text
stringlengths 3
1.74M
| label
class label 2
classes | source
stringclasses 3
values |
|---|---|---|
The document “Example.dmg” could not be opened. Disk Utility cannot open files in the “Disk Image” format. <p>I've been having trouble with my Mac since I installed Yosemite, where I open an .dmg file, and it would go to the Disk Utility, then I would have to open it from there. My MacBook running Yosemite did not do this, and would give the normal graphic to drag the file over applications to execute it. </p>
<p>Now I've upgraded to Sierra, and I get an alert that says "The document “Example.dmg” could not be opened. Disk Utility cannot open files in the “Disk Image” format". I try to right click the file, but it does not give me an "open with" only an "open" which gives the same error. Again, my MacBook just opens the installer program just fine. I verify the images on Disk Utility, and I get an "operation successful", but the file still won't open.</p>
<p>I am sure there is a way to get round the problem and open the .dmg files, but I would like to adjust the settings so that the installer opens as designed.</p>
| 0non-cybersec
|
Stackexchange
|
The ability of the Jack Jumper ant to navigate and reach home is not diminished by walking backwards while dragging heavy food, according to a study by researchers. Findings could have a use in some of the latest technologies on driverless cars currently under development..
| 0non-cybersec
|
Reddit
|
using gsub in awk to replace a word with parentheses. <p>Hi how can I use gsub to replace a word which has parentheses.</p>
<p>Here I want to replace ABC(T) with ABC/G</p>
<pre><code>awk ' {gsub("ABC\(T\)","ABC/G")}; Print $0' "$FILENAME" > tmp.tmp && mv tmp.tmp "$FILENAME"
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Adjoining $1$ to non-unital ring: is the usual way the best way?. <p>In <em>Modern Higher Algebra</em> written by A. Adrian Albert (1938), the characteristic of a non-unital ring <span class="math-container">$R$</span> is defined the least positive integer <span class="math-container">$m$</span> such that <span class="math-container">$ma=0$</span> for all <span class="math-container">$a\in\mathbb R$</span>. If such an integer does not exist, the characteristic <span class="math-container">$m$</span> of <span class="math-container">$R$</span> is defined to be zero.</p>
<p>To adjoin a <span class="math-container">$1$</span> to <span class="math-container">$R$</span>, Albert essentially embeds <span class="math-container">$R$</span> in a ring with additive structure <span class="math-container">$Z\oplus R$</span>, where <span class="math-container">$Z=\mathbb Z$</span> when <span class="math-container">$m=0$</span> and <span class="math-container">$Z=\mathbb Z/m\mathbb Z$</span> when <span class="math-container">$m>0$</span>. Ring multiplication is then defined as <span class="math-container">$(z,r)\cdot(z',r')=(zz', rr'+zr'+z'r)$</span>, where <span class="math-container">$zr'$</span> is understood as the sum of <span class="math-container">$z$</span> copies of <span class="math-container">$r'$</span>.</p>
<p>Note that Albert's adjunction ties the choice of <span class="math-container">$Z$</span> to <span class="math-container">$m$</span>. When <span class="math-container">$Z$</span> is <em>always</em> taken to be <span class="math-container">$\mathbb Z$</span> regardless of <span class="math-container">$m$</span>, the adjunction is commonly known as <em>Dorroh's adjunction</em>.</p>
<p>To my understanding, Albert's adjunction (rather than Dorroh's) is the <strong>"usual"</strong> way to adjoin <span class="math-container">$1$</span> to <span class="math-container">$R$</span>.</p>
<p>It was <a href="https://math.stackexchange.com/a/911234">mentioned</a> on this site that Dorroh's adjunction is not very useful because it does not preserve many crucial properties of <span class="math-container">$R$</span>, and in the following paper, there is a <strong>"best"</strong> way to adjoin a <span class="math-container">$1$</span> to <span class="math-container">$R$</span> that makes use of something called a <em>characteristic ring</em> <span class="math-container">$\kappa(R)$</span>:</p>
<blockquote>
<p>W.D. Burgess; P.N. Stewart. <a href="http://journals.cambridge.org/article_S1446788700033218" rel="nofollow noreferrer"><em>The characteristic ring and the "best" way to adjoin a one.</em></a> J. Austral. Math. Soc. 47 (1989) 483-496.</p>
</blockquote>
<p>As I have only studied abstract algebra at undergraduate level, I have trouble understanding the details of the paper. Here I am only looking for some some quick answers for the questions below:</p>
<ol>
<li>Does Albert's adjunction have any name? Is it also called Dorroh's adjunction?</li>
<li>Does the "best" way described in the aforementioned paper have a name?</li>
<li>If we adjoin a <span class="math-container">$1$</span> to <span class="math-container">$R$</span> in the "best" way, is the extension ring <span class="math-container">$\kappa(R)$</span> or is it something else?</li>
<li>Is there any equivalent formulation of the "best" way that is easier for a beginner to understand?</li>
<li>In the "best" way, is the characteristic of the extension/adjoined ring different from the characteristic of <span class="math-container">$R$</span>?</li>
<li>In the "best" way, when the extension ring has the same characteristic as <span class="math-container">$R$</span>'s, am I correct to say that it must contain Albert's extension ring as a subring?</li>
</ol>
| 0non-cybersec
|
Stackexchange
|
Getting entropy in a sandboxed environment. Suppose you're in an sandboxed environment where you don't have easy access to the microphone, camera, file system, etc. Furthermore, assume that the PRNG in this environment isn't very good, and you don't have access to functions like MD5, SHA256, etc.
Despite these limitations, you still need to generate N bits of (true) entropy.
What is the best way to do this?
My first thought would be to attempt to squeeze entropy out of the PRNG by generating a ton of pseudorandom numbers and XORing them together. But, if the PRNG is crappy, I don't think that this really accomplishes anything unless you re-seed regularly, and you need entropy to do *that*. So no dice there.
Another thought I had was to grab the last few milliseconds of the system clock. But then the issue is that given repeated measurements, only the last few LSBs will be random - the rest will be correlated. And if you sample the LSBs repeatedly, at some regular interval, then that effectively becomes periodic.
Having the user mash a bunch of random keys could be a decent way to go, but I have no idea how to gauge how many keypresses correspond to N bits of entropy, and it's kind of a clunky solution.
