Skip to main content

Posts

Showing posts from October, 2016

OpenShift shell assist you in managing OpenShift applications.

The following commands are available to help control your openshift
application and environment.

gear            control your application (start, stop, restart, etc)
                or deps with --cart      (gear start --cart mysql-5.1)
tail_all        tail all log files
export          list available environment variables
rm              remove files / directories
ls              list files / directories
ps              list running applications
kill            kill running applications
mysql           interactive MySQL shell
mongo           interactive MongoDB shell
psql            interactive PostgreSQL shell
quota           list disk usage

Web applications can store data locally within the user's browser with HTML Local Storage

Local storage is more secure, and large amounts of data can be stored locally
Before HTML5, application data had to be stored in cookies, included in every server request. Local storage is more secure, and large amounts of data can be stored locally, without affecting website performance.

Unlike cookies, the storage limit is far larger (at least 5MB) and information is never transferred to the server.

Local storage is per origin (per domain and protocol). All pages, from one origin, can store and access the same data.

FixedDataTable is a React component for building and presenting data in a flexible, powerful way

Fixed Data Tables for React from Facebook 
It supports standard table features, like headers, columns, rows, header groupings, and both fixed-position and scrolling columns.

The table was designed to handle thousands of rows of data without sacrificing performance. Scrolling smoothly is a first-class goal of FixedDataTable and it's architected in a way to allow for flexibility and extensibility.

https://facebook.github.io/fixed-data-table/

Flux components

Flux is divided in four parts: the dispatcher, stores, views and controller-views.Dispatcher – Is the central component that manages the data flow within the application, it distribute the actions to the appropriate stores.Store – Components that contains the logic and state of the application.View – The components that represent the user interface.Controller-view – The type of view that listens to events coming from the stores.

Function React.createClass

Function React.createClass receives an object as a parameter containing a render function, this function will process and return the component’s HTML code the way it’ll be displayed on the browser

How to rename / delete a label in Blogger

For example, change lable 'i88ca' to 'i88.ca':
Go to the Posts tab for your blogselect "i88ca" from "All labels" drop-down list. This will filter the posts, so you'll only see those with the "i88ca" label.Click the checkbox at the top of the list of posts to select all the posts.Then, click the Label icon and select "i88ca" to remove the label "i88ca" from all the posts that are selected.While the posts are still selected (you may not see them now because you deleted the former label), click the Label icon again and select "Add new label." Then, type in 'i88.ca'You're done! Now, all the posts that used to have the label "i88ca" have the label "i88.ca" instead.

Google Closure Compiler

The Closure Compiler is a tool for making JavaScript download and run faster.  Instead of compiling from a source language to machine code, it compiles from JavaScript to better JavaScript. It parses your JavaScript, analyzes it, removes dead code and rewrites and minimizes what's left. It also checks syntax, variable references, and types, and warns about common JavaScript pitfalls.

Thread-safe in Session scope

The Session object is shared among all threads initiated by the same user. This may cause problems when objects are accessed concurrently e.g. when the user opens a second browser tab of the application.

Concurrency problems are hard to discover.

Blogger Lambda Operators

Blogger Lambda Operators any Returns true if any of the items in the set returns true for the lambda expression all Returns true if all of the items in the set return true for the lambda expression none Returns true if none of the items in the set return true for the lambda expression count Returns the count of the items in the set which return true for the lambda expression filter Returns a set of items for which the lambda expression is true map Returns a set containing each of the results of the lambda expression first Returns the first item for which the lambda expression is true
Source:  https://productforums.google.com/forum/#!topic/blogger/l3phi8bscGY

How to Email Posts to Blogger

Log in to your email account and compose a new email.Enter your Mail-to-Blogger address in the "To" field. Type the title of your post in the "Subject" field.Type your post in the body of the email. Add a picture to the post by attaching an image to the email.Click "Send" to send the post to your blog or save it as a draft If your email program appends text at the bottom of messages, type "#end" (without quotes) at the end of the post. This prevents text from getting cut off on your blog.

Emailing Google+ connections

If you use Google+, you can email people in your Google+ circles even if you don't know their email address. You can also control who from Google+ can email you.

Amazon's Product Advertising API

Amazon's Product Advertising API, formerly Amazon Associates Web Service (A2S) and before that known as Amazon E-Commerce Service (ECS), is a web service and application programming interface (API) that gives application programmers access to Amazon's product catalog data. 
Accessible via either the SOAP or REST protocols it enables products to be listed and/or sold through third-party websites and applications. It is a product of Amazon Services, not to be confused with Amazon Web Services.

