Recent Tag Groups


bash command-substitution environment-variables ruby shell-script text-processing
c environment-variables gcc git github ld linker linux shared-libraries
c code-formatting operators standards-compliance
c++ c++-faq constants reference temporary
c++ c++11
database-design postgresql
linux login nis permissions puppet user-management users
gnu-screen ssh

General Topics

Programming29266 Articles
Unix & Linux25939 Articles
System Administration & Network Administration24826 Articles
Information Security23678 Articles
Cryptography12741 Articles
Database Administration21913 Articles
Software Engineering23606 Articles
Theoretical Computer Science4937 Articles
General Computing24148 Articles


Topic: Programming

Recent Tags

amazon-s3 android angular appsettings arraylist ascii asp.net-core-mvc assembly authorization bash batch-file bluebird boost browser bucket button c c# c++ c++11 c++17 calling-convention captcha certificate character-encoding cloud clr configuration contravariance cpu-registers cygwin daemon database delimiter docker-compose dos dyld excel filesystems firefox-developer-edition flask for-loop forms frequency function git google-cloud-storage graph graphicimage handshake handwriting-recognition hash heroku http2 igraph inner-classes intervals ios ipa ipfs iterator jackson java java-threads javascript jquery-events keychain kubernetes linux machine-learning matlab matrix-multiplication mongodb mongohq mongoid move-semantics mysql nasm neural-network nltk node.js nosql octave ontouch ontouchlistener openid oracle oracle12c overloading php policy pom.xml posix postgresql postgresql-9.1 postgresql-9.2 precompiled-headers printf provisioning-profile pycrypto pycryptodome python python-dataclasses r rdbms react-native recursion reference-type rest rsa ruby-on-rails ruby-on-rails-3.1 rvalue-reference scapy self-tracking-entities service-accounts session shared-memory sidekiq smart-pointers spam spring spring-rabbit sqlplus stream swift tmux typescript ubuntu-11.10 unicode user-interface user-registration utf-8 value-type websocket window.location x86 x86-64 xampp xcode

Recent Articles

How to properly create and run concurrent tasks using python's asyncio module?

List Git aliases

Get timestamps with the same time_zone from all nodes in distributed system with Python

Why does argparse not accept "--" as argument?

For-loop over glob returns single string instead of list

Docker Build CLI Doesn’t update the code (TS, node)

Select matrix rows that are permutations of a given vector

Concatenate every two columns in dataframe

Fastest way to take the average of two signed integers in x86 assembly?

How to make dynamic bit width integers in C?

print the commands to delete node_modules folders recursively in a bash text file

Format Specifiers in C and their Roles?

Extract names of second [given] level of nested list in R

Copy value from one column to the next given a condition

How to configure git push to automatically set upstream without -u?




Topic: Unix & Linux

Recent Tags

acl alias ansible apache-httpd arch-linux archive array ascii awk bash bashrc block-device buffer bugs cache cd-command centos cfdisk clamav command command-substitution compression coreutils cryptsetup crypttab curl daemon dash data-recovery date dd debian devuan disk display-manager encryption fdisk file-copy files find freeze gawk gcc gdm gentoo gnu grep grub grub2 gzip hard-disk hashsum hdmi history hosts https indexing initramfs io iso keyboard-shortcuts lfs linux linux-kernel linux-mint logs make markdown mkfs mutt nemo networking openssl ownership permissions priority prompt ranger recoll regular-expression remote rename rhel rm rsyslog rxvt samba scripting sed sendmail seq serial-port services shell shell-script shutdown signals snapper socat split ssl stdout storage swap system-installation systemctl tabulation tape tar telnet temperature text-formatting text-processing timestamps tmux troubleshooting udev unicode unix-sockets upgrade user-default utilities version vga-cable vim xforwarding xkb xml zenbook zsh

Recent Articles

Are VirtualBox guest additions host-independent?

Can a Linux Swap Partition Be Too Big?

What is involved in a WSL "distribution"?

Is it possible to pass a bash array as a parameter to a function?