Any suggestions?
| 1cybersec
|
Reddit
|
Access a Physical Drive in a Ubuntu VM on ESX 4. <p>I am in the process of playing around with ESX and one of the projects I took on is converting my old NAS to a VM. This was pretty straight forward but now I have some problem with storage.</p>
<p>The NAS had 3 drives, one was OS/Apps only and the rest was Data. Now I need the VM to connect to the 2 drives directly and cant seem to see how to do this in ESX4. When I go to "Add Hardware" and select SCSI Drive I only see my CD Rom Drive. The ESX installation itself see the added drive, but it seems I cant get the VM (Ubuntu) to access it. Can ESX be setup to allow VM access to physical hard drive, and if so how.</p>
<p>Thanks</p>
| 0non-cybersec
|
Stackexchange
|
Second Lemma of variation Calculus to prove the Euler-Lagrange equation. <p><strong>Second Lemma of variation Calculus</strong></p>
<p>If <span class="math-container">$u(x)$</span> is a differentiable function for <span class="math-container">$a\leq x \leq b$</span> and
<span class="math-container">$$ \int_{a}^{b} u(x) \cdot \phi'(x)\: dx = 0$$</span>
for all infinitely often differentiable functions <span class="math-container">$\phi(x)$</span> then
<span class="math-container">$$u'(x) = 0 \quad \text{for all} \quad a\leq x \leq b \quad \text{and} \quad u(a) \cdot \phi(a) = u(b) \cdot \phi(b) = 0$$</span></p>
<p><span class="math-container">$\textbf{Proof:}$</span> we use the integration by parts
<span class="math-container">$$
0 = \int_{a}^{b}u(x)\cdot\phi'(x)\:dx = u(b) \cdot \phi(b) - u(a) \cdot \phi(a) - \int_{a}^{b}u'(x)\cdot\phi(x)\:dx
$$</span>
Considering all test function <span class="math-container">$\phi(x)$</span> with <span class="math-container">$\phi(a) = \phi(b) = 0$</span> leads to the condition <span class="math-container">$u'(x) = 0$</span>. We are free to choose test functions with arbitrary values at the end points <span class="math-container">$a$</span> and <span class="math-container">$b$</span>, thus we arrive at <span class="math-container">$u(a)\cdot\phi(a) = u(b))\cdot\phi(b) = 0$</span></p>
<p>For a given function <span class="math-container">$f(x,u,u')$</span> we try to find <span class="math-container">$u(x)$</span> such that the functional
<span class="math-container">$$
F(u) = \int_{a}^{b} f(x,u(x),u'(x))\:dx
$$</span>
has a critical value for the function <span class="math-container">$u$</span>.
If the functional <span class="math-container">$F$</span> attains its minimal value at the function <span class="math-container">$u(x)$</span> we conclude that
<span class="math-container">$$
g(\varepsilon) = F(u + \varepsilon\phi) \geq F(u) \quad \text{for all $\varepsilon \in \mathbb{R}$ and arbitrary functions $\phi(x)$}
$$</span>
Thus the scalar function <span class="math-container">$g(\varepsilon)$</span> has a minimum at <span class="math-container">$\varepsilon = 0$</span> and thus the derivative should vanish. We require that
<span class="math-container">$$
\frac{d\:g(0)}{d\varepsilon} = \frac{d}{d\varepsilon}F(u + \varepsilon\phi)\big|_{\varepsilon = 0} = 0\quad \text{for all functions} \quad \phi
$$</span>
To find the equations to be satisfied by the solution <span class="math-container">$u(x)$</span> we use linear approximations. For small values of <span class="math-container">$\Delta u$</span> and <span class="math-container">$\Delta u'$</span> we use a Taylor approximation to conclude
<span class="math-container">\begin{align*}
f(x, u + \Delta u, u' + \Delta u') &\approx f(x,u,u') + \frac{\partial f(x,u,u')}{\partial u}\Delta u + \frac{\partial f(x,u,u')}{\partial u'}\Delta u' \\
&= f(x,u,u') + f_u (x,u,u')\Delta u + f_{u'} (x,u,u')\Delta u' \\
f(x, u(x) + \varepsilon\phi(x), u'(x) + \varepsilon\phi'(x)) &= f(x,u(x),u'(x)) + \varepsilon f_u(x,u(x),u'(x))\phi(x) \\
&+ \varepsilon f_{u'}(x,u(x),u'(x))\phi'(x) + O(\varepsilon^2) \\
\end{align*}</span>
Now we examine the functional in question
<span class="math-container">\begin{align*}
g(0) &= F(u) = \int_{a}^{b}f(x,u(x),u'(x))\:dx \\
g(\varepsilon) &= F(u + \varepsilon\phi) = \int_{a}^{b}f(x,u(x) + \varepsilon\phi(x),u'(x) + \varepsilon\phi'(x))\:dx \\
&= \int_{a}^{b}f(x,u(x),u'(x)) + \varepsilon f_u(x,u(x),u'(x))\phi(x) + \varepsilon f_{u'}(x,u(x),u'(x))\phi'(x)\:dx \\
&= F(u) + \varepsilon \int_{a}^{b} f_u(x,u(x),u'(x))\phi(x) + f_{u'}(x,u(x),u'(x))\phi'(x)\:dx\tag{1}
\end{align*}</span>
or
<span class="math-container">$$
\frac{d}{d\varepsilon}F(u + \varepsilon\phi) \big|_{\epsilon = 0} = \int_{a}^{b} f_u(x,u(x),u'(x))\phi(x) + f_{u'}(x,u(x),u'(x))\phi'(x)\:dx\tag{2}
$$</span>
This integral has to vanish for all function <span class="math-container">$\phi(x)$</span> and we may use the Fundamental Lemma, leading to a necessary condition. An integration by parts leads to
<span class="math-container">\begin{align*}
0 &= \int_{a}^{b} f_u(x,u(x),u'(x))\phi(x) + f_{u'}(x,u(x),u'(x))\phi'(x)\:dx\tag{3}\\
&= f_{u'}(x,u(x),u'(x))\phi'(x)\big|_{x = a}^b + \int_{a}^{b}\Big( f_u(x,u(x),u'(x)) - \frac{d}{dx}f_{u'}(x,u(x),u'(x))\:\Big)\: \phi(x)\:dx\tag{4}
\end{align*}</span>
Since this expression has to vanish for all function <span class="math-container">$\phi(x)$</span> we need
<span class="math-container">$$
\int_{a}^{b}f(x,u(x),u'(x))\:dx \: \text{extremal} =
\left\{
\begin{array}{ll}
\frac{d}{dx}f_{u'}(x,u(x),u'(x)) &= f_u(x,u(x),u'(x))\quad \quad \quad \quad \text{(5)}\\
f_{u'}(a,u(a),u'(a))\cdot\phi(a) &= 0 \quad \quad \quad \quad \quad \quad \quad \quad \quad \text{(6)}\\
f_{u'}(b,u(b),u'(b))\cdot\phi(b) &= 0 \\
\end{array}
\right.
