Recent Tag Groups
sudo
authentication c# cryptography encryption hash password-protection passwords pkcs#5 salt security string
apache-http-server dns firefox internet-explorer networking
adblock browser-addons firefox firefox-extensions
centos firewall linux vnc
freeipa gssapi kerberos ldap linux sasl security ssh windows-server-2012
command-line file-management linux
General Topics
Programming | 30065 Articles |
Unix & Linux | 27253 Articles |
System Administration & Network Administration | 25772 Articles |
Information Security | 24603 Articles |
Cryptography | 12747 Articles |
Database Administration | 23027 Articles |
Software Engineering | 24191 Articles |
Theoretical Computer Science | 4940 Articles |
General Computing | 25459 Articles |
Topic: Programming
Recent Tags
absolute-path abstract-class ajax amazon-elastic-beanstalk amazon-route53 amazon-s3 amazon-web-services arguments arrays awk aws-sdk bash bitbucket-pipelines c# c++ cat classpath cloud cluster-computing colors compiler-errors context-info credentials curl dataframe distribution docker driver eloquent environment-variables etcd filesystems fortran function gcc getline gfortran gnu-parallel gnu-screen google-chrome-devtools grep gssapi gzip helper higher-kinded-types html-post ikvm indexing interface io java javascript json kerberos laravel laravel-5 libcurl linker linux list macos magento-1.9 mern mesosphere meteor migration mingw module multiprocessing mv naming-conventions node.js numa numpy object ocr openstack pandas parallel-processing parallels performance perl php pip pipe posix postgresql postgresql-performance profiling pry ps python python-2.7 python-3.x python-tesseract pythonpath ractivejs regex resque rocks ruby-on-rails rvalue samba scp sed setsid setupapi setuptools shared-memory shell sign sparse-file split spn spring sql sql-server ssh stat static-linking symlink syntax tee terminal testing triggers tsql unicode unix utf-8 virtual-machine visual-studio-2008 visual-studio-code window-functions windows xargs zend-serverRecent Articles
How to properly create and run concurrent tasks using python's asyncio module? | |
List Git aliases | |
Get timestamps with the same time_zone from all nodes in distributed system with Python | |
Why does argparse not accept "--" as argument? | |
For-loop over glob returns single string instead of list | |
Docker Build CLI Doesn’t update the code (TS, node) | |
Select matrix rows that are permutations of a given vector | |
Concatenate every two columns in dataframe | |
Fastest way to take the average of two signed integers in x86 assembly? | |
How to make dynamic bit width integers in C? | |
print the commands to delete node_modules folders recursively in a bash text file | |
Format Specifiers in C and their Roles? | |
Extract names of second [given] level of nested list in R | |
Copy value from one column to the next given a condition | |
How to configure git push to automatically set upstream without -u? | |
Topic: Unix & Linux
Recent Tags
acpi administration aix amazon-ec2 apt arch-linux authentication autocomplete awk background-process banner bash bash-expansion bashrc centos chown colors command command-history command-line command-substitution compiling configuration console cron curl debian dependencies docker domain encryption environment-variables exec fedora ffmpeg fifo file-descriptors filenames fork gentoo gnome-terminal gnu-parallel grep gui here-document hhvm i18n icons init.d io-redirection iw jobs join json kde kernel kill ksh kubuntu lfs licenses linux linux-mint locale locate logout logs make memory motd nouveau open-files opensuse permissions pipe process prompt python readline readlink reboot regular-expression remote-management replace root root-filesystem scientific-linux scripting security sed shell shell-script signals special-characters ssh ssh-tunneling stdin su sudo symlink syntax systemd systemd-journald systemd-unit tar tee terminal terminology trap tty ubuntu umask upgrade variable veracrypt vnc xv6 yum zip zsh zypperRecent Articles
Bash, use case statement to check if the word is in the array | |
Double fork() - why? | |
Start 100 process at a time in bash script | |
Are VirtualBox guest additions host-independent? | |
Can a Linux Swap Partition Be Too Big? | |
How to get specific fields of JSON objects for which another field is true | |
