Skip to main content

Posts

Showing posts from March, 2017

Google’s Safe Browsing technology examines billions of URLs per day looking for unsafe websites.

Google's Safe Browsing technology examines billions of URLs per day looking for unsafe websites.

Google announced that they updated the site status tool with a "cleaner UI, easier-to-interpret language, and more precise results." This tool is used to help site owners or site visitors to see the safety status of a web page without actually having to go visit the page.

How to fix scroll bar missing problem on Mac

Click the Apple menu at the top-left of the screen, then select System Preferences.Next, select the General preferences pane; it’s the very first one, up at the top.Under the “Show scroll bars” heading, you’ll find three options: “Automatically based on input device,” “When scrolling,” and “Always.”Go ahead and select that last “Always” option. You’re done!

Microsoft’s latest upgrade to Windows 10 - intimidating

The new “Creators Update” for Windows 10 – its third major upgrade since the system launched in 2015 – adds a function that lets users turn their smartphones into 3D scanners, then import those 3D images into their computers.

It also adds support for virtual reality and mixed reality headsets.

What Is Data Serialization

Serialization is: the process of translating data structures or object state into a format that can be stored (for example, in a file or memory buffer, or transmitted across a network connection link) and reconstructed later in the same or another computer environment.

Types of Marketing campaigns

Regular CampaignsPlain-Text CampaignsRSS CampaignsA/B Testing Campaigns
    RSS campaigns allow you to automate your marketing campaigns by combining content from an RSS feed with user-friendly templates.

Chatbots are programs pretending to be people that you can interact with through text or even voice.

You can talk to these chatbots in your messaging apps, much like you would any other contact in your list, to get the day's news or even get something done.
In the context of conversational commerce, where messaging apps become a bridge between consumers and businesses, chatbots seem to be the best answer for ecommerce business owners to manage thousands of one-to-one conversations with customers.

Different types of learning styles

Intrapersonal: Can understand one’s own emotions, wants, and desires and control them as needed.Interpersonal: Can recognize, understand, and influence other people’s emotions, wants, and desires.Kinesthetic: Can use their body to convey information and ideas.Linguistic: Can use words (both written and verbal) to express their ideas and learn new concepts.Musical: Can appreciate, create, and reproduce music.Logical-mathematical: Can solve abstract problems, analyze complex information, recognize patterns, and develop calculations.Visual-spatial: Can understand the relationship between images and meanings and objects and space.

How to draw a line or shape on Google Maps

On your computer, sign in to My Maps.Open or create a map. A map can have up to 10,000 lines, shapes, or places.Click Draw a line Add line or shape.Select a layer and click where to start drawing. A layer can have 2,000 lines, shapes or places.Click each corner or bend of your line or shape. To move the map, click and hold the mouse.When you’re finished drawing, double-click or complete the shape.Give your line or shape a name.When you’re done, click Save.

How To Set Up an OpenVPN Server on Ubuntu

Install OpenVPN sudo apt-get update

sudo apt-get install openvpn easy-rsa

Set Up the CA Directory  OpenVPN is an TLS/SSL VPN. This means that it utilizes certificates in order to encrypt traffic between the server and clients. In order to issue trusted certificates, we will need to set up our own simple certificate authority (CA).

To begin, we can copy the easy-rsa template directory into our home directory with the make-cadir command: make-cadir ~/openvpn-ca Move into the newly created directory to begin configuring the CA: cd ~/openvpn-ca

Configure the CA Variables To configure the values our CA will use, we need to edit the vars file within the directory. Open that file now in your text editor:

vim vars

Towards the bottom of the file, find the settings that set field defaults for new certificates. It should look something like this:

~/openvpn-ca/vars
. . .

export KEY_COUNTRY="US"
export KEY_PROVINCE="CA"
export KEY_CITY="SanFrancisco"
export KEY_ORG=&…

What ISP can possibly do to your data

Sell your browsing history to basically any corporation or government that wants to buy it    Hijack your searches and share them with third parties    Monitor all your traffic by injecting their own malware-filled ads into the websites you visit    Stuff undetectable, un-deletable tracking cookies into all of your non-encrypted traffic    Pre-install software on phones that will monitor all traffic — even HTTPS traffic — before it gets encrypted.