$$</span></p>
<p>Here are my <strong>questions</strong></p>
<ul>
<li>how can you go from (1) to (2), or what does the expression <span class="math-container">$\frac{d}{d\varepsilon}F(u + \varepsilon\phi) \big|_{\epsilon = 0}$</span> exactly means and how does it connect with the rest?</li>
<li>how can you go from (3) to (4)</li>
<li>how can you assert <span class="math-container">$\frac{d}{dx}f_{u'}(x,u(x),u'(x)) = f_u(x,u(x))$</span> at (5) from that proof</li>
</ul>
<p>for the answer of each of those points, please detail your answer as much possible with step by step explanation</p>
| 0non-cybersec
|
Stackexchange
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
LPT Request: Wearing over-ear headphones on glasses. Is there way to wear over-ear headphones with glasses on without having the sides crushing your head?
| 0non-cybersec
|
Reddit
|
Mobile Safari back button. <p>The issue I've found is very similar to <a href="https://stackoverflow.com/questions/24046/the-safari-back-button-problem">this question</a>, except that Safari on desktops seems to have resolved the issue. Essentially, the issue is this: when a client is browsing on mobile safari and the page executes a javascript function on <code>pageA.html</code>, then navigate to <code>pageB.html</code>, then press the back button to go back to <code>pageA.html</code>, the javascript function won't run when the client pressed the back button to come back to <code>pageA.html</code>. It will skip the javascript call.</p>
<p>I've tried the solutions mentioned in the link above, but nothing seems to work for mobile Safari. Has anyone else encountered this bug? How did you handle it?</p>
| 0non-cybersec
|
Stackexchange
|
Uniform convergence on compact subset. <p>Let there be two functional squences $$a_n(x)=\sqrt[n]{x} \quad \textrm{ for $x\in(0,\infty)$}$$ $$b_n(x)=\sum_{k=0}^{n}x^k(1-x)^k=\frac{1-x^{n+1}(1-x)^{n+1}}{x^2-x+1} \quad \textrm{ for $x\in (0,1)$}$$</p>
<p>The pointwise converge to the functions $a(x)=1$ and $b(x)=\frac{1}{x^2-x+1}$. How can I prove that $a_n$ and $b_n$ converge uniformly to $a$ and $b$ on any compact subinterval. My idea for $a_n$ would be if we have the subinterval $[p,q]\subset(0,\infty)$, then $\|a_n-a\|=sup\{ \lvert \sqrt[n]x-1\rvert, x\in[p,q]\}=\lvert\sqrt[n]q-1\rvert\rightarrow 0$, for $n\to\infty$. So it should be convergening uniformly on any compact subinterval. But does it also converges uniformly on the complete interval? I think not but I dont know how to prove it...
My idea for $b_n$: similar like up there let $[p,q]\subset(0,1)$, $\|b_n-b\|=\sup\{\lvert\frac{x^{n+1}(1-x)^{n+1}}{x^2-x+1}\rvert\, x\in[p,q]\}$. Now, we can calculate that he maximum value of $\frac{x^{n+1}(1-x)^{n+1}}{x^2-x+1}$ is at $x=\frac{1}{2}$, so if $\frac{1}{2}\notin[p,q]$ we just take the one closer to $\frac{1}{2}$, let it be $t$, and now we have that $\|b_n-b\|=\frac{t^{n+1}(1-t)^{n+1}}{t^2-t+1}\to 0$, for $n\to\infty$, so it too converges uniformly in the compact subinterval. But here comes also the question: does it also converge uniformly on the whole interval $(0,1)$? And is my proof up til now good?</p>
| 0non-cybersec
|
Stackexchange
|
There's more.
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
Cat needed a blood test so he got a small sedative and is now tripping balls..
| 0non-cybersec
|
Reddit
|
Issue with UI event when rendering component inside a web component shadow DOM. <p>I'm facing some issues when rendering a React component into the shadow DOM of a webcomponent.
I wrote a small piece of code to turn a React component into a webcomponent, but I want to render the
React component inside the shadow DOM of the webcomponent. But in that case, it seems that React is not able to catch UI events (click, keyPress, etc ...) anymore.</p>
<p>Let's take an example, let say that I have a first webcomponent <code><awesome-timer /></code> that render the React component inside the webcomponent node, and another webcomponent <code><less-awesome-timer /></code> that render the React component inside the shadow DOM of the webcomponent.