What is involved in a WSL "distribution"? | |
Is it possible to pass a bash array as a parameter to a function? | |
mv: A and B are the same file | |
How to generate keys after creating user with adduser --disabled-password | |
bash + monitor disk space usage and execute script if used space reached the threshold | |
How can I loop this command in a bash script until the repsonse contains the string "connection successful" | |
Perl: speed of s/// with variable in replacement | |
git diff: ignore comments | |
Trying to find complete string values from one file based on another file using AWK | |
Topic: System Administration & Network Administration
Recent Tags
active-directory amazon-ec2 apache-2.2 apache-2.4 apache-mesos apt aptitude arch-linux azure backend backuppc bash busybox byobu centos centos6 cgroup chroot cloud-computing cluster command-line-interface connection cpu-usage cygwin debian desktop domu dpkg dsc eclipse email environment-variables epel file-permissions forwarding freebsd ftp git gitlab gnu-screen gridengine group-policy grub grub2 hook hyper-v ifconfig init.d internet ipsec jboss jenkins job-control kde kvm-virtualization lamp ldap less linux lxc masquerade max-file-descriptors memory mikrotik mpm-prefork mysql nis nobody node.js ntfs openldap openswan openvpn pam-ldap partition perforce permissions php-fpm port port-forwarding postgresql powershell ps qemu qnap rc.local rocky-linux rsync rvm scp security sftp sles ssh ssh-keygen ssh-keys ssh-tunnel ssl startup-scripts su sudo tap tc telnet terminal-server tun ubuntu ubuntu-16.04 ubuntu-20.04 ulimit umask unix-shell user-management user-permissions virtual-machines vpn vpn-client vps web-hosting web-server windows windows-server-2003 windows-server-2008 windows-server-2008-r2 write yp zabbix zimbraRecent Articles
Pod is stuck in PodInitializing status when an initContainer is OOMKilled | |
Transferring PDCEmulator FSMO role from Windows Server 2012R2 to 2022 | |
Gmail does not accept mail from a new VPS server with PTR setup | |
Domain Controller DNS alias | |
(Windows) how to launch event viewer GUI console when dealing with huge log files? | |
Odd process appearing about every 18-20 minutes that runs 'apt-get --just-print dist-upgrade' | |
How to enable ssh for supporters with intelligent key management? | |
Support staff can reset some User passwords but not all? | |
ExecStart has a '-' prefix but the unit is still failed | |
Does the email size limit include the size of the body? | |
Should mail servers avoid sharing /64 ipv6 with others for reputation? | |
ISC DHCP/DDNS setup: Static entries for non-dhcp clients | |
ZFS and SAN: issue with data scrubbing | |
Why SSH still works after applying SNAT and DNAT rules to forward ip (on the SSH server)? | |
postfix loops back to myself email issue (was working before apt upgrade Ubuntu) | |
Topic: Information Security
Recent Tags
access-control apache api appsec asymmetric attack-vector attacks authentication backdoor banks boot brute-force burp-suite c++ cdn certificate-authority certificates challenge-response chrome cloud-storage cryptography csrf ctf denial-of-service dhcp digital-signature directory-traversal e-commerce email email-spoofing encoding encryption exploit exploit-development file-access file-system firefox firewalls forensics freebsd gaming gmail gnupg google gpg4win gssapi hash hashicorp-vault html infection-vector injection integrity iphone ipsec kali-linux kerberos keyloggers kleopatra known-vulnerabilities linux logging malware md5 memory metasploit mod-security mongodb mysql network node.js objective-c openpgp openssl operating-systems password-management passwords pci-dss pem php phpmyadmin privacy process protection public-key remote-server reverse-engineering router rsa sha shellshock silverlight snooping sql-injection tamper-resistance tcpdump threats tls tls-downgrade token tor totp trust uac ubuntu url user-names virus vpn vulnerability web-application web-browser web-of-trust web-scanners web-service whitelist wifi windows windows-10 wireless wpa2 xssRecent Articles
Is it bad practice to have a 'super admin' - so they effectively bypass security checks in your system? | |
Do CloudFront edges talk to custom origins over open (non-AWS) networks? | |
Why did WebAuthn beat PAKEs as the preferred password replacement? | |