Prioritize your job needs

During your job search, figure out what qualities you are seeking from your employerPrioritize those needs and also determine what is absolutely not tolerable. 
If you’re ambivalent about what you want and what you’re looking for, your job search will not be as effective as when you have tremendous clarity and focus.

How to let Safari know which card in Contacts is you:

Follow these steps to let Safari know which card in Contacts is you: Tap on Settings > Safari > Passwords & AutoFill.Set Use Contact Info to On.Tap on My Info.Tap on your own name from Contacts list (you can use the Search bar at the top to look for yourself if you have a long list).

NFS stands for “Networked File System.”

It was developed by Sun Microsystems and serves essentially the same purpose as SMB (i.e., to access files systems over a network as if they were local), but is an entirely different protocol.  This means that NFS clients can’t speak directly to SMB servers.

SMB stands for “Server Message Block.”

It’s a file sharing protocol that was invented by IBM and has been around since the mid-eighties.  It was designed to allow computers to read and write files to a remote host over a local area network (LAN).  The directories on the remote hosts made available via SMB are called “shares.”

DDOS from IoT

After years of warnings from security experts that the makers of many internet-enabled devices paid too little attention to security, shipping internet-connected hardware with preset passwords, insecure default connections, and other vulnerabilities, it finally happened.

RDFa Lite is a subset of RDFa (Resource Description Framework in Attribute) that provides a common syntax for expressing metadata on websites

RDFa Lite RDFa Lite is a subset of RDFa (Resource Description Framework in Attribute) that provides a common syntax for expressing metadata on websites in a way that computers can understand and begin to formulate knowledge about those data about your organization. RDFa Lite embeds itself in existing, standard HTML pages.

For example, if previously a dataset was described as <h2>Name of Dataset</h2>, RDFa would extend that markup as <h2 property="dcterms:title">Name of Dataset</h2> (notice the additional of the property field). This additional metadata is not visible when the page is rendered, and does not affect the page layout or content. It simply provides an additional level of description for search engines, crawlers, and other programmatic consumers of your site’s content.

It is acceptable for the RDFa Lite file to contain only the machine-readable metadata, but agencies may wish to add human readable content to display the metadata to the publ…

Tail call optimization (TCO)

Some compilers and interpreters will do what's called tail call optimization (TCO), where it can optimize some recursive functions to avoid building up a tall call stack. Python and Java decidedly do not use TCO. Some Ruby implementations do, but most don't. Some C implementations do, and the JavaScript spec recently allowed TCO. Scheme is one of the few languages that guarantee TCO in all implementations. In general, best not to assume your compiler/interpreter will do this work for you.

Why handshake failures with Java-based clients when using a certificate with more than 1024 bits?

Java 7 and earlier limit their support for DH prime sizes to a maximum of 1024 bits. So there is handshake failure for DH parameters which include primes with lengths of more than 1024 bits.

If your Java-based client aborts with exceptions such as java.lang.RuntimeException: Could not generate DH keypair and java.security.InvalidAlgorithmParameterException: Prime size must be multiple of 64, and can only range from 512 to 1024 (inclusive), and httpd logs tlsv1 alert internal error (SSL alert number 80) (at LogLevel info or higher), you can either rearrange mod_ssl's cipher list with SSLCipherSuite (possibly in conjunction with SSLHonorCipherOrder), or you can use custom DH parameters with a 1024-bit prime, which will always have precedence over any of the built-in DH parameters.

How to Secure Database Connection From GlassFish/Payara Java EE server to MySQL server

Add the following extra properties:

<propertyname="requireSSL"value="true"></property> <propertyname="useSSL"value="true"></property> <propertyname="trustCertificateKeyStorePassword"value="secret1"></property> <propertyname="trustCertificateKeyStoreType"value="JKS"></property> <propertyname="clientCertificateKeyStoreUrl"value="file:////usr/db-ssl/keystore.jks"></property> <propertyname="trustCertificateKeyStoreUrl"value="file:///usr/db-ssl/cacerts.jks"></property> <propertyname="clientCertificateKeyStoreType"value="JKS"></property> <propertyname="clientCertificateKeyStorePassword"value="secret2"></property> You may need to convert PEM file into JKS.

For windows, you may use file:///c:/pa…

How to convert PEM file into JKS.

> keytool -importcert -file ca-cert.pem -keystore cacerts.jks -storepass secret1 -storetype JKS
> keytool -importcert -file client-cert.pem -keystore keystore.jks -storepass secret2 -storetype JKS

AWS OpsWorks helps you define, deploy, and operate your applications on AWS using Chef.

AWS OpsWorks handles the heavy lifting for you, and it does it by using a single console.
To compete in today’s cloud-driven market, you need tools to help you automate bootstrapping, configuration, deployment, monitoring, scaling, recovery, and more. AWS OpsWorks helps you define, deploy, and operate your applications on AWS using Chef.