Both webcomponents use the same React component. However the one rendered inside the shadow DOM does not work, because click events on the button of the timer component does not trigger the bound function.</p>
<p>I guess React is not designed to handle such case, but I'd love to get more details about it.</p>
<p>The code of the example is available here : <a href="https://gist.github.com/mathieuancelin/cca14d31184bf4468bc1">https://gist.github.com/mathieuancelin/cca14d31184bf4468bc1</a></p>
<p>Does anyone have an idea about it ?</p>
| 0non-cybersec
|
Stackexchange
|
0.0.0.0/32 Special-Use address. <p>I was wondering what is the role of this special-use address.</p>
<p>The similar 0.0.0.0/8 represents a host with no IP assigned,but it's not the same with the 0.0.0.0/32 address</p>
<p>What is the difference?</p>
| 0non-cybersec
|
Stackexchange
|
Video lectures and reference book Multivariable calculus. <p>I am in a particular situation that I am doing Master's in a Computer Science related degree, and I would like to take the course on Convex Optimisation which is taught by the Machine Learning department of our University. I did my undegrad almost 10 years ago and my memories of maths courses are quite sparse. The pre-requirements for this course are Linear Algebra and Multivariable Calculus. As for the former, I have already been going through Gilbert Strang's OCW lectures and working the problems from his book. The latter is what my question is about - I've got some disjoint knowledge of Calculus already, and also I have been going through the Spivak's Calculus book. I have considered 2 options so far:</p>
<ul>
<li><a href="http://math.berkeley.edu/~frenkel/Math53/" rel="nofollow">Multivarable Calculus at UC Berkeley by Edward Frenkel</a> There is no syllabus there, but the coursebook is J. Stewart, Calculus: Early Transcendentals. Searching on the web yielded not so good reviews of this book</li>
<li><a href="http://ocw.mit.edu/courses/mathematics/18-02-multivariable-calculus-fall-2007/video-lectures/" rel="nofollow">MIT OCW Multivariable Calculus by Denis Auroux</a> </li>
</ul>
<p>My question is what would be the most optimal way to get up to speed with Multivariable Calculus. In particular professor mentioned things we need to understand such as Vector spaces, Taylor theorem for multivariable case, level sets. I already have a fairly good understanding of Taylor expansion in single variable case, and I can imagine how it could be generalised to many variables, but I still need to do my homework. I am not necesserily looking to cherry pick certain topics and be done with it, I would like to learn everything properly, but maybe you can advice me something considering the time constraints that I have. Thank you.</p>
<p>Update: Subsequently I found Massively Multivariable Open Online Calculus Course by Ohio State University at Coursera and I am really liking it. It is reach in examples, builds up intuition, but also provides formal proofs where necessary. It is largely a text based course, without any video lectures, but it does not bother me, as long as it guides me through. As suggested by others I will also go through the lectures at OCW.</p>
| 0non-cybersec
|
Stackexchange
|
CMS signed data OpenSSL verification error. <p>I have a CMS signed data that is successfully verified through Java BouncyCastle library.</p>
<p>When trying to verify through OpenSSL, I am getting the following error:</p>
<pre><code>>openssl smime -verify -inform der -in cmssigneddata -CAfile cert.pem
6111 9999
#2015-05-05T10:08:41Verification failure
5744:error:0407006A:rsa routines:RSA_padding_check_PKCS1_type_1:block type is not 01:.\crypto\rsa\rsa_pk1.c:100:
5744:error:04067072:rsa routines:RSA_EAY_PUBLIC_DECRYPT:padding check failed:.\crypto\rsa\rsa_eay.c:721:
5744:error:21071069:PKCS7 routines:PKCS7_signatureVerify:signature failure:.\crypto\pkcs7\pk7_doit.c:1132:
5744:error:21075069:PKCS7 routines:PKCS7_verify:signature failure:.\crypto\pkcs7\pk7_smime.c:410:
</code></pre>
<p>I have OpenSSL version 1.0.1e 11 Feb 2013.</p>
<p>CMS signed data are constructed using SHA-512 as hash function and RSASSA-PSS signature scheme.</p>
<p>How it should be verified through OpenSSL correctly?</p>
| 0non-cybersec
|
Stackexchange
|
Someone posted this about his wife..
| 0non-cybersec
|
Reddit
|
what does error 87 mean?. <p>I have the following when running my code:</p>
<pre><code>Process started
ERROR: Windows API error 87:
ERROR: Line: 83 Sorry, but bibtex did not succeed. You may want to visit the MiKTeX project page, if you need help.
Process exited with error(s)
</code></pre>
<p>This is what I am using. It had work before but now I am having problems... </p>
<pre><code>\documentclass[12pt,openany, letterpaper, pagesize]{scrbook}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\usepackage{amsmath} %uso de equaciones
\usepackage{amssymb}
\usepackage{eso-pic,graphicx} %para introducir imagenes
\usepackage{enumerate} %para enumerar
\usepackage{makeidx} %para hacer el index
\usepackage{amsfonts}
\usepackage{paralist}
\usepackage{rotating} %para rotar la hoja y tabla
\usepackage{booktabs} %hacer tablas
\usepackage{adjustbox} %ajustar tabla a hoja
\usepackage{breqn} %ajustar ecuacion cuando se sale del margen
\usepackage{slashbox,multirow} %para varios textos en la linea de cabeza de
las tablas
\usepackage{chngcntr} %para contar pie de pagina seguidas
\usepackage[flushleft]{threeparttable}
\usepackage[english]{babel}
\usepackage{natbib}
\usepackage{siunitx,booktabs}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\usepackage{inputenc}
\usepackage{fancyhdr}%para las paginas fancy
\usepackage{tabularx}
\usepackage{longtable}
\pagestyle{fancyplain}%\addtolength{\headwidth}{\marginparwidth}
\textheight22.5cm \topmargin0cm \textwidth16.5cm
\oddsidemargin0.5cm \evensidemargin-0.5cm%
\renewcommand{\chaptermark}[1]{\markboth{\thechapter\; #1}{}}
\renewcommand{\sectionmark}[1]{\markright{\thesection\; #1}}
\lhead[\fancyplain{}{\thepage}]{\fancyplain{}{\rightmark}}
\rhead[\fancyplain{}{\leftmark}]{\fancyplain{}{\thepage}}
\fancyfoot{}
\thispagestyle{fancy}%
\unitlength1mm %Define la unidad LE para Figuras
\mathindent0cm %Define la distancia de las formulas al texto, fleqn las
descentra
\marginparwidth0cm
\parindent0cm %Define la distancia de la primera linea de un parrafo a la
margen
\newcommand{\PreserveBackslash}[1]{\let\temp=\\#1\let\\=\temp}
\let\PBS=\PreserveBackslash
\renewcommand{\baselinestretch}{1.1}
\newcommand{\arr}[1]{\raisebox{1.5ex}[0cm][0cm]{#1}}
\usepackage{Befehle}
\hyphenation {Reaktor-ab-me-ssun-gen Gas-zu-sa-mmen-set-zung
Raum-gesch-win-dig-keit Durch-fluss Stick-stoff-gemisch
Ad-sorp-tions-tem-pe-ra-tur Klein-schmidt
Kohlen-stoff-Mole-kular-siebe Py-rolysat-aus-beu-te
Trans-port-vor-gan-ge}
</code></pre>
<p>%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%</p>
<pre><code> \usepackage[colorlinks = true, linkcolor = blue, urlcolor = blue,
citecolor = blue, anchorcolor = blue]{hyperref}
\usepackage[table]{xcolor}
</code></pre>
<p>%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%</p>
<pre><code>\begin{document}
\pagenumbering{roman}
\include{HojaTitulo/HojaTitulo}
\newcommand{\clearemptydoublepage}
{\newpage{\pagestyle{empty}\cleardoublepage}}\include{Abstract}
\tableofcontents
\label{listoffigures}
\listoffigures
\addcontentsline{toc}{chapter}{\listfigurename}
\label{listoftables}
\listoftables
\addcontentsline{toc}{chapter}{\listtablename}
\include{TabSimbolos}
\pagenumbering{arabic}
</code></pre>
<p>%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%</p>
<pre><code> \include{Introduccion}
\include{Econometric}
\include{Copulas}
\include{graficos}
\addcontentsline{toc}{chapter}{Bibliography}
\bibliographystyle{apalike}
\bibliography{Bibli}
\end{document}
</code></pre>
| 0non-cybersec
|
Stackexchange
|
[SV] 10.5 months, 191.6 pounds down. Scale starts with a 2 for the first time in over 25 years.. https://imgur.com/a/BYnd8
The best part about posting success stories around here, is that I am not the odd rarity. The success stories flow around here like melted butter and hot bacon grease. I am always so excited to read about other people's progress. 5 pounds or 50, I love seeing goals being crushed and smiling faces in "after" pictures! That was my main motivation to start this "crazy" eating method in the first place. So I will keep posting mine, in the hopes that maybe I can pay back a little bit of what this sub has done for me by motivating someone else.