Full Android Support for Jetpack Sites

Significant improvements for Jetpack users in the official WordPress App for Android, available now in the Google Play Store.
This update brings to Jetpack users the same features and functionality that WordPress.com site owners have come to expect on Android including, amongst others, People Management, Site Settings, and Site Icons.

Get all the benefits of running your application on the JVM - Spark won't be deprecated tomorrow

Lately, a lot of server-side web development has been taken over by NodeJS, but a growing number of NodeJS developers are using TypeScript and other statically typed languages that compile to JavaScript. Why not go all the way and use a language that was actually designed with types, and intended to run on the server-side? You also get all the benefits of running your application on the JVM, where libraries aren't deprecated every day. If you're coming from ExpressJS, then Spark's syntax will feel very familiar, and unlike a lot of JavaScript web frameworks, Spark won't be deprecated tomorrow.

Serverless computing lets you build scalable and cost-effective applications that scale up or down automatically without the need for provisioning, scaling, and managing servers.

You use AWS Lambda to run your application’s code and Lambda triggers your code in response to events, such as HTTP requests or changes to data in an Amazon S3 bucket or Amazon DynamoDB table.  You are charged for the duration it takes for your code to execute and the number of times your code is triggered. Since Lambda scales precisely with the size of your workload, you never pay for idle compute.

AWS also provides a set of fully managed services that you can use with Lambda to build serverless applications.  These services let you add database and storage tiers for your application or manage connections and messages from mobile and IoT devices. You can use these services together with Lambda to build applications that don’t require provisioning and maintaining servers or administering databases. You also no longer need to worry about application fault tolerance and availability. Instead, AWS provides all of these capabilities for you, allowing you to focus on product innovation an…

AWS Lambda automatically runs your code without requiring you to provision or manage servers.

No Servers to Manage, Just write the code and upload it to Lambda. Continuous Scaling AWS Lambda automatically scales your application by running code in response to each trigger. Your code runs in parallel and processes each trigger individually, scaling precisely with the size of the workload.

Subsecond Metering With AWS Lambda, you are charged for every 100ms your code executes and the number of times your code is triggered. You don't pay anything when your code isn't running.

Serverless computing allows you to build and run applications and services without thinking about servers.

With serverless computing, your application still runs on servers, but all the server management is done by AWS.  At the core of serverless computing is AWS Lambda, which lets you run your code without provisioning or managing servers. With Lambda, you can run code for virtually any type of application or backend service, and it takes care of everything required to run and scale your code with high availability.

Spark - A micro framework for creating web applications in Java 8 with minimal effort

Built for Productivity Spark Framework is a simple and lightweight Java web framework built for rapid development. Spark was originally inspired by the web framework Sinatra, but it's intention isn't to compete with Sinatra, or other similar web frameworks in different languages. Sparks intention is to provide a pure Java alternative for developers that want to (or are required to), develop their web application in Java. Spark is built around Java 8's lambda philosophy, which makes a typical Spark application a lot less verbose than most application written in other Java web frameworks.

Spark focuses on being as simple and straight-forward as possible, without the need for cumbersome (XML) configuration, to enable very fast web application development in pure Java with minimal effort. It’s a totally different paradigm when compared to the overuse of annotations for accomplishing pretty trivial stuff seen in other web frameworks.

AWS Serverless Application Model (AWS SAM) allows you to easily create and manage resources used in your serverless application using AWS CloudFormation.

You can define your serverless application as a SAM template - a JSON or YAML configuration file that describes Lambda function, API endpoints and other resources in your application. 
Using nifty commands, you upload this template to CloudFormation which creates all the individual resources and groups them into a CloudFormation Stack for ease of management. When you update your SAM template, you will re-deploy the changes to this stack. AWS CloudFormation will take care of updating the individual resources for you.

Emma is a Lightweight Database management tool

Emma is a very basic GUI database manager with all the CRUD(Create, Read, Update, Delete) functionality. One will find it useful for doing simple tasks, such as managing database for learning purposes, performing day to day tasks using a very lightweight GUI and also performing CRUD actions using MySQL queries from the command field.

How to compress MySQL backup

Compressing your backup
If your database is considerably larger and you plan on manually running backups on a daily basis, you might consider compressing the backups.

