Recent Tag Groups

mysql root sudo users
environment-variables fonts java postgresql postgresql-10
at environment-variables gnu-screen jenkins shell zsh
c exec linux multithreading pipe process
centos subversion vpn
chmod debian filesystems mdadm mount permissions raid raspbian shell udev usb vfat
arrays comparison-operators css equality equality-operator instanceof javascript operators performance
datetime idioms if-statement python python-datetime pytz r timezone
dictionary merge python string substring

General Topics

Programming30002 Articles
Unix & Linux27161 Articles
System Administration & Network Administration25684 Articles
Information Security24592 Articles
Cryptography12746 Articles
Database Administration22971 Articles
Software Engineering24181 Articles
Theoretical Computer Science4939 Articles
General Computing25354 Articles

Topic: Programming

Recent Tags

aes ajax alpine-linux amazon-cloudformation amazon-web-services ambiguous-grammar api autocommit awk bash bitbucket blob bouncycastle browser c c++ classpath cluster-computing command-line command-substitution compression constant-expression credentials curl daemon dask database dbmigrate directory distribution django django-validation docker docker-compose dom-events driver email environment-variables f# for-loop fork fxcop git git-post-receive github gitolite google-chrome google-chrome-devtools grep gzip heroku higher-kinded-types homebrew hook hpc import importerror intervention java javascript jobs jquery json jvm jwt kernel-module laravel libcurl libusb linux lsf macos macos-catalina makefile memory-leaks mern mesos mesosphere mingw module multithreading mysql node-sass node.js off-screen openssl operating-system padrino path php posix postgresql process pry python python-3.x pythonpath qmake qt rake repository rocks ruby ruby-on-rails ruby-on-rails-3 rvalue security setsid setupapi sh shell sign single-instance split sqldatatypes ssh stack status storage string syntax tcp tee time tsql ubuntu-14.04 unix visual-studio widevine windows x509certificate xargs yii

Recent Articles

How to properly create and run concurrent tasks using python's asyncio module?

List Git aliases

Get timestamps with the same time_zone from all nodes in distributed system with Python

Why does argparse not accept "--" as argument?

For-loop over glob returns single string instead of list

Docker Build CLI Doesn’t update the code (TS, node)

Select matrix rows that are permutations of a given vector

Concatenate every two columns in dataframe

Fastest way to take the average of two signed integers in x86 assembly?

How to make dynamic bit width integers in C?

print the commands to delete node_modules folders recursively in a bash text file

Format Specifiers in C and their Roles?

Extract names of second [given] level of nested list in R

Copy value from one column to the next given a condition

How to configure git push to automatically set upstream without -u?

Topic: Unix & Linux

Recent Tags

acpi alias alpine-linux amazon-ec2 apache-httpd array autocorrection bash bash-expansion bash-script bashrc centos chmod chroot colors columns command command-history command-line command-substitution configuration console container conventions cron daemon datascience-anaconda debian desktop-environment diff docker domain environment-variables escape-characters exec fedora ffmpeg find firewall fish framebuffer function gcc gnome gnome-terminal gnu-screen grep history init-script io-redirection iproute iptables iw kill ksh lan lfs linux linux-mint locale login logout logs mawk mktemp mv mysql ncurses openvpn out-of-memory output pam parameter partition path pipe port pptp process productivity prompt ps python python3 quoting read recursive regular-expression remote-management replace reproducible-build root-filesystem rpmbuild sata scripting services shell shell-script software-rec ssh stdin stdout su synology systemd sysvinit tar tcpdump tee telnet terminal tray tshark tty ufw variable variable-substitution vfat w watch webdav who wpa-cli xubuntu zsh zypper

Recent Articles

Bash, use case statement to check if the word is in the array

Double fork() - why?

Start 100 process at a time in bash script

Are VirtualBox guest additions host-independent?

Can a Linux Swap Partition Be Too Big?