If you are just starting out, stick with it. If you haven't started yet, start today. Because I can't wait to read YOUR success stories.
Note: Read the FAQ. It's how I started. Better and smarter people than me compiled it, and it is far better information that I can pass along. So if you want to know how I did it, read the FAQ.
| 0non-cybersec
|
Reddit
|
Cottontails won't reject their babies if the smell like humans, cats or dogs..
| 0non-cybersec
|
Reddit
|
SSL certificate issued by and valid dates show in Chrome but not FF. <p>When I connect to my site over HTTPS, chrome displays the padlock and when you click it it shows the issuer and dates.</p>
<p>However when you view the site (over HTTPS) in firefox, it says: This website does not supply indentity information, Your connection to this site is only partially encrypted...etc</p>
<p>The certs were issued by RapidSSL.</p>
<p>Thanks,</p>
<p>Dave</p>
| 0non-cybersec
|
Stackexchange
|
How to make grep command return entire matching line. <p>How can I make the command <code>grep -w</code> show the entire line that contains the match?
I need to force <em>pattern</em> to match whole words, but I need to see all of the line.</p>
<p>Here is my command:</p>
<pre><code>cat /var/log/message.log | grep -w foobar
</code></pre>
| 0non-cybersec
|
Stackexchange
|
Problem with sudo via ssh. <p>I'm using the a script to execute a update script on a certain number of servers in my network. Here is the part I think is relevant.</p>
<pre><code>### Actual Work ###
if [[ $manual == 1 ]]; then # Server was given manually as a argument.
for ARG ; do # Do for all given servers:
if [[ $no_runcheck == 0 ]]; then # Check wether the given server is
# already running.
/usr/local/bin/serverstart.sh -v 3 -z 30 ${ARG##*@} # Cut off the user-
# name.
fi
ächo "Upgrading system on ${ARG##*@} as ${ARG%%@*}…"
ssh -t $ARG '/usr/local/bin/installieren.sh -U' # Execute update script.
# Use ssh with pseudo terminal (option: -t).
done
else # No argument was given. Extract it from the config file.
while read line; do # Read line by line.
name=$line # Initialise a new variable for each line. (Unnecessary but more
# clear)
if [[ $no_runcheck == 0 ]]; then # Check wether the given server is already
# running.
/usr/local/bin/serverstart.sh -v 3 -z 30 ${name##*@} # See above.
fi
ächo "Upgrading system on ${ARG##*@} as ${ARG%%@*}…"
ssh -t $name '/usr/local/bin/installieren.sh -U' # Execute update script.
done < $config_file_path # Define input for line by line reading here.
fi
</code></pre>
<p>What it does: If arguments like user1@server1 and user2@server2 are given</p>
<ul>
<li>Check if the server is running with a different script.</li>
<li>Execute the update script. Authorise via "ssh -t"</li>
</ul>
<p>If no arguments are given, read a <code>config</code> file that contains a list like:</p>
<pre><code>user1@server1
user2@server2
</code></pre>
<p>The problem occurs only with the latter. Bash says</p>
<pre><code>Pseudo-terminal will not be allocated because stdin is not a terminal.
</code></pre>
<p>What am I doing wrong?</p>
<p>Note: ächo is a predefined function that adds the scriptname and the current time to <code>echo</code>.</p>
| 0non-cybersec
|
Stackexchange
|
Time HTTP Response in Go. <p>In my Go program, I made some HTTP requests and I need to time the <strong>response time</strong> (and not request time).</p>
<p>Here is my current code (timing request time):</p>
<pre><code>func Get() int {
start := time.Now()
result, err := http.Get("http://www.google.com")
if err != nil {
log.Fatal(err)
}
defer result.Body.Close()
elapsed := time.Since(start).Seconds()
log.Println(elapsed)
return result.StatusCode
}
</code></pre>
<p>Actually, this code will show something about 5s request time, including DNS resolution and other things... If I execute the same test with a tool like Apache JMeter, the time is just about 100ms (which is the real response time of the server, without taking care about request time).</p>
<p>What I really want is to compute the real response time of the server. How can I compute this in Go ?</p>
| 0non-cybersec
|
Stackexchange
|
Paypal Bug Bounty's Question. I found 2 XSS (a low-level and a persistent) on Paypal's subsidiary sites about 2 weeks ago. I sent to them the PoCs. They didn't reply back. However today I checked back the bugs were fixed.
Shouldn't they reward when the XSS bugs is covered in their bug bounty page?