Gain New Insights Quicker with Amazon AWS

The flexibility of AWS enables you to tailor your approach for architecting a Data Lake.  Whether building your Data Lake yourself, or leveraging the skills and expertise of an APN Partner to implement one for you, AWS provides a complete platform for getting started. AWS provides you with secure infrastructure and offers a number of scalable, cost-effective storage, data management, and analytics services to turn heterogeneous data into new meaningful insights. Hosting your Data Lake on AWS gives you access to the most complete platform for Big Data.

IDC Reports the Business Value of Red Hat OpenShift

"Organizations are deriving significant additional value from higher productivity of their DevOps and application development teams, generating more revenue and making their application development efforts more cost effective by reducing server hardware and other development tool costs." - IDC

Google Duo is video calling made easy

Duo brings you face to face with the people who matter most – across Android and iPhone – so you're always in touch. With the new Knock Knock feature, you can even see the caller before you pick up.

Faster than a speeding laptop.

The 64-bit A9X chip gives iPad Pro the power to easily take on tasks once reserved for workstations and PCs. Not to mention tasks you’d never consider doing on a PC. Despite this barrier-breaking performance, the A9X chip’s efficient architecture enables up to 10 hours of battery life.

iPad Pro is more than the next generation of iPad

It’s an uncompromising vision of personal computing for the modern world. It puts incredible power that leaps past most portable PCs at your fingertips. It makes even complex work as natural as touching, swiping or writing with a pencil. And whether you choose the 12.9-inch model or the new 9.7-inch model, iPad Pro is more capable, versatile and portable than anything that’s come before. In a word, super.

Monetizing data

Monetizing data frequently requires the creation of products incorporating or supporting
reporting/benchmarking,
and descriptive, predictive, or prescriptive analytics.

Java Exceptions

Exception: Parent class for all existing exceptions in the world, which, in turn, has two subclasses: Checked Exceptions:These are typically used when you want to force the programmer using your API to think of how to handle them. These types of exceptions are checked at compile-time. Any subclass of the Exception class, which is not a subclass of RuntimeException, is considered a checked exception.Runtime Exceptions: Also often called Unchecked Exceptions, these are used when your exceptional condition is unrecoverable, and you can’t do anything about this. The programmer is not forced to handle these types of exceptions.

Security news feed

Help Net Security - News Dark Reading: Dark Reading News Feed
IEEE Spectrum
Security Week RSS Feed
Naked Security
Trend Labs Security Intelligence Blog

How to redirect error output in Bash

Using stderr 2 file
This will cause the stderr ouput of a program to be written to a file.

         grep hdgem * 2> grep-errors.txt

Here, a file called 'grep-errors.txt' will be created and it will contain what you would see the stderr portion of the output of the 'grep hdgem *' command.

Gmail API: New endpoints for settings

New endpoints for managing Gmail settings. These new endpoints cover the following features: FiltersForwarding addresses and auto-forwardingIMAP and POP settingsSend-as aliasesSignaturesVacation responder With this update, we're equipping developers with some new tools that have never been available in any previous Google API. These include the ability to: Retrieve and update signatures for send-as aliasesConfigure forwarding to external addressesConfigure send-as aliases that send mail through external providersUse HTML in vacation messagesManipulate settings for gmail.com accounts

How to connect securely to a MySQL server that supports secure connections

The options that a client must specify depend on the encryption requirements of the MySQL account used by the client Suppose that you want to connect using an account that has no special encryption requirements or was created using a GRANT statement that includes the REQUIRE SSL option. As a recommended set of secure-connection options, start the server with at least --ssl-cert and --ssl-key, and invoke the client with --ssl-ca. A client can connect securely like this:shell> mysql --ssl-ca=ca.pem To require that a client certificate also be specified, create the account using the REQUIRE X509 option. Then the client must also specify the proper client key and certificate files or the server will reject the connection:shell> mysql --ssl-ca=ca.pem \--ssl-cert=client-cert.pem \--ssl-key=client-key.pem To prevent use of encryption and override other --ssl-xxx options, invoke the client program with --ssl=0 or a synonym (--skip-ssl, --disable-ssl):shell> mysql --ssl=0

API Test Automation With Postman

Kevin Ang Qi Ye has a series of detailed blog posts on API Testing that you might want to check out. He covers environments, variables, test scripts, code snippets, and more. “To make it even more awesome, Postman has packed a small collection of JavaScript libraries that you can use within the pre-request script — How cool is that?!” Read the cool blog post here.