How to get specific fields of JSON objects for which another field is true

What is involved in a WSL "distribution"?

Is it possible to pass a bash array as a parameter to a function?

mv: A and B are the same file

How to generate keys after creating user with adduser --disabled-password

bash + monitor disk space usage and execute script if used space reached the threshold

How can I loop this command in a bash script until the repsonse contains the string "connection successful"

Perl: speed of s/// with variable in replacement

git diff: ignore comments

Trying to find complete string values from one file based on another file using AWK

Topic: System Administration & Network Administration

Recent Tags

active-directory amazon-ec2 amazon-linux amazon-web-services anaconda ansible ansible-tower apache-2.2 at authentication bash bridge centos centos6.4 centos7 chroot cisco cloudlinux curl daemon digital-signatures disk-space-utilization django docker domu epel expect file-sharing filesystems forwarding gcc gentoo grep ifconfig ilo image initramfs ios ip-forwarding iptables irq jboss journald kerberos kernel kernel-modules kubeadm kubernetes language-packs ldap linux linux-networking localhost log-files mac-osx mariadb masquerade mikrotik mitkerberos mod-wsgi mpm-prefork munin mysql nat networking nginx omnios open-source openstack openvpn pam pam-ldap partition passwd performance-counters performance-monitoring php php-fpm php7 port-forwarding postgresql proxy ps redhat redirect redirection redmine regex remote rm rocky-linux rootkit routing rpm scripting security setuid sftp share shell squid ssh ssh-keygen ssh-keys ssh-tunnel ssl-certificate su supervisord tcp tcpdump telnet tomcat tunneling ubuntu ubuntu-14.04 ubuntu-16.04 ubuntu-9.10 umask unix user-permissions vpn web-server wget windows windows-7 wsgi wsus x11 x11forwarding yum

Recent Articles

Pod is stuck in PodInitializing status when an initContainer is OOMKilled

Transferring PDCEmulator FSMO role from Windows Server 2012R2 to 2022

Gmail does not accept mail from a new VPS server with PTR setup

Domain Controller DNS alias

(Windows) how to launch event viewer GUI console when dealing with huge log files?

Odd process appearing about every 18-20 minutes that runs 'apt-get --just-print dist-upgrade'

How to enable ssh for supporters with intelligent key management?

Support staff can reset some User passwords but not all?

ExecStart has a '-' prefix but the unit is still failed

Does the email size limit include the size of the body?

Should mail servers avoid sharing /64 ipv6 with others for reputation?

ISC DHCP/DDNS setup: Static entries for non-dhcp clients

ZFS and SAN: issue with data scrubbing

Why SSH still works after applying SNAT and DNAT rules to forward ip (on the SSH server)?

postfix loops back to myself email issue (was working before apt upgrade Ubuntu)

Topic: Information Security

Recent Tags

access-control aircrack-ng anonymity apache appsec asymmetric attack-vector attacks authentication authorization backdoor banks boot brute-force burp-suite c++ cdn certificates challenge-response chrome ciphers cloud-storage configuration cryptography csrf ctf databases dhcp directory-traversal e-commerce email email-spoofing encryption exploit exploit-development file-access firewalls forensics freebsd gmail gnupg google gpg4win gssapi hash hashicorp-vault html infection-vector integrity investigation iphone java kali-linux kerberos keyloggers kleopatra known-vulnerabilities linux logging macos malware md5 memory metasploit mod-security mongodb mysql network node.js objective-c openpgp operating-systems password-management passwords pci-dss pem performance pgp php phpmyadmin privacy process public-key python remote-server reverse-engineering router rsa saml sha shellshock silverlight sms sniffing snooping sql-injection tcpdump threats tls tls-downgrade token tor totp trust ubuntu url user-names virus virus-removal vpn vulnerability web-application web-authentication web-browser web-of-trust web-scanners web-service webauthn whitelist wifi windows windows-10 wireless wpa2 xmlrpc xss

Recent Articles

Is it bad practice to have a 'super admin' - so they effectively bypass security checks in your system?