I didn't research on Google and found out many people didn't get paid for finding XSS vuln in Paypal. I'm scared now. I'm writing another mail to them. What should I do?
| 1cybersec
|
Reddit
|
Beautiful flower petal whirlwind.
| 0non-cybersec
|
Reddit
|
[Build Help] How do I setup a fan to turn on at certain temperatures?.
| 0non-cybersec
|
Reddit
|
Number of path-connected components of the set of all $m$-th roots of the identity matrix. <p>Let $m$ be a fixed natural number</p>
<p>Let $X$ be the subset of $M_n( \Bbb C)$ defined by :
$X=\{A:A^m=I_n\}$ </p>
<p>count the number of arc connected components of $X$</p>
<p>Except to note that the eigenvalues of the matrices of $X$ are the $n$-th roots of the unit, I do not advance in the enumeration</p>
| 0non-cybersec
|
Stackexchange
|
Does clearing the Browser Data also clear out the data of a PWA?. <p>I'm new to PWA and had this question bugging me. If a user clears out the browser data, will it also clear out the data which is stored by a Progressive Web App, as it depends on the browser for it's execution?</p>
| 0non-cybersec
|
Stackexchange
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
hooded figure, Daniel Arsham, 15'.
| 0non-cybersec
|
Reddit
|
Have you ever sorted anything by "Price: High to Low", and if so what was it?.
| 0non-cybersec
|
Reddit
|
3 classes of magic.
| 0non-cybersec
|
Reddit
|
Graph theory: definiton of the crown of a graph. <p>I'm currently reading "Invitation to Fixed-Parameter Algorithms" by Rolf Niedermayer. Page 69 gives the following definition of the crown of a graph, which I do not quite understand:</p>
<p>A crown of a graph $G = (V,E)$ consists of $H\subseteq V$ and $I \subseteq V$ with $H \cap I = \varnothing$ s.t. the following three conditions hold:</p>
<ul>
<li>$H = N(I)$ </li>
<li>$I$ forms an independent set</li>
<li>the edges connecting $H$ and $I$ contain a matching in which all elements of $H$ are matched.</li>
</ul>
<p>$N(I)$ is the neighborhood of vertices $I$, i.e., $N(I) = \{u \mid v \in I \land (u,v) \in E\}$.</p>
<p>I'm stuck with the third point: I'm interpreting it as "in the bipartite graph $(H, I, F)$ with $F = \{(u,v) \in E \mid u\in I \land v \in H\}$ there is a matching $M\subseteq F$ s.t. $\forall v \in H: \exists (u,v) \in F$, i.e., each vertex in $H$ is covered by an edge in the matching $M$".</p>
<p>But does this not imply that $|I| \geq |H|$ since there can at most be $|I|$ non-adjacent edges connected to vertices in $I$? This would imply that $I$ is a set of vertices that have degree 1, which surely is not the intention since a crown is intended to be a generalization of 1-connected vertices.</p>
<p>What am I missing?</p>
| 0non-cybersec
|
Stackexchange
|
I found out I could rent a plot of land from my local parks department to garden. I was unsure of my abilities, but this city girl just brought in her first haul! I even have a baby pumpkin! Wanted to share, even though it's not as impressive as most of the stuff on here :).
| 0non-cybersec
|
Reddit
|
I'm loving this PCMR Google Chrome extension more and more each day....
| 0non-cybersec
|
Reddit
|
Caravan Palace - Lone Digger [Electro Swing].
| 0non-cybersec
|
Reddit
|
This is Molly. 18 and still going strong.
| 0non-cybersec
|
Reddit
|
Where is pip cache folder. <p>Where is <strong>Python pip</strong> cache folder? I had error during install and now reinstall packages using cache files</p>
<p>Where is that directory? I want backup them for install in the future. Is it possible ?</p>
<p>For example I have this one : </p>
<pre><code>Using cached cssselect-0.9.1.tar.gz
</code></pre>
<p>I searched google for this directory but anything I saw, is learn to how install from a folder, I want to find default cache directory.</p>
<p>And another question, these cache files will stay in that directory or will remove soon ?</p>
| 0non-cybersec
|
Stackexchange
|
TIFU by breaking my genitals and bleeding all over my girlfriends room NSFW. Basically, around 1 month ago whilst me and my girlfriend were doing the deed, she said ‘whys there blood on the bed?’. I thought she was joking at first but once I looked down I could see a growing puddle of blood forming. This freaked me out as I had no clue what was happening so I instantly stopped, pulled out and decided the best thing to scream was ‘wtf you never told me you were on your period!!?. She starts panicking thinking she is, in fact, on the blob.
She runs to the bathroom to check whilst I stand there and slowly realise the blood is still coming from somewhere. I pull back my foreskin to a huge squirt of blood coming from the end of my shlong. This throws me off and I realise that this is the worst possible situation I’ve ever encountered. It keeps squirting and won’t stop, going all over the bed, on my legs, hands, you name it. I fall backwards in panic leaving a fat handprint of blood on the wall and scream ‘it’s me it’s me’.
I then proceeded to run into the bathroom where I throw my penis into the sink to try and have a better look at the damaged goods. There I see a huge tear on my ‘frenulum’ or as they call it, the ‘banjo’. I instantly feel lightheaded and I honestly do not know what to do. Blood is pouring like a bloody waterfall and I am questioning whether my penis is about to fall off. It’s at this point I think I should start dabbing it with tissue. I end up clogging the sink with blood stained tissue which to this day is still clogged a month later in the pipes somewhere.
I end up sitting on the toilet to let the blood drip out and eventually stop. I just can’t take what is happening though. My girlfriend is now screaming because not only is her bed covered but also her sink, floors, walls, taps, soaps, shower and towels covered in my blood. It genuinely looks like there’s been a massacre.
I then come to an epiphany that the best way to get through this is to call my mum. What the fuck was I thinking. I dial her number and wait for her to answer, realising I’m about to tell her that I’m currently in a blood soaked room, naked on a toilet with a broken erection. She answers and I tell her to which she is quite understanding, probably due to the fact that I was crying a little.
My girlfriend then decides she needs to start washing her bed sheets straight away and also believes she can’t complete this task alone. She disappears for 1 minute and BANG returns with 2 flatmates who then stare at me as I sit on the toilet naked coated in blood.
It’s too late though, the sheets are fucked, my dick is fucked, my life is fucked, it’s over. We bin the sheets. Once my penis has stopped bleeding everywhere I call the hospital to which the man on the phone says I can’t use it for 2 weeks. Then follows the most painful 2 weeks of my life.
To conclude, 1 month later, the sink is still clogged in the pipes from my bloody tissues, we are still finding blood stains randomly in the bathroom and I had to have my penis looked at by a doctor named Tim.
TL:DR I ripped my dick mid sex, blamed my girlfriend for being on her period, covered her room in blood and rang my mum and cried.
