Recent Tag Groups

authentication c# cryptography encryption hash password-protection passwords pkcs#5 salt security string
apache-http-server dns firefox internet-explorer networking
adblock browser-addons firefox firefox-extensions
centos firewall linux vnc
freeipa gssapi kerberos ldap linux sasl security ssh windows-server-2012
command-line file-management linux

General Topics

Programming30065 Articles
Unix & Linux27253 Articles
System Administration & Network Administration25772 Articles
Information Security24603 Articles
Cryptography12747 Articles
Database Administration23027 Articles
Software Engineering24191 Articles
Theoretical Computer Science4940 Articles
General Computing25459 Articles

Topic: Programming

Recent Tags

absolute-path abstract-class ajax amazon-elastic-beanstalk amazon-route53 amazon-s3 amazon-web-services arguments arrays awk aws-sdk bash bitbucket-pipelines c# c++ cat classpath cloud cluster-computing colors compiler-errors context-info credentials curl dataframe distribution docker driver eloquent environment-variables etcd filesystems fortran function gcc getline gfortran gnu-parallel gnu-screen google-chrome-devtools grep gssapi gzip helper higher-kinded-types html-post ikvm indexing interface io java javascript json kerberos laravel laravel-5 libcurl linker linux list macos magento-1.9 mern mesosphere meteor migration mingw module multiprocessing mv naming-conventions node.js numa numpy object ocr openstack pandas parallel-processing parallels performance perl php pip pipe posix postgresql postgresql-performance profiling pry ps python python-2.7 python-3.x python-tesseract pythonpath ractivejs regex resque rocks ruby-on-rails rvalue samba scp sed setsid setupapi setuptools shared-memory shell sign sparse-file split spn spring sql sql-server ssh stat static-linking symlink syntax tee terminal testing triggers tsql unicode unix utf-8 virtual-machine visual-studio-2008 visual-studio-code window-functions windows xargs zend-server

Recent Articles

How to properly create and run concurrent tasks using python's asyncio module?

List Git aliases

Get timestamps with the same time_zone from all nodes in distributed system with Python

Why does argparse not accept "--" as argument?

For-loop over glob returns single string instead of list

Docker Build CLI Doesn’t update the code (TS, node)

Select matrix rows that are permutations of a given vector

Concatenate every two columns in dataframe

Fastest way to take the average of two signed integers in x86 assembly?

How to make dynamic bit width integers in C?

print the commands to delete node_modules folders recursively in a bash text file

Format Specifiers in C and their Roles?

Extract names of second [given] level of nested list in R

Copy value from one column to the next given a condition

How to configure git push to automatically set upstream without -u?

Topic: Unix & Linux

Recent Tags

acpi administration aix amazon-ec2 apt arch-linux authentication autocomplete awk background-process banner bash bash-expansion bashrc centos chown colors command command-history command-line command-substitution compiling configuration console cron curl debian dependencies docker domain encryption environment-variables exec fedora ffmpeg fifo file-descriptors filenames fork gentoo gnome-terminal gnu-parallel grep gui here-document hhvm i18n icons init.d io-redirection iw jobs join json kde kernel kill ksh kubuntu lfs licenses linux linux-mint locale locate logout logs make memory motd nouveau open-files opensuse permissions pipe process prompt python readline readlink reboot regular-expression remote-management replace root root-filesystem scientific-linux scripting security sed shell shell-script signals special-characters ssh ssh-tunneling stdin su sudo symlink syntax systemd systemd-journald systemd-unit tar tee terminal terminology trap tty ubuntu umask upgrade variable veracrypt vnc xv6 yum zip zsh zypper

Recent Articles

Bash, use case statement to check if the word is in the array

Double fork() - why?

Start 100 process at a time in bash script

Are VirtualBox guest additions host-independent?

Can a Linux Swap Partition Be Too Big?

How to get specific fields of JSON objects for which another field is true

What is involved in a WSL "distribution"?

Is it possible to pass a bash array as a parameter to a function?

mv: A and B are the same file

How to generate keys after creating user with adduser --disabled-password

bash + monitor disk space usage and execute script if used space reached the threshold

How can I loop this command in a bash script until the repsonse contains the string "connection successful"

Perl: speed of s/// with variable in replacement

git diff: ignore comments

Trying to find complete string values from one file based on another file using AWK