What happens to malicious traffic in a scrubbing center during a DDoS attack? | |
What is the name of this concept involving hashes? | |
Can DMARC's SPF alignment be spoofed? | |
ThinkShield secure wipe - SSD does it forbid data recovering? | |
Content-Type and Code Execution | |
SQLMAP setting parameter | |
What is the purpose of the critical flag being enabled (128) on a CAA IODEF record? | |
Can static IP address be used as a component of MFA? | |
Why does anyone not use Let's Encrypt? | |
How do I keep Python Sockets secure for Multiplayer Games? | |
Any security concerns when importing self-signed certificate to Trusted Root certification Authorities store? | |
Malware file path | |
Topic: Cryptography
Recent Tags
advantage aes aes-gcm argon2 attack authenticated-encryption authentication bcrypt block-cipher blocksize brute-force-attack cbc commitments computational-complexity-theory cryptanalysis cryptocurrency ctr database decryption deterministic-encryption diffie-hellman discrete-logarithm dsa ecb ecies elgamal-encryption elliptic-curves encoding encryption enigma entropy error-propagation feistel-network file-encryption finite-field function-evaluation gcm group-theory hard-core-predicate hash hash-signature homomorphic-encryption implementation information-theory initialization-vector key-derivation key-exchange keys lfsr lightweight mac matrix-multiplication meet-in-the-middle-attack modes-of-operation modular-arithmetic multiple-encryption negligible nist nonce notation nsa ntru oaep oblivious-transfer ofb one-time-pad one-way-function openssl padding padding-oracle pairings password-hashing passwords pbkdf-2 permutation pgp pki poly1305 post-quantum-cryptography probability protocol-design pseudo-random-function pseudo-random-generator pseudo-random-permutation public-key puf random-number-generator randomness replay-attack rijndael ring-lwe rsa s2k secp256k1 security-definition semantic-security sha-2 sha-256 signature simulation software-obfuscation stream-cipher terminology timing-attack tls tokenization trapdoor verifiability verifiable-random-function voting x25519 xor zero-knowledge-proofsRecent Articles
Should we really rely on "Cryptographically Secure Pseudo-Random Number Generators" (CSPRNG) alone to guarantee secure random output? | |
Solving system of equation based on RSA | |
Base64 or hex to attach auth tokens to URL? | |
How much security is gained from hiding the nonce? | |
(In)security of multiplicative blinding / one-time-pad in a commutative ring | |
Is there some restrictions on values of p,q,d,e etc in RSA algorithm while trying to encrypt English Ciphertext? | |
How to prevent the solution of a discrete logarithm problem from being found in a collision way by accident | |
NIST example shows extra hexadecimal characters in Block Contents of SHA512-256 | |
NIST example shows extra hexadecimal characters in Block Contents of SHA512-256 | |
Is constant-time compare really required for AEAD ciphers? | |
Is constant-time compare really required for AEAD ciphers? | |
How to encrypt data which never leave the client but can't be decrypted without the server? | |
Commutable and Composable Asymmetric Encryption/Decryption | |
Is there any way to (irrevocably) *transfer* a private key to another person? | |
Is there any way to (irrevocably) *transfer* a private key to another person? | |
Topic: Database Administration
Recent Tags
aggregate alter-table application-design array authentication autovacuum availability-groups azure backup bulk-insert business-intelligence clob clustered-index columnstore composite-types count cte cursors data-warehouse database-design database-recommendation datatypes date-format ddl deadlock dependencies deployment dml dmv docker dump dynamic-sql erd failover fields functions greatest-n-per-group group-by high-availability identity index index-tuning information-schema inheritance insert java join json limits localization mariadb mariadb-10.3 memory mongodb ms-access mysql mysql-5.6 mysqldump naming-convention neo4j normalization operator oracle order-by percona performance permissions pg-dump pg-restore plpgsql plsql polymorphic-associations postgresql postgresql-9.3 postgresql-9.4 postgresql-9.6 postgresql-performance primary-key psql query-performance rdbms relational-theory replication role schema security select set-returning-functions snapshot-isolation spatial sql-server sql-server-2005 sql-server-2008 sql-server-2008-r2 sql-server-2012 sql-server-2014 sql-server-2016 sqlite ssd ssis ssl ssms stored-procedures system-databases t-sql tablespaces temporary-tables terminology timezone trigger ubuntu unique-constraint update vldb waits xmlRecent Articles