To accomplish this, we'll use the -C option:

mysqldump --login-path=local -C mydb > /mnt/backups/mydb.sql.tgz

Ansible is a very flexible and extensible automation tool

Ansible can be used in a lot of different environments that may not fit your preconceived notions of Ansible as an SSH-based tool to configure Linux and Unix systems.  There are many other things you can do with Ansible, and a few ways to further customize and configure how your automation works.

Ansible can help you:

    Manage more than just servers
    Mix on-premise and cloud inventories easily
    Write playbooks in JSON
    Manage Windows machines
    and more...

HelpSocial Open API

HelpSocial, a social media and messaging integration platform provider, has announced the launch of an updated version of the HelpSocial Open API.  The new HelpSocial Open API is modularly built and has been enhanced for improved performance, scalability, and security. The API provides access to all capabilities of the platform. The company has also updated its Connect Dashboard, a standalone Social CRM and command center, that is often considered "a visual menu of the Open API capabilities."

Amazon Connect is a simple to use, cloud-based contact center service that makes it easy for you to deliver better customer service at lower cost.

This new service from Amazon Web Services is based on the same contact center technology used by Amazon customer service associates around the world to power millions of customer conversations. Setting up a cloud-based contact center with Amazon Connect is as easy as a few clicks in the AWS Management Console, and agents can begin taking calls within minutes.

Amazon Connect’s self-service graphical interface makes it easy for non-technical users to design contact flows, manage agents, and track performance metrics – no specialized skills required. The service also makes it possible to design contact flows that adapt the caller experience, changing based on information retrieved by Amazon Connect from AWS services, like Amazon Redshift, or third-party systems, like CRM or analytics solutions. You can also build natural language contact flows using Amazon Lex, an AI service that has the same automatic speech recognition (ASR) technology and natural language understanding (NLU) that pow…

How to Use Night Shift in Mac OS

Go to the  Apple menu and choose “System Preferences”Select “Displays” and choose the “Night Shift” tabPull down the “Schedule” tab and select either “Sunset to Sunrise” or “Custom” Next adjust the “Color Temperature” to suit your preferences, as you slide the dial you will notice a the screen warmth will change to preview the setting

There are three types of authentication

Something you know: a password, PIN, zip code or answer to a question (mother's maiden name, name of pet, and so on)Something you have: a phone, credit card or fobSomething you are: a biometric such as a fingerprint, retina, face or voice

Azure DocumentDB: API for MongoDB generally available

The API for MongoDB is now generally available, inheriting the same 99.99 percent financially backed service-level agreement (SLA) as Azure DocumentDB. With this API, users can now achieve near-limitless scale, with support for managed sharded collections. To learn more about this API, visit the Azure Blog, the What is DocumentDB: API for MongoDB? documentation webpage, or the DocumentDB: Database-as-a-Service for MongoDB Developers video.

VisualVM includes a profiler that enables you to profile applications running on a local JVM.

Profiling an Application You access the profiling controls in the Profiler tab of the application tab. The profiler enables you to analyze memory usage and CPU performance of local applications.

Launch a local Java application. (Start the application with the -Xshare:off argument.)Under the Local node in the Applications window, right-click the application node and choose Open to open the application tab.Click the Profiler tab in the application tab.Click Memory or CPU in the Profiler tab. When you choose a profiling task, VisualVM displays the profiling data in the Profiler tab.

Example of Python Script to deal with MySQL

Use

sudo yum -y install MySQL-python
to install MySQLdb for Python in CentOS or Fedora.

(See also:  How to install mysql-python on Linux)

Following is the sample script:

#!/usr/bin/python import MySQLdb conn = MySQLdb.connect (host = "host", user = "us", passwd = "pass", db = "yourDB") cursor = conn.cursor (MySQLdb.cursors.DictCursor ) cursor.execute ("SELECT * from yourTable") rows = cursor.fetchall () for row in rows: print (row["name"], row["description"]) cursor.execute (' insert into anotherTable (id,name, description,price) values (6800, %s, %s, %s)', (row["name"], row["description"], 8.88)) print "number of all: %d" % cursor.rowcountcursor.close () conn.commit() conn.close ()You use "%s" even you insert a float to a table
Example 2:
cursor = conn.cursor (MySQLdb.cursors.DictCursor ) while (True): cursor.execute ("delete low_priority from historyv2 wher…

Here document

In computer science, a here document (here-document, heredoc, hereis, here-string or here-script) is a file literal or input stream literal: it is a section of a source code file that is treated as if it were a separate file. The term is also used for a form of multiline string literals that use similar syntax, preserving line breaks and other whitespace (including indentation) in the text.