Topic: System Administration & Network Administration

Recent Tags

active-directory amazon-ec2 apache-2.2 apache-2.4 apache-mesos apt aptitude arch-linux azure backend backuppc bash busybox byobu centos centos6 cgroup chroot cloud-computing cluster command-line-interface connection cpu-usage cygwin debian desktop domu dpkg dsc eclipse email environment-variables epel file-permissions forwarding freebsd ftp git gitlab gnu-screen gridengine group-policy grub grub2 hook hyper-v ifconfig init.d internet ipsec jboss jenkins job-control kde kvm-virtualization lamp ldap less linux lxc masquerade max-file-descriptors memory mikrotik mpm-prefork mysql nis nobody node.js ntfs openldap openswan openvpn pam-ldap partition perforce permissions php-fpm port port-forwarding postgresql powershell ps qemu qnap rc.local rocky-linux rsync rvm scp security sftp sles ssh ssh-keygen ssh-keys ssh-tunnel ssl startup-scripts su sudo tap tc telnet terminal-server tun ubuntu ubuntu-16.04 ubuntu-20.04 ulimit umask unix-shell user-management user-permissions virtual-machines vpn vpn-client vps web-hosting web-server windows windows-server-2003 windows-server-2008 windows-server-2008-r2 write yp zabbix zimbra

Recent Articles

Pod is stuck in PodInitializing status when an initContainer is OOMKilled

Transferring PDCEmulator FSMO role from Windows Server 2012R2 to 2022

Gmail does not accept mail from a new VPS server with PTR setup

Domain Controller DNS alias

(Windows) how to launch event viewer GUI console when dealing with huge log files?

Odd process appearing about every 18-20 minutes that runs 'apt-get --just-print dist-upgrade'

How to enable ssh for supporters with intelligent key management?

Support staff can reset some User passwords but not all?

ExecStart has a '-' prefix but the unit is still failed

Does the email size limit include the size of the body?

Should mail servers avoid sharing /64 ipv6 with others for reputation?

ISC DHCP/DDNS setup: Static entries for non-dhcp clients

ZFS and SAN: issue with data scrubbing

Why SSH still works after applying SNAT and DNAT rules to forward ip (on the SSH server)?

postfix loops back to myself email issue (was working before apt upgrade Ubuntu)

Topic: Information Security

Recent Tags

access-control apache api appsec asymmetric attack-vector attacks authentication backdoor banks boot brute-force burp-suite c++ cdn certificate-authority certificates challenge-response chrome cloud-storage cryptography csrf ctf denial-of-service dhcp digital-signature directory-traversal e-commerce email email-spoofing encoding encryption exploit exploit-development file-access file-system firefox firewalls forensics freebsd gaming gmail gnupg google gpg4win gssapi hash hashicorp-vault html infection-vector injection integrity iphone ipsec kali-linux kerberos keyloggers kleopatra known-vulnerabilities linux logging malware md5 memory metasploit mod-security mongodb mysql network node.js objective-c openpgp openssl operating-systems password-management passwords pci-dss pem php phpmyadmin privacy process protection public-key remote-server reverse-engineering router rsa sha shellshock silverlight snooping sql-injection tamper-resistance tcpdump threats tls tls-downgrade token tor totp trust uac ubuntu url user-names virus vpn vulnerability web-application web-browser web-of-trust web-scanners web-service whitelist wifi windows windows-10 wireless wpa2 xss

Recent Articles

Is it bad practice to have a 'super admin' - so they effectively bypass security checks in your system?

Do CloudFront edges talk to custom origins over open (non-AWS) networks?

Why did WebAuthn beat PAKEs as the preferred password replacement?

What happens to malicious traffic in a scrubbing center during a DDoS attack?

What is the name of this concept involving hashes?

Can DMARC's SPF alignment be spoofed?

ThinkShield secure wipe - SSD does it forbid data recovering?

Content-Type and Code Execution

SQLMAP setting parameter

What is the purpose of the critical flag being enabled (128) on a CAA IODEF record?

Can static IP address be used as a component of MFA?

Why does anyone not use Let's Encrypt?

How do I keep Python Sockets secure for Multiplayer Games?

Any security concerns when importing self-signed certificate to Trusted Root certification Authorities store?

Malware file path

Topic: Cryptography

Recent Tags

advantage aes aes-gcm argon2 attack authenticated-encryption authentication bcrypt block-cipher blocksize brute-force-attack cbc commitments computational-complexity-theory cryptanalysis cryptocurrency ctr database decryption deterministic-encryption diffie-hellman discrete-logarithm dsa ecb ecies elgamal-encryption elliptic-curves encoding encryption enigma entropy error-propagation feistel-network file-encryption finite-field function-evaluation gcm group-theory hard-core-predicate hash hash-signature homomorphic-encryption implementation information-theory initialization-vector key-derivation key-exchange keys lfsr lightweight mac matrix-multiplication meet-in-the-middle-attack modes-of-operation modular-arithmetic multiple-encryption negligible nist nonce notation nsa ntru oaep oblivious-transfer ofb one-time-pad one-way-function openssl padding padding-oracle pairings password-hashing passwords pbkdf-2 permutation pgp pki poly1305 post-quantum-cryptography probability protocol-design pseudo-random-function pseudo-random-generator pseudo-random-permutation public-key puf random-number-generator randomness replay-attack rijndael ring-lwe rsa s2k secp256k1 security-definition semantic-security sha-2 sha-256 signature simulation software-obfuscation stream-cipher terminology timing-attack tls tokenization trapdoor verifiability verifiable-random-function voting x25519 xor zero-knowledge-proofs

Recent Articles

Should we really rely on "Cryptographically Secure Pseudo-Random Number Generators" (CSPRNG) alone to guarantee secure random output?