Use square brackets on extended events filter | |
What ports to open for sql server behind secure domain firewall | |
Poorly performing stored procedure using cached data while testing | |
Logical reads and LOB logical reads | |
Restore over dns alias fails with Operating system error 1326(The user name or password is incorrect.) | |
SQL: finding unique multi-column value triplet matching multiple rows? | |
Which versions of DataStax Enterprise have the fix for CVE-2020-13946? | |
Optimizing geolocation query in Postgres with earth_box and earth_distance | |
Incorrect Result When Doing String Concatenation With ORDER BY | |
Boolean flag in fact table | |
What affects log_send_rate in Normal or Distributed AG other than OS resources? | |
How to get the "best of both worlds" with natural and surrogate keys? And could DBMSs be better? | |
Oracle 19 - RMAN can't connect to database | |
Distinguish between "take-away orders" and "orders for a table" | |
Temporarily disable SELECT for one table (during an update) | |
Topic: Software Engineering
Recent Tags
.net ado.net algorithms api-design architecture array asp.net asp.net-mvc benchmarking big-o binding c# class clean-code code-complete code-quality code-smell collections complexity component composition computer-architecture constructors copy-protection cpu cqrs cron css3 data data-structures database declarations decompile decorator definition dependency-inversion design design-patterns desktop-application development-process domain-driven-design domain-model domain-specific-languages efficiency email error-handling event-programming event-sourcing export f# file-storage files formal-methods functional-programming garbage-collection git inheritance interfaces internet inversion-of-control io ios ipad java javascript json jvm laravel libraries linked-list locks merging methods microservices modeling modularization multiple-inheritance mvc mysql oauth2 object-oriented object-oriented-design openid performance php plugin-architecture plugins pointers polymorphism problem-solving procedural programming-practices project-management read-model recursion regular-expressions requirements ruby scala scheduling scope server single-responsibility sockets software-distribution solid source-code sql sql-server state stored-procedures technical-debt third-party-libraries transaction type-casting type-conversion version-control versioning wcf web web-api web-applications web-development web-services wpf xmlRecent Articles
Should test resource files be stored inside the Java class source directories? | |
How can I efficiently diff a CSV file against a database? | |
How do I handle malformed compressed input data, which crashes external library? | |
What is the significance of reaching major version 1.0.0? | |
Does Garbage Collection Scan The Entire Memory? | |
What Semantic Version increment to use for a filename change? | |
Error or not error? | |
How much time should you spend planning a commit before writing code? | |
Does it always take the same amount of time to retrieve the same thing from collection? | |
Multidimensional vs nested arrays | |
Designing an API for international markets | |
Referencing transient class attributes | |
When is it practical to design in advance of refactoring? | |
Why does GNU AS use different characters for single-line comments depending on the architecture? | |
What kind of queue should I use for processing large volume of data? | |
Topic: Theoretical Computer Science
Recent Tags