Here documents originate in the Unix shell, and are found in sh, csh, ksh, Bash and zsh, among others. Here document-style string literals are found in various high-level languages, notably the Perl programming language (syntax inspired by Unix shell) and languages influenced by Perl, such as PHP and Ruby. Other high-level languages such as Python and Tcl have other facilities for multiline strings.

For here documents, whether treated as files or strings, some languages treat it as a format string, allow variable substitution and command substitution inside the literal.

The most common syntax for …

Google disclosed their intent to deprecate and remove trust in Symantec-issued certificates

Google's notice says Symantec allowed at least four parties access to their infrastructure in order to issue certificates, but didn't oversee the granted access sufficiently as required and expected. "These issues, and the corresponding failure of appropriate oversight, spanned a period of several years, and were trivially identifiable from the information publicly available or that Symantec shared," Google's notice states.

Uber self-driving had an accident in Arizona

Uber has now grounded its entire autonomous test fleet in the U.S., following an accident in Arizona which left one of its Volvo SUVs flipped on its side earlier today. The car was in self-driving mode at the time of the incident.

Security researchers from Cybellum have discovered another technique cyber criminals can use to take over your computer.

The zero-day attack called DoubleAgent exploits Microsoft's Application Verifier tool, which developers use to detect and fix bugs in their apps. Developers have to load a DLL into their applications to check them, and Cybellum's researchers found that hackers can use the tool to inject their own DLLs instead of the one Microsoft provides. In fact, the team proved that the technique can be used to hijack anti-virus applications and turn them into malware. The corrupted app can then be used to take control of computers running any version of Windows from XP to the latest release of Windows 10.

Mobile email messages

Every year the adoption of mobile devices continues to fly even higher than the year before. And when it comes to email marketing, more than half of messages are opened on mobile devices before they're ever seen on a desktop. In 2016, open rates reached 68 percent.

Financial topics at home

While all parents thought that financial education was important to the well being of their children, few actively taught financial topics at home, or felt empowered or sufficiently skilled to do so.

Got SHA-1 collision

Git stores all data in "objects." Each object is named after the SHA-1 hash of its contents, and objects refer to each other by their SHA-1 hashes. If two distinct objects have the same hash, this is known as a collision. Git can only store one half of the colliding pair, and when following a link from one object to the colliding hash name, it can't know which object the name was meant to point to.

Two objects colliding accidentally is exceedingly unlikely. If you had five million programmers each generating one commit per second, your chances of generating a single accidental collision before the Sun turns into a red giant and engulfs the Earth is about 50%.

AdWords offers four different ad rotation settings

Optimize for clicks, optimize for conversions, rotate evenly, and rotate indefinitely.

While there are use cases for each of the four options, the recommended approach is either optimize for clicks or optimize for conversions.

If you're tracking conversions, you should optimize toward them. This option takes both clickthrough rate (CTR) and conversion rate into consideration to give preference to ads that are expected to provide more conversions.

A London-based hacker group, calling itself the Turkish Crime Family, has claimed to have access to 250 million Apple accounts

A London-based hacker group, calling itself the Turkish Crime Family, has claimed to have access to 250 million Apple accounts
The hackers are threatening to reset the passwords on those iCloud accounts and remotely wipe iPhones if Apple doesn't pay a ransom by April 7. Those…
https://www.hqgem.com/a-london-based-hacker-group-calling-itself-the-turkish-crime-family-has-claimed-to-have-access-to-250-million-apple-accounts/

The 4th edition of the Introduction to Linux (LFS101x) course is currently available in the edX Professional Education portfolio

You are welcome to enroll in it. The 4th edition of LFS101x comes with numerous updates:

They've re-ordered the content to make it more logical.
All discussions and laboratories have been revised to work with newer distributions, such as Ubuntu 16.04 and RHEL7/CentOS7.
All "Try It Yourself" sections, Knowledge Check questions and final exams have been updated and made more instructive.
We've updated all the screenshots and redone the graphics to bring them up to date.
New laboratory exercises are now included, so you won't have to download extra files in order to do labs.

If you have a business that depends on a URL, you understand why security is important to you

If you have a business that depends on a URL, you understand why security is important to you
With control over your website's domain name, a hacker would be able to take the site down, or redirect it elsewhere.

