 2018. The users are required to answer 16 questions that will help the team to identify the weak points of the project. According to the authors, the survey takes 10-15 minutes. The text is translated into 14 languages.

It is important for the team to know the respondents' opinion about the instruments and libraries of the ecosystem. Also, developers want feedback on their current priorities and activities in public projects.

The Rust Community Team is pleased to announce our 2018 State of Rust Survey! Whether or not you use Rust today, we want to know your opinions. Your responses will help the project understand its strengths and weaknesses and establish development priorities for the future.
 

Rust Team

The collection of responses will close on September 8, 2018, and the results of the study will be published in the official blog within 1-2 months. To keep anonymity, just do not specify an email address. 

Help Rust team and community, take part in the survey.

Suricata 5.0 to be Available

Suricata is a cybersecurity solution, an intrusion detection system and intrusion prevention system with opened source code
16 October 2019   129

OISF (Open Information Security Foundation) has published the release of Suricata 5.0, a network intrusion detection and prevention system that provides inspection tools for various types of traffic. In Suricata configurations, it is permissible to use the signature database developed by the Snort project, as well as the Emerging Threats and Emerging Threats Pro rule sets. The source code for the project is distributed under the GPLv2 license.

Some of the major changes:

  • New log parsing and logging modules for RDP, SNMP and SIP protocols written in Rust are introduced;
  • In addition to support for the JA3 TLS client authentication method that appeared in the previous release, support for the JA3S method is added, which allows to determine which software is used to establish the connection based on the connection negotiation features and parameters that are set (for example, it allows you to determine the use of Tor and other typical applications);
  • An experimental ability to compare with a selection from large data sets has been added, implemented using the new dataset and datarep operations. For example, the feature is applicable for searching masks in large blacklists with millions of entries;

Get more info at official website.