How to connect to an Amazon AWS DB cluster with SSL using the MySQL utility

Download the public key for the Amazon RDS signing certificate fromhttp://s3.amazonaws.com/rds-downloads/rds-combined-ca-bundle.pem. Note that this will download a file named rds-combined-ca-bundle.pem. Type the following command at a command prompt to connect to the primary instance of a DB cluster with SSL using the MySQL utility. For the -h parameter, substitute the endpoint DNS name for your primary instance. For the --ssl_ca parameter, substitute the SSL certificate file name as appropriate. Type the master user password when prompted. mysql -h mycluster-primary.i88i88i88ca.us-east-1.rds.amazonaws.com --ssl-ca=[full path]rds-combined-ca-bundle.pem --ssl-verify-server-cert

How to check your MySQL connection is secure

Just run  status OR \s And see the result. If this connection is not using SSL, you'll get: SSL:Notinuse You can also use: mysql> SHOW STATUS LIKE'Ssl_cipher';+---------------+--------------------+| Variable_name | Value |+---------------+--------------------+| Ssl_cipher | DHE-RSA-AES256-SHA |+---------------+--------------------+1rowinset(0.00 sec) mysql>

MySQL Option Files Read on Unix and Unix-Like Systems

Option Files Read on Unix and Unix-Like Systems File NamePurpose/etc/my.cnfGlobal options/etc/mysql/my.cnfGlobal optionsSYSCONFDIR/my.cnfGlobal options$MYSQL_HOME/my.cnfServer-specific options (server only)defaults-extra-fileThe file specified with --defaults-extra-file, if any~/.my.cnfUser-specific options~/.mylogin.cnfUser-specific login path options (clients only)

Google Cloud Shell VM Boost mode

Enable Boost mode
Boost mode temporarily increases the power of your Cloud Shell VM. Once activated, all sessions will be boosted for the next 24 hours. The usage of Cloud Shell in Boost mode is subject to regular usage limits. The feature is currently experimental and there may be additional limits in the future. Enabling Boost mode may take a couple of minutes and will immediately terminate your session. A new VM will then be provisioned for you, which can take a couple of minutes. The data in your home directory will persist, but all running processes will be lost.

AWS Directory Service makes it easy to setup and run Microsoft Active Directory (AD) in the AWS cloud, or connect your AWS resources with an existing on-premises Microsoft Active Directory.

Once your directory is created, you can use it to manage users and groups, provide single sign-on to applications and services, create and apply group policy, domain join Amazon EC2 instances, as well as simplify the deployment and management of cloud-based Linux and Microsoft Windows workloads.

AWS Directory Service provides you with three directory types to choose from including AWS Directory Service for Microsoft Active Directory (Enterprise Edition), also referred to as Microsoft AD, as well as Simple AD, and AD Connector.

An LDAP directory is organized in a simple "tree" hierarchy

The hierarchy consisting of the following levels: The root directory (the starting place or the source of the tree), which branches out to
Countries, each of which branches out to
Organizations, which branch out to
Organizational units (divisions, departments, and so forth), which branches out to (includes an entry for)
Individuals (which includes people, files, and shared resources such as printers)

How to make Blogger widgets visible in Blogger Mobile template

How to enable widgets to display on mobile devices?
To display Blogger widgets view-able on desktops to also appear on mobile devices, do the following:
1. Login to Blogger > Template > Edit HTML
2. From the "Jump To Widget", click on the widget you are interested in
To show this widget on mobile devices, just add "mobile='yes'' to the line.
3. After enabling all the widgets you need, SAVE TEMPLATE and go BACK.
4.  In the TEMPLATE page, click on the "gear" icon under the MOBILE preview shown.
We have two options at "On mobile devices, show a mobile version of your current template".
Yes. Show mobile template on mobile devices. (choose this option)
No. Show desktop template on mobile devices.
5. Click to choose  "Yes. Show mobile template on mobile devices."
6. Choose mobile template: Click and choose "CUSTOM".
Custom adapts your template customization to mobile. Be sure to preview your template.
7. Click SAVE.

A…

LDAP, Lightweight Directory Access Protocol, is an Internet protocol that email and other programs use to look up information from a server.

"LDAP-aware" client programs can ask LDAP servers to look up entries in a wide variety of ways.  LDAP servers index all the data in their entries, and "filters" may be used to select just the person or group you want, and return just the information you want. For example, here's an LDAP search translated into plain English: "Search for all people located in Chicago whose name contains "Fred" that have an email address. Please return their full name, email, title, and description."
LDAP is not limited to contact information, or even information about people. LDAP is used to look up encryption certificates, pointers to printers and other services on a network, and provide "single sign-on" where one password for a user is shared between many services. LDAP is appropriate for any kind of directory-like information, where fast lookups and less-frequent updates are the norm.

As a protocol, LDAP does not define how programs work on eithe…