How to generate keys after creating user with adduser --disabled-password

How can I loop this command in a bash script until the repsonse contains the string "connection successful"

Perl: speed of s/// with variable in replacement

git diff: ignore comments

Trying to find complete string values from one file based on another file using AWK

Why unshare with chroot does not isolate /dev like /proc?

find the directory using pattern and delete the content, not the directory itself

"sort -h" not working correctly

Combine columns into one column (stack)

How do you get the child pid of `unshare` when using --fork for `nsenter -t <pid>`?

Print TCP connection specific socket options from Linux terminal (keepalive)




Topic: System Administration & Network Administration

Recent Tags

active-directory amazon-ec2 anti-virus apache-2.2 apache-2.4 application arch-linux arp azure bindings bonding bridge centos centos7 certbot certificate certificate-authority chef cidr cisco-vpn cname-record compression console cron daemon debian debian-buster diff directory-listing disaster-recovery dns-hosting domain domain-name-system drivers eap endpoint exchange-2003 fastcgi fdisk filesystems firewall gitlab godaddy google-chrome grub hadoop high-availability htop hyper-v hyper-v-server-2012-r2 i18n iis iis-7 incremental-backup intel io kubernetes kvm-virtualization lamp linux mariadb master-slave mdadm mediawiki memcached mod-proxy mx-record mysql nagios networking nfs numa outlook package-management partition pcap pci-express permissions php physical-to-virtual pki postfix postgresql profile puppet puppetmaster pxe-boot redirect refs remote scdpm search-and-replace security selinux sendgrid server-side-includes share sharepoint smtp software-raid spf sql-server sql-server-2008 ssl subdomain suexec suid switch symantec symantec-endpoint-protection synchronization tcpdump timeout tls ubuntu ubuntu-11.10 udev utf-8 vmware-esxi vmware-vcenter vpn wds web-applications web-server website windows windows-7 windows-sbs-2011 windows-server-2003 windows-server-2008 windows-server-2008-r2 windows-server-backup wmi workgroup zfs zfsonlinux

Recent Articles

Pod is stuck in PodInitializing status when an initContainer is OOMKilled

Transferring PDCEmulator FSMO role from Windows Server 2012R2 to 2022

Gmail does not accept mail from a new VPS server with PTR setup

(Windows) how to launch event viewer GUI console when dealing with huge log files?

Odd process appearing about every 18-20 minutes that runs 'apt-get --just-print dist-upgrade'

How to enable ssh for supporters with intelligent key management?

Support staff can reset some User passwords but not all?

ExecStart has a '-' prefix but the unit is still failed

Does the email size limit include the size of the body?

Should mail servers avoid sharing /64 ipv6 with others for reputation?

ISC DHCP/DDNS setup: Static entries for non-dhcp clients

Why SSH still works after applying SNAT and DNAT rules to forward ip (on the SSH server)?

postfix loops back to myself email issue (was working before apt upgrade Ubuntu)

Is there a way to programatically determine whether a Windows computer is AAD joined as SYSTEM?

Use an external subdomain as a zone in my local DNS server




Topic: Information Security

Recent Tags

access-control account-security active-directory adfs aircrack-ng api asymmetric authentication authorization bitcoin brute-force buffer-overflow c certificate-authority certificates chrome client cms code-signing compression content-security-policy crossdomain csrf data-leakage databases debian design-flaw devops digital-signature dkim dlp dnssec documentation domain domain-admin email email-attachments email-spoofing encryption exposure file-encryption file-system fingerprint fingerprinting forensics gnupg gps hash hmac hsm html-5 icloud integrity ip javascript john-the-ripper key key-exchange key-management keyloggers krack legal linux logging macos microsoft mobile monitoring network nonce openid openid-connect openssl openvpn operating-systems password-management password-policy passwords pci-dss penetration-test pepper phishing php privacy public-key-infrastructure reconnaissance rest sdlc secret-sharing sensitive-data-exposure session-management siem simcard single-page-app smtp sniffing spoofing sql-injection stack-overflow static-analysis tcp terminology threat-mitigation tls token ubuntu usb user-enumeration user-names user-tracking uwp validation virus vpn vulnerability web-application web-browser web-service websites whatsapp whitelist wifite windows windows-10 windows-8 worm wpa2 x.509

Recent Articles

Is it bad practice to have a 'super admin' - so they effectively bypass security checks in your system?