Further, the hacker could …
https://www.hqgem.com/if-you-have-a-business-that-depends-on-a-url-you-understand-why-security-is-important-to-you/

CareerCast rencently upgraded software engineer to the highest rated job

Customers want applications that solve real world problems, and their hunger is increasing at a phenomenal rate. The level of demand is shocking, and as their desire increases, so does the demand for software Developers. The US Bureau of Labor Statistics projects 30% growth in the need for software Developers over the next few years. CareerCast rencently upgraded software engineer to the highest rated job in 2012, beating out actuary, HR manager and financial planner.

Better Issue Management with ChatOps

ChatOps, is a term originally coined by GitHub. A play on the popular DevOps term that incorporates Development and Operations teams,naturally ChatOps mixes Chat with Operations, allowing you to move everyday tasks performed in other applications or processes into the chat application itself, rather than having to switch between multiple applications to get the job done.

When it comes to creating time and finding talent, 'outsourcing' is an essential practice for efficient entrepreneurs.

As an entrepreneur, you wear several hats. Some of them might even look good on you. But there will inevitably be some parts of starting and running a business that fall outside your expertise. On top of that, you’re one person: You’ve only got 2 hands and 24 hours in a day. Just because you carry the weight of your business on your shoulders, doesn’t mean you need to shoulder all the responsibility alone. Delegating responsibilities to other capable hands frees you up to focus on your vision and the things only you can do, whether it’s growing your business or even spending more time with your family.

eDigital Health refers to using information and information technology, such as hospital information systems and electronic medical records, to improve the healthcare system.

Technology advances over the last decade open up the possibility of new ways to get healthcare, from emailing your doctor, to electronically viewing your own health record, to booking appointments online, to downloading an app to monitor your blood pressure and talk to a nurse.

Many businesses are realizing the opportunities that come when services, products, data and delivery channels are managed via APIs

Businesses are exploring API strategies that commence with an API-first design approach and recognize the importance of providing a high-quality developer experience through the creation of resources such as detailed documentation; sandbox environments to test API calls; and SDK and code snippets.

How to be successful in ecommercial

ship on time (same day if possible; people love this),
use promotions like sales and coupons (made easy through Shopify),
get your name out there (through blogs, social media, advertising, email contact, etc.)

Microsoft Azure Search Management

The Microsoft Azure Search Management API is designed to be used alongside Azure Resource Manager by users seeking to use it as the provisioning and administration portal in the search services of their Azure subscriptions

home and domestic technology

From smart fridges to apps that control your room temperature, connected devices are redefining what's possible when it comes to home and domestic technology

Alberta-Ontario Innovation Program, a research initiative that seeks to solve issues that are national in scope to enhance Canadian business competitiveness.

The Alberta-Ontario Innovation Program (AOP) strives to tackle specific industry challenges through collaborative research and development activities. Through the program, companies will form a partnership with other businesses and academic researchers to develop new products and increase productivity.

Buy iPhone and support HIV/AIDS programs

When you buy iPhone 7 (PRODUCT)REDTM Special Edition, Apple will contribute
directly to the Global Fund to support HIV/AIDS programs and help deliver
an AIDS-free generation. Buy online or visit an Apple Store today.

Gmail Push Notification API

The Gmail API provides server push notifications that let you watch for changes to Gmail mailboxes. You can use this feature to improve the performance of your application. It allows you to eliminate the extra network and compute costs involved with polling resources to determine if they have changed. Whenever a mailbox changes, the Gmail API notifies your backend server application.

Gmail Push Notification API

All Google Cloud HTTP Functions can be invoked via a secure connection

You invoke HTTP functions from standard HTTP requests. These HTTP requests wait for the response and support handling of common HTTP request methods like GET, PUT, POST, DELETE and OPTIONS. When you use Cloud Functions, a TLS certificate is automatically provisioned for you, so all HTTP Functions can be invoked via a secure connection.