Solving system of equation based on RSA

Base64 or hex to attach auth tokens to URL?

How much security is gained from hiding the nonce?

(In)security of multiplicative blinding / one-time-pad in a commutative ring

Is there some restrictions on values of p,q,d,e etc in RSA algorithm while trying to encrypt English Ciphertext?

How to prevent the solution of a discrete logarithm problem from being found in a collision way by accident

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

Is constant-time compare really required for AEAD ciphers?

Is constant-time compare really required for AEAD ciphers?

How to encrypt data which never leave the client but can't be decrypted without the server?

Commutable and Composable Asymmetric Encryption/Decryption

Is there any way to (irrevocably) *transfer* a private key to another person?

Is there any way to (irrevocably) *transfer* a private key to another person?

Topic: Database Administration

Recent Tags

aggregate alter-table application-design array authentication autovacuum availability-groups azure backup bulk-insert business-intelligence clob clustered-index columnstore composite-types count cte cursors data-warehouse database-design database-recommendation datatypes date-format ddl deadlock dependencies deployment dml dmv docker dump dynamic-sql erd failover fields functions greatest-n-per-group group-by high-availability identity index index-tuning information-schema inheritance insert java join json limits localization mariadb mariadb-10.3 memory mongodb ms-access mysql mysql-5.6 mysqldump naming-convention neo4j normalization operator oracle order-by percona performance permissions pg-dump pg-restore plpgsql plsql polymorphic-associations postgresql postgresql-9.3 postgresql-9.4 postgresql-9.6 postgresql-performance primary-key psql query-performance rdbms relational-theory replication role schema security select set-returning-functions snapshot-isolation spatial sql-server sql-server-2005 sql-server-2008 sql-server-2008-r2 sql-server-2012 sql-server-2014 sql-server-2016 sqlite ssd ssis ssl ssms stored-procedures system-databases t-sql tablespaces temporary-tables terminology timezone trigger ubuntu unique-constraint update vldb waits xml

Recent Articles

Use square brackets on extended events filter

What ports to open for sql server behind secure domain firewall

Poorly performing stored procedure using cached data while testing

Logical reads and LOB logical reads

Restore over dns alias fails with Operating system error 1326(The user name or password is incorrect.)

SQL: finding unique multi-column value triplet matching multiple rows?

Which versions of DataStax Enterprise have the fix for CVE-2020-13946?

Optimizing geolocation query in Postgres with earth_box and earth_distance

Incorrect Result When Doing String Concatenation With ORDER BY

Boolean flag in fact table

What affects log_send_rate in Normal or Distributed AG other than OS resources?

How to get the "best of both worlds" with natural and surrogate keys? And could DBMSs be better?

Oracle 19 - RMAN can't connect to database

Distinguish between "take-away orders" and "orders for a table"

Temporarily disable SELECT for one table (during an update)

Topic: Software Engineering

Recent Tags

.net algorithms api-design architecture array benchmarking big-o binding c# class clean-code code-complete code-quality code-smell collections complexity component composition computer-architecture constructors copy-protection cpu cqrs cron css3 data data-structures database declarations decompile decorator definition dependency-inversion design design-patterns desktop-application development-process domain-driven-design domain-model domain-specific-languages efficiency email error-handling event-programming event-sourcing export f# file-storage files formal-methods functional-programming garbage-collection git inheritance interfaces internet inversion-of-control io ios ipad java javascript json jvm laravel libraries linked-list locks merging methods microservices modeling modularization multiple-inheritance mvc mysql oauth2 object-oriented object-oriented-design openid performance php plugin-architecture plugins pointers polymorphism problem-solving procedural programming-practices project-management read-model recursion regular-expressions requirements ruby scala scheduling scope server single-responsibility sockets software-distribution solid source-code sql sql-server state stored-procedures technical-debt third-party-libraries transaction type-casting type-conversion version-control versioning wcf web web-api web-applications web-development web-services wpf xml

Recent Articles

Should test resource files be stored inside the Java class source directories?

How can I efficiently diff a CSV file against a database?

How do I handle malformed compressed input data, which crashes external library?

What is the significance of reaching major version 1.0.0?

Does Garbage Collection Scan The Entire Memory?

What Semantic Version increment to use for a filename change?

Error or not error?

How much time should you spend planning a commit before writing code?