Do CloudFront edges talk to custom origins over open (non-AWS) networks?

Why did WebAuthn beat PAKEs as the preferred password replacement?

What happens to malicious traffic in a scrubbing center during a DDoS attack?

What is the name of this concept involving hashes?

Can DMARC's SPF alignment be spoofed?

ThinkShield secure wipe - SSD does it forbid data recovering?

Content-Type and Code Execution

SQLMAP setting parameter

What is the purpose of the critical flag being enabled (128) on a CAA IODEF record?

Can static IP address be used as a component of MFA?

Why does anyone not use Let's Encrypt?

How do I keep Python Sockets secure for Multiplayer Games?

Any security concerns when importing self-signed certificate to Trusted Root certification Authorities store?

Malware file path

Topic: Cryptography

Recent Tags

advantage aes aes-gcm argon2 attack authenticated-encryption authentication bcrypt block-cipher blocksize brute-force-attack cbc commitments computational-complexity-theory cryptanalysis cryptocurrency ctr database decryption deterministic-encryption diffie-hellman discrete-logarithm dsa ecb ecies elgamal-encryption elliptic-curves encoding encryption enigma entropy error-propagation feistel-network file-encryption finite-field function-evaluation gcm group-theory hard-core-predicate hash hash-signature homomorphic-encryption implementation information-theory initialization-vector key-derivation key-exchange keys lfsr lightweight mac matrix-multiplication meet-in-the-middle-attack modes-of-operation modular-arithmetic multiple-encryption negligible nist nonce notation nsa ntru oaep ofb one-time-pad one-way-function openssl padding padding-oracle pairings password-hashing passwords pbkdf-2 permutation pgp pki poly1305 post-quantum-cryptography probability protocol-design pseudo-random-function pseudo-random-generator pseudo-random-permutation public-key puf random-number-generator randomness reference-request replay-attack rijndael ring-lwe rsa s2k secp256k1 security-definition semantic-security sha-2 sha-256 signature simulation software-obfuscation stream-cipher terminology timing-attack tls tokenization trapdoor verifiability verifiable-random-function voting x25519 xor zero-knowledge-proofs

Recent Articles

Should we really rely on "Cryptographically Secure Pseudo-Random Number Generators" (CSPRNG) alone to guarantee secure random output?

Solving system of equation based on RSA

Base64 or hex to attach auth tokens to URL?

How much security is gained from hiding the nonce?

(In)security of multiplicative blinding / one-time-pad in a commutative ring

Is there some restrictions on values of p,q,d,e etc in RSA algorithm while trying to encrypt English Ciphertext?

How to prevent the solution of a discrete logarithm problem from being found in a collision way by accident

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

NIST example shows extra hexadecimal characters in Block Contents of SHA512-256

Is constant-time compare really required for AEAD ciphers?

Is constant-time compare really required for AEAD ciphers?

How to encrypt data which never leave the client but can't be decrypted without the server?

Commutable and Composable Asymmetric Encryption/Decryption

Is there any way to (irrevocably) *transfer* a private key to another person?

Is there any way to (irrevocably) *transfer* a private key to another person?

Topic: Database Administration

Recent Tags

aggregate alter-table autovacuum availability-groups azure backup bulkcopy candidate-key cardinality-estimates clustered-index command-line composite-types connectivity count csv cte cursors data-warehouse database-design database-recommendation db2 ddl deadlock delete deployment dump dynamic-sql execution-plan fields filtered-index graph group-by high-availability identity index insert isolation-level java json limits linux localization locking mac-os-x mongodb ms-access mysql mysql-5.6 neo4j normalization nosql operator optimization oracle oracle-11g oracle-12c partitioning performance permissions pg-dump pg-restore pivot plpgsql plsql postgresql postgresql-10 postgresql-9.3 postgresql-9.6 postgresql-performance primary-key psql python query-performance replication schema security select sequence set-returning-functions snapshot-isolation spatial sql-server sql-server-2005 sql-server-2008 sql-server-2008-r2 sql-server-2012 sql-server-2014 sql-server-2016 sql-server-2017 sqlite ssd ssl ssms star-schema storage-engine stored-procedures string-splitting sybase sybase-ase-15.7 system-databases t-sql tablespaces temporary-tables terminology timezone transaction trigger ubuntu unique-constraint vacuum varchar view vldb waits xml xtradb-cluster