Do CloudFront edges talk to custom origins over open (non-AWS) networks?

Why did WebAuthn beat PAKEs as the preferred password replacement?

What happens to malicious traffic in a scrubbing center during a DDoS attack?

What is the name of this concept involving hashes?

Can DMARC's SPF alignment be spoofed?

Content-Type and Code Execution

Can static IP address be used as a component of MFA?

Why does anyone not use Let's Encrypt?

How do I keep Python Sockets secure for Multiplayer Games?

Any security concerns when importing self-signed certificate to Trusted Root certification Authorities store?

Malware file path

What are the methods to prevent and detect front-end behavior alterations in mobile apps?

Someone created a Disney+ account with my e-mail address. Are there any security concerns?

What is the best practice for relying parties to selectively trust certificates in a corporate pki hierarchy?




Topic: Cryptography

Recent Tags

advantage aes aes-gcm argon2 attack authenticated-encryption authentication bcrypt block-cipher blocksize brute-force-attack cbc commitments computational-complexity-theory cryptanalysis cryptocurrency ctr database decryption des deterministic-encryption diffie-hellman discrete-logarithm dsa ecb ecies elgamal-encryption elliptic-curves encoding encryption enigma error-propagation feistel-network file-encryption finite-field function-evaluation functional-encryption gcm group-theory hard-core-predicate hash hash-signature homomorphic-encryption information-theory initialization-vector key-derivation key-exchange keys lfsr lightweight mac matrix-multiplication meet-in-the-middle-attack modes-of-operation modular-arithmetic multiple-encryption negligible nist nonce notation nsa ntru oaep oblivious-transfer ofb one-time-pad one-way-function openssl padding padding-oracle paillier pairings password-hashing passwords pbkdf-2 permutation pgp pki poly1305 post-quantum-cryptography probability protocol-design pseudo-random-function pseudo-random-generator pseudo-random-permutation public-key puf random-number-generator reference-request replay-attack rijndael ring-lwe rsa s2k secp256k1 security-definition semantic-security sha-2 sha-256 signature simulation software-obfuscation stream-cipher terminology timing-attack tls tokenization trapdoor verifiability verifiable-random-function voting x25519 xor zero-knowledge-proofs

Recent Articles

Base64 or hex to attach auth tokens to URL?

How much security is gained from hiding the nonce?

(In)security of multiplicative blinding / one-time-pad in a commutative ring

Is there some restrictions on values of p,q,d,e etc in RSA algorithm while trying to encrypt English Ciphertext?

How to prevent the solution of a discrete logarithm problem from being found in a collision way by accident

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

Is constant-time compare really required for AEAD ciphers?

Is constant-time compare really required for AEAD ciphers?

How to encrypt data which never leave the client but can't be decrypted without the server?

Commutable and Composable Asymmetric Encryption/Decryption

Is there any way to (irrevocably) *transfer* a private key to another person?

Is there any way to (irrevocably) *transfer* a private key to another person?

Understanding the small cofactor attack with Elliptic Curves of non-prime order

Diffie-Hellman over $GF(2^{128})$




Topic: Database Administration

Recent Tags

amazon-rds archive availability-groups azure backup batch-mode bitmap-index blocking change-tracking clustering configuration constraint copy count cte data-warehouse database-design database-theory db2 db2-luw distributed-databases dmv error-log execution-plan failover format full-text-search functions galera greatest-n-per-group group-by index index-tuning innodb kerberos linux locking maintenance maintenance-plans mariadb mariadb-10.3 master-slave-replication memory metadata mongodb multi-master my.cnf mysql mysql-5 mysql-5.5 mysql-5.6 mysql-5.7 mysqldump natural-key optimization oracle oracle-10g oracle-12c order-by owner parallelism parameter-sniffing patroni performance performance-tuning permissions pgadmin postgis postgresql postgresql-8.4 postgresql-9.2 postgresql-performance powershell query-performance rac random read-only-database replication reporting restore san scan scheduled-tasks schema security select service-accounts service-broker smo sql-clr sql-server sql-server-2005 sql-server-2008 sql-server-2008-r2 sql-server-2012 sql-server-2014 sql-server-2016 sql-server-2017 sqlite sqlplus ssas ssis ssms star-schema statistics storage stored-procedures subquery syntax t-sql terminology transactional-replication update upgrade view xml xtrabackup