[Link to the blood stained bathroom and bed](https://imgur.com/gallery/FixxB)
| 0non-cybersec
|
Reddit
|
Layers of ice in a glacier, warped by melting and refreezing. Story in comments. Credit: Mike Wolovick.
| 0non-cybersec
|
Reddit
|
configure dovecot 10-auth.conf. <p>i'm going to setup mail server according this guide :
<a href="https://workaround.org/ispmail/wheezy" rel="nofollow noreferrer">https://workaround.org/ispmail/wheezy</a></p>
<p>on <code>setting up dovecot</code> part <code>10-auth.conf</code></p>
<p>it's says change <code>auth_mechanisms = plain</code> to <code>auth_mechanisms = plain login</code></p>
<p>and it's also say's :
<code>By default Dovecot sets "disable_plaintext_auth = yes" which ensures that every connection is encrypted using TLS.</code></p>
<p>but on my <code>10-auth.conf</code> file
<code>disable_plaintext_auth = yes</code> is commented like :
<code>#disable_plaintext_auth = yes</code></p>
<p>should i uncomment it ?</p>
| 0non-cybersec
|
Stackexchange
|
Am I an asshole for saying that a first car should be slow and safe>fast and cool?. Pretty much title- I just replied to someone on here and got to thinking- usually when I tell people to get a slow car for their first car I take a lot of flak on this sub, but like, isn't you not being dead or driving like an idiot more important that your first car being something you can go fast or pick up chicks (or dudes) in?
| 0non-cybersec
|
Reddit
|
How to configure Spring HATEOAS behind proxy?. <p>I have Spring Data Rest with Hateoas as my backed. It is behind a proxy.</p>
<p>Backend url: <code>backend.com</code></p>
<p>Proxy url: <code>proxy.com</code></p>
<p>When I query proxy url, e.g. <code>http://proxy.com/items/1</code>, I get a response with <code>href</code> links with domain <code>backend.com</code>. I need the domain to be <code>proxy.com</code>.</p>
| 0non-cybersec
|
Stackexchange
|
Finding a bounded sequence of $C[0,\pi]$ such that it has no cauchy subsequnce. <p>Consider $(X,\|\cdot\|) = (C[0,\pi],\|\cdot\|_{2})$ where $\|f\|_{2} = \left (\int_{0}^{\pi} |f(t)|^{2} \,\mathrm{d}t)\right )^{\frac{1}{2}}$ How can I find a bounded sequence $(f_{n}) \in X$ which has no Cauchy subsequence? I'm aware of the question (<a href="https://math.stackexchange.com/questions/159364/sequence-in-c0-1-with-no-convergent-subsequence">Sequence in $C[0,1]$ with no convergent subsequence</a>) but their example doesn't work for this norm.</p>
| 0non-cybersec
|
Stackexchange
|
i...uh...uhm....
| 0non-cybersec
|
Reddit
|
How do you walk like an Egyptian?. Quickly so you don't get hit by tear gas.
| 0non-cybersec
|
Reddit
|
[homemade] a torn peanut butter chocolate chunk Marshmallow cookie.
| 0non-cybersec
|
Reddit
|
How can we count different coloring in 2 cycle with one edge in common. <p>There is a question that asked <em>what is the counts of different coloring in <span class="math-container">$C_5$</span> and <span class="math-container">$C_6$</span> when it has one edge in common</em>:
<img src="https://i.stack.imgur.com/nUTC6.jpg" alt="c5 and c6 with one edge in common">
I have used fundamental reduction in cycles in order to get a recursive formula (I know there is a closed formula for that too), but when i try use the same in this particular question, it becomes very complicated. How can I find a formula for this kind of graph? Im looking for Chromatic Polynomial. </p>
| 0non-cybersec
|
Stackexchange
|
Warning C4691 when building a C++/CLI executable: ignore or repair?. <p>When using assemblies from NuGet, I am virtually guaranteed to encounter this warning. </p>
<p>Our code base is mission critical. Are these warnings going to pose a threat to our code stability and performance? If so, how do I repair the warning condition so that instability is not an issue?</p>
<p>Warnings appear as follows:</p>
<pre><code>>c:\projects\ucpro\application\ucpront\logging.h(33): warning C4691: 'System::Exception': type referenced was expected in unreferenced assembly 'System.Runtime', type defined in current translation unit used instead
>c:\projects\ucpro\application\ucpront\logging.h(33): note: This diagnostic occurred while importing type 'Microsoft::Extensions::Logging::ILogger ' from assembly 'Microsoft.Extensions.Logging.Abstractions, Version=1.1.2.0, Culture=neutral, PublicKeyToken=adb9793829ddae60'.
>c:\projects\ucpro\application\ucpront\logging.h(33): warning C4691: 'System::Func': type referenced was expected in unreferenced assembly 'System.Runtime', type defined in current translation unit used instead
>c:\projects\ucpro\application\ucpront\logging.h(33): note: This diagnostic occurred while importing type 'Microsoft::Extensions::Logging::ILogger ' from assembly 'Microsoft.Extensions.Logging.Abstractions, Version=1.1.2.0, Culture=neutral, PublicKeyToken=adb9793829ddae60'.
</code></pre>
<p>An easy example is when trying to use Microsoft.Extensions.Logger. One can easily reproduce the issue with <a href="https://www.dropbox.com/s/9261ina8p4gyce1/SW-132v2.zip?dl=0" rel="nofollow noreferrer">this project</a></p>
<p>As seems to be a necessity, I am pulling the NuGet via a shim library which itself targets .NET 4.6 also, then directly pointing at the net46 folder to pull in the Microsoft.Extensions.*.dll 's.</p>
<p>The warnings seem like artifacts of assembly redirection from netstandard to .NET Framework</p>
| 0non-cybersec
|
Stackexchange
|
I had a terrible dream the other night that I was a tail pipe... I could barely sleep.. I woke up exhausted!