Recent Articles

Use square brackets on extended events filter

What ports to open for sql server behind secure domain firewall

Poorly performing stored procedure using cached data while testing

Logical reads and LOB logical reads

Restore over dns alias fails with Operating system error 1326(The user name or password is incorrect.)

SQL: finding unique multi-column value triplet matching multiple rows?

Which versions of DataStax Enterprise have the fix for CVE-2020-13946?

Optimizing geolocation query in Postgres with earth_box and earth_distance

Incorrect Result When Doing String Concatenation With ORDER BY

Boolean flag in fact table

What affects log_send_rate in Normal or Distributed AG other than OS resources?

How to get the "best of both worlds" with natural and surrogate keys? And could DBMSs be better?

Oracle 19 - RMAN can't connect to database

Distinguish between "take-away orders" and "orders for a table"

Temporarily disable SELECT for one table (during an update)

Topic: Software Engineering

Recent Tags

.net agile algorithms anti-patterns array benchmarking big-o binding bit c c# class clean-code code-complete code-smell comparison complexity component composition computer-architecture constructors copy-protection cpu cqrs cron css3 data database database-design declarations decompile decorator definition design design-patterns desktop-application development-process documentation domain-driven-design domain-model domain-specific-languages dry efficiency email error-handling event-programming event-sourcing exceptions export f# file-storage files formal-methods functional-programming garbage-collection git gui-design html5 inheritance internet interview inversion-of-control io ios ipad iterative-development java javascript json jvm lazy-initialization libraries locks machine-code matrices memory merging methods microservices modularization multiple-inheritance mvc mysql networks oauth2 object-oriented object-oriented-design openid php plugin-architecture plugins pointers polymorphism problem-solving procedural programming-practices project-management python read-model regular-expressions ruby scala scope server single-responsibility sockets software-distribution solid source-code sql sql-server state technical-debt terminology third-party-libraries transaction type-casting type-conversion verification version-control wcf web web-applications web-development web-services wpf xml

Recent Articles

Should test resource files be stored inside the Java class source directories?

How can I efficiently diff a CSV file against a database?

How do I handle malformed compressed input data, which crashes external library?

What is the significance of reaching major version 1.0.0?

Does Garbage Collection Scan The Entire Memory?

What Semantic Version increment to use for a filename change?

Error or not error?

How much time should you spend planning a commit before writing code?

Does it always take the same amount of time to retrieve the same thing from collection?

Multidimensional vs nested arrays

Designing an API for international markets

Referencing transient class attributes

When is it practical to design in advance of refactoring?

Why does GNU AS use different characters for single-line comments depending on the architecture?

What kind of queue should I use for processing large volume of data?