Recent Articles

What ports to open for sql server behind secure domain firewall

Poorly performing stored procedure using cached data while testing

Logical reads and LOB logical reads

Restore over dns alias fails with Operating system error 1326(The user name or password is incorrect.)

SQL: finding unique multi-column value triplet matching multiple rows?

Which versions of DataStax Enterprise have the fix for CVE-2020-13946?

Optimizing geolocation query in Postgres with earth_box and earth_distance

Incorrect Result When Doing String Concatenation With ORDER BY

Boolean flag in fact table

What affects log_send_rate in Normal or Distributed AG other than OS resources?

How to get the "best of both worlds" with natural and surrogate keys? And could DBMSs be better?

Oracle 19 - RMAN can't connect to database

Distinguish between "take-away orders" and "orders for a table"

Temporarily disable SELECT for one table (during an update)

How to create a table with an index that allows me to order by the time from now?




Topic: Software Engineering

Recent Tags

.net acceptance-testing ajax algorithms android api architecture arm asp.net-core azure binding bitwise-operators builds c c# c++ c++11 c++14 class-diagram cloud-computing code-formatting codeigniter compiler conditions conventions cpu data database-design defensive-programming dependencies deployment design design-by-contract development-process dictionary distributed-computing distributed-system division-of-labor documentation documentation-generation domain-driven-design eclipse encapsulation enum error-handling estimation ethics exception-handling exceptions feasibility functional-programming go google gpl grammar http http-request if-statement immutability imperative-programming information-theory inheritance ios java javascript jpa language-agnostic language-specifications languages law-of-demeter learning legacy-code legal libraries licensing liskov-substitution locks loops maintainability maintenance markup math metadata microservices mit-license multithreading mvvm namespace netbeans object-oriented packages perforce performance php pointers polymorphism programming-practices project-management python reactjs refactoring repository-pattern requirements scalability sdk selenium seo simulation singleton smart-pointer soa sql sql-server stack standard-library state static-access static-methods storage stored-procedures structured-programming surrogate-keys technical-debt terminology testing theory uml unit-testing unix version-control virtualization waterfall websockets wrapper

Recent Articles

Should test resource files be stored inside the Java class source directories?

How do I handle malformed compressed input data, which crashes external library?

What is the significance of reaching major version 1.0.0?

Does Garbage Collection Scan The Entire Memory?

What Semantic Version increment to use for a filename change?

Error or not error?

How much time should you spend planning a commit before writing code?

Multidimensional vs nested arrays

Designing an API for international markets

Referencing transient class attributes

When is it practical to design in advance of refactoring?

Why does GNU AS use different characters for single-line comments depending on the architecture?

What kind of queue should I use for processing large volume of data?

Semantic versioning on a dev dependencies change

Should I design a factory that returns a singleton?