ac0 agda algebraic-complexity approximation-algorithms ar.hardware-architecture average-case-complexity big-picture binary-decision-diagrams bipartite-graphs boolean-formulas boolean-functions calculus-of-constructions cc.complexity-theory circuit-complexity circuit-families clique co.combinatorics coding-theory combinatorics communication-complexity complexity complexity-classes computability context-free continuations convex-hull counting-complexity cr.crypto-security curry-howard data-streams dc.parallel-comp dependent-type derandomization directed-acyclic-graph ds.algorithms ds.data-structures dynamic-algorithms encoding epsilon-nets examples factoring finite-fields fixed-parameter-tractable fl.formal-languages formal-methods graph-algorithms graph-classes graph-isomorphism graph-theory high-dimensional-geometry implementation interactive-proofs it.information-theory lambda-calculus linear-algebra linear-temporal-logic lo.logic lower-bounds machine-learning matching matrices mu-calculus na.numerical-analysis ni.networking-internet nondeterminism normalization np np-complete np-hardness optimization parameterized-complexity parsing pcp permanent pl.programming-languages polynomial-hierarchy polynomial-time polynomials polytope pr.probability promise-problems proof-assistants property-testing pseudorandom-generators qma quantum-computing random-oracles randomized-algorithms randomness reductions reference-request sample-complexity sat search-problem separation soft-question sorting space-bounded sparse-matrix st.statistics streaming streaming-algorithms survey topology tree treewidth turing-machines type-inference type-systems type-theory typed-lambda-calculus undecidability unique-solution vc-dimensionRecent Articles
Dependent type theory and definitions of cumulativity | |
Expected number of random comparisons needed to sort a list | |
Defining normalization with respect to judgmental equality instead of reduction | |
Randomized communication complexity of or-of-equalities | |
Quadratic lower bound | |
Hardness of a class of quadratics | |
Hardness of a class of quadratics | |
Best known algorithm for NEXP-complete problem | |
Similarities and differences between Pie and popular languages with dependent types | |
Is there FPT or XP algorithms knowm for Shortest Steiner cycle and $(a,b)$-Steiner path problem | |
Question about algorithm for enumerating minimal AB-separators | |
Sample complexity lower bound to learn the mode (the value with the highest probability) of a distribution with finite support | |
What are the application of Scott-Topology in theoretical computer science? | |
Are there survey papers in theoretical computer science? | |
Complexity of the Complete (3,2) SAT problem? | |
Topic: General Computing
Recent Tags
.bash-profile 64-bit acl address-bar append autohotkey automation awk backup bash bashrc batch beyondcompare boot browser browser-tabs browsing centos certificate compact-disc cookies cron curl cygwin dbus debian desktop dictionary email export fdisk file-management firefox gnome gnu-screen google-chrome google-search head infinite-loop internet-explorer jira kernel key-binding keyboard linux logging mac macfuse macos metadata microsoft-outlook-2007 microsoft-word mouseless msysgit ntfs opensuse opera-10 pdf pentadactyl perl permissions pki plist port-forwarding powershell priority proxy putty python redhat-enterprise-linux redirection rubygems safari script scrolling search-engines security sed shell shell-script socks5 sorting split-window ssh sshd ssl ssl-certificate strace sudo tabbed-browsing telnet terminal text-manipulation thumbnails tmux trusted-root-ca tunnel ubuntu udev uniq upstart usb-flash-drive usb-storage vim virtual-host virtual-machine vnc vpn wamp wayland windows windows-10 windows-7 windows-backup windows-server-2012 windows-subsystem-for-linux windows-vista word-processing x11-forwarding xampp xinput xorg xubuntu youtubeRecent Articles
Excel - Lookup exact match in one column and exact or next higher match in another column | |
Where should DNS and DHCP servers be located? | |
How to curl case-insensitive | |
Debian/testing Linux on an encrypted LVM - filesystem intensive operations cause system to freeze and crash system-journald service | |
Support of the \\?\UNC\server\share syntax in Windows | |
Find and replace in Notepad++: How to insert above line with same amount of indents? | |
Why is the Actual RAM Size Less Than It States? | |
Windows: How to make cygwin bash.exe to take precedence over wsl in command line? | |
Object reached heap limit - debugging a Javascript SIGILL error on Chrome? | |
IIS How can I produce a continuous log stream? | |
What is meant to be plugged into the USB connector labelled "Touch" on thjs screen? | |
IP payload compression with xfrm | |
Dual Boot between Win 7 and Win 11 | |
What is ctrl-; doing in Gnome Terminal and Emacs? | |
How to securely erase an NVMe SSD that won't boot? | |