Topic: Theoretical Computer Science

Recent Tags

ac0 agda algebraic-complexity approximation-algorithms ar.hardware-architecture average-case-complexity big-picture binary-decision-diagrams bipartite-graphs boolean-formulas boolean-functions calculus-of-constructions cc.complexity-theory circuit-complexity circuit-families clique co.combinatorics coding-theory combinatorics communication-complexity complexity complexity-classes computability context-free continuations convex-hull counting-complexity cr.crypto-security curry-howard data-streams dc.parallel-comp dependent-type derandomization directed-acyclic-graph ds.algorithms dynamic-algorithms encoding epsilon-nets examples factoring finite-fields fixed-parameter-tractable fl.formal-languages formal-methods graph-algorithms graph-classes graph-isomorphism graph-theory high-dimensional-geometry implementation interactive-proofs it.information-theory lambda-calculus linear-algebra linear-temporal-logic lo.logic lower-bounds machine-learning matching matrices mu-calculus na.numerical-analysis ni.networking-internet nondeterminism normalization np np-complete np-hardness optimization parameterized-complexity parsing pcp permanent pl.programming-languages polynomial-hierarchy polynomial-time polynomials polytope pr.probability promise-problems proof-assistants property-testing pseudorandom-generators qma quantum-computing random-oracles randomized-algorithms randomness reductions reference-request sample-complexity sat search-problem separation soft-question sorting space-bounded sparse-matrix st.statistics streaming streaming-algorithms survey topology tree treewidth turing-machines type-inference type-systems type-theory typed-lambda-calculus undecidability unique-solution vc-dimension

Recent Articles

Expected number of random comparisons needed to sort a list

Defining normalization with respect to judgmental equality instead of reduction

Randomized communication complexity of or-of-equalities

Quadratic lower bound

Hardness of a class of quadratics

Hardness of a class of quadratics

Best known algorithm for NEXP-complete problem

Similarities and differences between Pie and popular languages with dependent types

Is there FPT or XP algorithms knowm for Shortest Steiner cycle and $(a,b)$-Steiner path problem

Question about algorithm for enumerating minimal AB-separators

Sample complexity lower bound to learn the mode (the value with the highest probability) of a distribution with finite support

What are the application of Scott-Topology in theoretical computer science?

Are there survey papers in theoretical computer science?

Complexity of the Complete (3,2) SAT problem?

Are there 'poision-pill' research questions in TCS?

Topic: General Computing

Recent Tags

apt-get automation automount awk bash bash-scripting beyondcompare browser cd centos certificate command-line cookies cygwin data-recovery database dbus dd-wrt debian echo emacs email emulation encryption expect ext3 ext4 fedora-20 file-descriptors filesystems firefox git gnome gnu-screen google-chrome grep gstreamer hardlink hibernate https i3-window-manager internet-explorer iterm2 jre kernel key-binding keyboard keyboard-shortcuts linux locale localization luks macos mdadm microsoft-outlook mingw mopidy msysgit nautilus networking nvidia-graphics-card openssh path perl permissions pki plesk port-forwarding powershell proxy putty python regex remote-access remote-control remote-desktop rm scrolling sd-card search sed shell shell-script shortcuts ssh ssl-certificate strace stunnel sudoers swap swappiness symbolic-link tee terminal tightvnc tmux truecrypt tty ubuntu unix usb-flash-drive virtualbox wamp windows windows-10 windows-10-v1607 windows-7 windows-8 windows-server-2012 windows-server-2012-r2 windows-subsystem-for-linux word-processing wsl2 x11-forwarding xen xmodmap xquartz yahoo-mail zsh

Recent Articles

Excel - Lookup exact match in one column and exact or next higher match in another column

Where should DNS and DHCP servers be located?

How to curl case-insensitive

Debian/testing Linux on an encrypted LVM - filesystem intensive operations cause system to freeze and crash system-journald service

Support of the \\?\UNC\server\share syntax in Windows

Find and replace in Notepad++: How to insert above line with same amount of indents?

Why is the Actual RAM Size Less Than It States?

Windows: How to make cygwin bash.exe to take precedence over wsl in command line?

Object reached heap limit - debugging a Javascript SIGILL error on Chrome?

IIS How can I produce a continuous log stream?

What is meant to be plugged into the USB connector labelled "Touch" on thjs screen?

IP payload compression with xfrm

Dual Boot between Win 7 and Win 11

What is ctrl-; doing in Gnome Terminal and Emacs?

How to securely erase an NVMe SSD that won't boot?