Topic: Theoretical Computer Science

Recent Tags

ac0 agda algebraic-complexity approximation-algorithms ar.hardware-architecture average-case-complexity big-picture binary-decision-diagrams bipartite-graphs boolean-formulas boolean-functions cc.complexity-theory circuit-complexity circuit-families clique co.combinatorics coding-theory combinatorics communication-complexity complexity complexity-classes computability context-free continuations convex-hull convex-optimization counting-complexity cr.crypto-security curry-howard data-streams dc.parallel-comp dependent-type derandomization directed-acyclic-graph ds.algorithms ds.data-structures dynamic-algorithms encoding epsilon-nets examples factoring finite-fields fixed-parameter-tractable fl.formal-languages formal-methods graph-algorithms graph-classes graph-isomorphism graph-theory high-dimensional-geometry implementation interactive-proofs it.information-theory lambda-calculus linear-algebra linear-temporal-logic lo.logic lower-bounds machine-learning matching matrices mu-calculus na.numerical-analysis ni.networking-internet nondeterminism normalization np np-complete np-hardness optimization parameterized-complexity parsing pcp permanent pl.programming-languages polynomial-hierarchy polynomial-time polynomials polytope pr.probability promise-problems proof-assistants property-testing pseudorandom-generators qma quantum-computing random-oracles randomized-algorithms randomness reductions reference-request sample-complexity sat search-problem separation soft-question sorting space-bounded sparse-matrix st.statistics streaming streaming-algorithms survey topology tree treewidth turing-machines type-inference type-systems typed-lambda-calculus undecidability unique-solution vc-dimension

Recent Articles

Randomized communication complexity of or-of-equalities

Quadratic lower bound

Hardness of a class of quadratics

Hardness of a class of quadratics

Best known algorithm for NEXP-complete problem

Similarities and differences between Pie and popular languages with dependent types

Is there FPT or XP algorithms knowm for Shortest Steiner cycle and $(a,b)$-Steiner path problem

Question about algorithm for enumerating minimal AB-separators

Sample complexity lower bound to learn the mode (the value with the highest probability) of a distribution with finite support

What are the application of Scott-Topology in theoretical computer science?

Are there survey papers in theoretical computer science?

Complexity of the Complete (3,2) SAT problem?

Are there 'poision-pill' research questions in TCS?

Can you always throw away the types when evaluating lambda expressions?

Does double majoring with math in undergrad help one grasp TCS topics more easier?




Topic: General Computing

Recent Tags

adobe-photoshop alsa amd-ryzen arch-linux audio authentication autorun awesome-wm bash batch-file battery-life bios boot boot-camp browser centos cmd.exe command-line compatibility conversion copy-paste cryptography ddr3 debian dell-latitude disk-space dns download drivers echo efi emf encryption environment-variables ethernet fedora-11 ffmpeg file-search filesystems format gnome-terminal gpt gpu grub gvim hard-drive home-server hostname hosts hyper-v image-editing installation intel-rapid-start internet itunes links linux lvm macbook macos malware metadata microsoft-excel microsoft-excel-2016 microsoft-outlook-2007 microsoft-powerpoint microsoft-word microsoft-word-2007 minecraft motherboard mount multi-boot network-shares networking notepad++ ntfs nvidia-graphics-card office365 openssl operating-systems partitioning pdf performance physical-wear pivot-table plugins port-forwarding power power-supply proxy ps putty r reboot requirements resharper router sata sed shutdown smb sorting spotify ssh sshd tab-completion team-foundation-server thumbs.db tls tor tree-view troubleshooting ubuntu uefi unix usb user-profiles virtual-machine virtualbox visual-studio-2012 visual-studio-2013 visual-studio-2015 vmware-workstation vpn windows windows-10 windows-10-upgrade windows-10-v1607 windows-7 windows-8.1 windows-backup windows-installation windows-update wireless-router word-processing xfce xml zsh

Recent Articles

Where should DNS and DHCP servers be located?

How to curl case-insensitive

Debian/testing Linux on an encrypted LVM - filesystem intensive operations cause system to freeze and crash system-journald service

Support of the \\?\UNC\server\share syntax in Windows

Why is the Actual RAM Size Less Than It States?

Windows: How to make cygwin bash.exe to take precedence over wsl in command line?

Object reached heap limit - debugging a Javascript SIGILL error on Chrome?

IP payload compression with xfrm

Dual Boot between Win 7 and Win 11

How to securely erase an NVMe SSD that won't boot?

Excel Function: How often does X fit in Y

Disabling everything except letters in browser- and on OS-level

Issue with IF statement in Libreoffice Calc

How does UEFI know which bootloader configuration to use

Which network interface does my VPN use?