Does it always take the same amount of time to retrieve the same thing from collection?

Multidimensional vs nested arrays

Designing an API for international markets

Referencing transient class attributes

When is it practical to design in advance of refactoring?

Why does GNU AS use different characters for single-line comments depending on the architecture?

What kind of queue should I use for processing large volume of data?

Topic: Theoretical Computer Science

Recent Tags

ac0 agda algebraic-complexity approximation-algorithms ar.hardware-architecture average-case-complexity big-picture binary-decision-diagrams bipartite-graphs boolean-formulas boolean-functions calculus-of-constructions cc.complexity-theory circuit-complexity circuit-families clique co.combinatorics coding-theory combinatorics communication-complexity complexity complexity-classes computability context-free continuations convex-hull counting-complexity cr.crypto-security curry-howard data-streams dc.parallel-comp dependent-type derandomization directed-acyclic-graph ds.algorithms dynamic-algorithms encoding epsilon-nets examples factoring finite-fields fixed-parameter-tractable fl.formal-languages formal-methods graph-algorithms graph-classes graph-isomorphism graph-theory high-dimensional-geometry implementation interactive-proofs it.information-theory lambda-calculus linear-algebra linear-temporal-logic lo.logic lower-bounds machine-learning matching matrices mu-calculus na.numerical-analysis ni.networking-internet nondeterminism normalization np np-complete np-hardness optimization parameterized-complexity parsing pcp permanent pl.programming-languages polynomial-hierarchy polynomial-time polynomials polytope pr.probability promise-problems proof-assistants property-testing pseudorandom-generators qma quantum-computing random-oracles randomized-algorithms randomness reductions reference-request sample-complexity sat search-problem separation soft-question sorting space-bounded sparse-matrix st.statistics streaming streaming-algorithms survey topology tree treewidth turing-machines type-inference type-systems type-theory typed-lambda-calculus undecidability unique-solution vc-dimension

Recent Articles

Dependent type theory and definitions of cumulativity

Expected number of random comparisons needed to sort a list

Defining normalization with respect to judgmental equality instead of reduction

Randomized communication complexity of or-of-equalities

Quadratic lower bound

Hardness of a class of quadratics

Hardness of a class of quadratics

Best known algorithm for NEXP-complete problem

Similarities and differences between Pie and popular languages with dependent types

Is there FPT or XP algorithms knowm for Shortest Steiner cycle and $(a,b)$-Steiner path problem

Question about algorithm for enumerating minimal AB-separators

Sample complexity lower bound to learn the mode (the value with the highest probability) of a distribution with finite support

What are the application of Scott-Topology in theoretical computer science?

Are there survey papers in theoretical computer science?

Complexity of the Complete (3,2) SAT problem?

Topic: General Computing

Recent Tags

.bash-profile 64-bit acl address-bar append autohotkey automation awk backup bash bashrc batch beyondcompare boot browser browser-tabs browsing centos certificate compact-disc cookies cron curl cygwin dbus debian desktop dictionary email export fdisk file-management firefox gnome gnu-screen google-chrome google-search head infinite-loop internet-explorer jira kernel key-binding keyboard linux logging mac macfuse macos metadata microsoft-outlook-2007 microsoft-word mouseless msysgit ntfs opensuse opera-10 pdf pentadactyl perl permissions pki plist port-forwarding powershell priority proxy putty python redhat-enterprise-linux redirection rubygems safari script scrolling search-engines security sed shell shell-script socks5 sorting split-window ssh sshd ssl ssl-certificate strace sudo tabbed-browsing telnet terminal text-manipulation thumbnails tmux trusted-root-ca tunnel ubuntu udev uniq upstart usb-flash-drive usb-storage vim virtual-host virtual-machine vnc vpn wamp wayland windows windows-10 windows-7 windows-backup windows-server-2012 windows-subsystem-for-linux windows-vista word-processing x11-forwarding xampp xinput xorg xubuntu youtube

Recent Articles

Excel - Lookup exact match in one column and exact or next higher match in another column

Where should DNS and DHCP servers be located?

How to curl case-insensitive

Debian/testing Linux on an encrypted LVM - filesystem intensive operations cause system to freeze and crash system-journald service

Support of the \\?\UNC\server\share syntax in Windows

Find and replace in Notepad++: How to insert above line with same amount of indents?

Why is the Actual RAM Size Less Than It States?

Windows: How to make cygwin bash.exe to take precedence over wsl in command line?

Object reached heap limit - debugging a Javascript SIGILL error on Chrome?

IIS How can I produce a continuous log stream?

What is meant to be plugged into the USB connector labelled "Touch" on thjs screen?

IP payload compression with xfrm

Dual Boot between Win 7 and Win 11

What is ctrl-; doing in Gnome Terminal and Emacs?

How to securely erase an NVMe SSD that won't boot?