How to fix Google Cloud locations error

If you encounter error:

ERROR: (gcloud.beta.functions.deploy) value for field [locationsId] for in collection [cloudfunctions.projects.locations] is required but was not provided

or

ERROR: (gcloud.beta.functions.deploy) ResponseError: status=[400], code=[Bad Request], message=[The request has errorsProblems:region us-east1 is not supported]

You can set your region to 

gcloud config set functions/region us-central1

or you can add --region=us-central1 to your command:

$ gcloud beta functions deploy helloWorld --stage-bucket gs://hdgem-function --trigger-topic hello_world

Google cloud command line gcloud

Default gcloud configuration is called [default]. You can create additional configurations if you work with multiple accounts and/or projects.

Run `gcloud topic configurations` to learn more.

Some things to try:

* Run `gcloud --help` to see the Cloud Platform services you can interact with. And run `gcloud help COMMAND` to get help on any gcloud command.
* Run `gcloud topic -h` to learn about advanced features of the SDK like arg files and output formatting

PgBouncer is a lightweight connection pooler for PostgreSQL.

Several levels of brutality when rotating connections: Session poolingMost polite method. When client connects, a server connection will be assigned to it for the whole duration it stays connected. When client disconnects, the server connection will be put back into pool. This mode supports all PostgeSQL features.Transaction poolingServer connection is assigned to client only during a transaction. When PgBouncer notices that transaction is over, the server will be put back into pool.This mode breaks few session-based features of PostgreSQL. You can use it only when application cooperates by not using features that break. See the table below for incompatible features.Statement poolingMost aggressive method. This is transaction pooling with a twist - multi-statement transactions are disallowed. This is meant to enforce "autocommit" mode on client, mostly targeted for PL/Proxy.Low memory requirements (2k per connection by default). This is due to the fact that PgBouncer does no…

Simplicity is by far the biggest advantage BigQuery holds over Redshift

BigQuery abstracts away the details of the underlying hardware, database and all configurations. 
BigQuery mostly works out of the box, where in Redshift you need a deep knowledge and particular skillset in order to use and optimize it effectively.

This often translates into dedicated engineers battling to keep your company’s infrastructure up to par with your company’s data scale and query patterns as well as industry’s best practices.

Normal relational database system is ineffective for many analytical use-cases

Normal relational database system, like Postgres and MySQL, store data internally in row form: all data rows are stored together and are usually indexed by a primary key to facilitate efficient accessibility.
This setup is perfect for most transactional operations, like reading rows by id to display your user profile. However it’s ineffective for many analytical use-cases.

In analytics, we’re rarely interested in specific rows but in the aggregates of all (or most rows). For example, computing the average age of all of our users, grouped by location.

Performing these queries on classic row-oriented databases requires them to read through the entire database, along with all unused columns, to produce the results.

Single Pursuit of Money

“If you say that money is the most important thing, you’ll spend your life completely wasting your time: You’ll be doing things you don’t like doing in order to go on living, that is, in order to go on doing things you don’t like doing — which is stupid!” — Alan Watts

Base64 Content-Transfer-Encoding

The Base64 Content-Transfer-Encoding is designed to represent arbitrary sequences of octets in a form that is not humanly readable. The encoding and decoding algorithms are simple, but the encoded data are consistently only about 33 percent larger than the unencoded data. This encoding is based on the one used in Privacy Enhanced Mail applications, as defined in RFC 1113. The base64 encoding is adapted from RFC 1113, with one change: base64 eliminates the "*" mechanism for embedded clear text.

A 65-character subset of US-ASCII is used, enabling 6 bits to be represented per printable character. (The extra 65th character, "=", is used to signify a special processing function.)

NOTE: This subset has the important property that it is represented identically in all versions of ISO 646, including US ASCII, and all characters in the subset are also represented identically in all versions of EBCDIC. Other popular encodings, such as the encoding used by the UUENCODE utilit…

Quoted-Printable Content-Transfer-Encoding

The Quoted-Printable encoding is intended to represent data that largely consists of octets that correspond to printable characters in the ASCII character set. It encodes the data in such a way that the resulting octets are unlikely to be modified by mail transport. If the data being encoded are mostly ASCII text, the encoded form of the data remains largely recognizable by humans. A body which is entirely ASCII may also be encoded in Quoted-Printable to ensure the integrity of the data should the message pass through a character-translating, and/or line-wrapping gateway.
In this encoding, octets are to be represented as determined by the following rules:
Rule #1: (General 8-bit representation) Any octet, except those indicating a line break according to the newline convention of the canonical form of the data being encoded, may be represented by an "=" followed by a two digit hexadecimal representation of the octet…