| 0non-cybersec
|
Reddit
|
If a line intersects a curve in $n-1$ rational points is the $n$'th point also rational?. <p>I am trying to solve problem 5.40 from Fulton's book on algebraic curves, stating the following</p>
<blockquote>
<p>Let $\mathbb{K}_0$ be a subfield of $\mathbb{K}$, and $\mathbb{K}$
algebraically closed. Suppose a nonsingular cubic $C$ is rational over
$\mathbb{K_0}$ (all the coefficients defining $C$ are in
$\mathbb{K}_0$). Let $C(\mathbb{K}_0)$ be the set of points of $C$
that are rational over $\mathbb{K}_0$. Then, if $P,Q\in C(\mathbb{K}_0)$, and $L$ the line passing through $P$ and $Q$
intersects $C$ in a third point $R$, show that $R\in C(\mathbb{K}_0)$.</p>
</blockquote>
<p>Even though in most of the book Fulton supposes that $\mathop{Char}(\mathbb{K})=0$, I am not sure if it is necessary in order to solve this problem nor if we need it for Bezout's theorem, but I believe it's not. By this point in the book Bezout's and Noether's theorem are already covered.</p>
<p>I know a way to solve the problem by putting the curve in Weierstrass form and explicitly computing $R$, but I don't think it works in charactersistics $2$ and $3$, and the wording of the problem suggests that it can be proved without resorting to an explicit construction of $R$.</p>
<p>Furthermore, is this result true in general? If a line $L$ intersects a degree $n$ rational curve $F$ in $n-1$ rational points, then the $n$'th point of intersection is also rational. </p>
<p>If $L$ intersects $F$ in $n-2$ rational points this is not true. We can see this by setting $\mathbb{K}=\mathbb{C}$, $\mathbb{K}_0=\mathbb{R}$, $F=x^4-y$ and $L=y-1$. Then we have
$$
L\cdot_\mathbb{R} F = (1,1) + (-1,1),
$$
while
$$
L\cdot_\mathbb{C} F = (1,1) + (-1,1) + (i,1) + (-i,1).
$$</p>
| 0non-cybersec
|
Stackexchange
|
Offended.
| 0non-cybersec
|
Reddit
|
iptables logging not working?. <p>OS: Ubuntu 10.04
Logging daemon: rsyslog</p>
<p>For some reason i'm not getting any iptables logs, even thought i don't look through them very often i'd still like to get it working for the sake of it working XD</p>
<p>Here is my /etc/ryslog.d/iptables.conf</p>
<pre><code>:msg, contains, "[IPTABLES]" -/var/log/iptables.log
& ~
</code></pre>
<p>My iptables logging prefix is "[IPTABLES]" followed by whatever else (example [IPTABLES] Denied xyz)</p>
<p>the /var/log/iptables.log file is being created, however its not getting any entries.
I can see the logging entries in dmesg but not in syslog or messages.</p>
<p>Whats going on?</p>
<p>EDIT: My iptables logging rules:</p>
<pre><code># logging limit
LoggingLimit=5/min
LoggingPrefix=IPTABLES
# Logging chain
iptables -N LOG_REJECT
iptables -A LOG_REJECT -j LOG
# join INPUT to LOG_REJECT
iptables -A INPUT -j LOG_REJECT
# logging
iptables -A LOG_REJECT -p tcp -m limit --limit $LoggingLimit -j LOG --log-prefix "$LoggingPrefix Denied TCP: " #--log-level 7
iptables -A LOG_REJECT -p udp -m limit --limit $LoggingLimit -j LOG --log-prefix "$LoggingPrefix Denied UDP: " #--log-level 7
iptables -A LOG_REJECT -p icmp -m limit --limit $LoggingLimit -j LOG --log-prefix "$LoggingPrefix Denied ICMP: " #--log-level 7
</code></pre>
<p>Update: I found a thread that has the same symptoms as i do, apparently is a kernel bug. I am using a VPS so could anyone point me on how to upgrade my kernel or apply a workaround? I couldn't find a 2.6.34 kernel listed in apt-cache.</p>
<p>Thread: <a href="http://www.linode.com/forums/viewtopic.php?t=5533" rel="nofollow noreferrer">http://www.linode.com/forums/viewtopic.php?t=5533</a></p>
| 0non-cybersec
|
Stackexchange
|
In Germany, we put stickers like this on our dashboards when we put on winter tyres to remind us not to go too fast.. They look like this: http://i.imgur.com/xTDo1TP.jpg
| 0non-cybersec
|
Reddit
|
Robot bees can now dive in and out of water using tiny combustible rockets.
| 0non-cybersec
|
Reddit
|
Find core used from CPU utilization?. <p>I have average and peak CPU utilization(in percentage) of a linux server with me . Mainly couple of web apps are deployed on the machine. I need to decide what AWS machine suits me based on that. AWS
provides the machine costing based on CPU cores. </p>
<p>Now I need to find out the average and peak core utilization from CPU utilization ,
Can I deduce core utilization from CPU utilization based on some formula ? If not how can I find average and peak core utilization
on linux server over a period of time ?</p>
| 0non-cybersec
|
Stackexchange
|
Pain Job, how much will it cost?. Hello there, straight to the point. I have a '90 miata that is in real need of a new paint job. Since it is a small car, how much should i expect to pay? It does need a lot of sanding and smoothing things out...
| 0non-cybersec
|
Reddit
|
Issue in starting Hosted network/Portable wifi hotspot in laptop. <p>I used wifi hotspot without a single problem until a few days ago when I couldn't access the network on my phone through my laptop's wifi hotspot, I checked and found out that there was a problem with my laptop i.e. it did not support hosted network. how is that possible? Suddenly my wifi adapter can't support hosted network(wifi hotspot)? Please help me on how can I turn on wifi hotspot. Thanks in advance.</p>
<p>Here are some things(that might help you?)</p>
<ul>
<li>I use windows 10</li>
<li>I have the latest version of my wifi adapter</li>
<li>My wifi adapter is Realtek RTL8723BE 802.11 bgn</li>
<li>I was using wifi hotspot without a problem in the past but suddenly now it stopped</li>
</ul>
| 0non-cybersec
|
Stackexchange
|
Pokémon vending machine at Safeway in Seattle!.
| 0non-cybersec
|
Reddit
|
$\alpha$-limit set in $A=\{x\in \mathbb{R}^2|1<|x|<2\}$. <p>Consider the system
$$
\dot{x}=-y+x(r^4-3r^2+1)\\
\dot{y}=x+y(r^4-3r^2+1)
$$
where $r^2=x^2+y^2$.</p>
<p>Let $A=\{x\in \mathbb{R}^2|1<|x|<2\}$.</p>
<p>Affirmation (fait accompli): $\dot{r}<0$ on the circle $r=1$ and $\dot{r}>0$ on the circle $r=2$. </p>
<p>My question (doubt) is: Why the affirmation above implies that the $\alpha$-limit set any trajectory that starts in $A$ is in $A$?</p>
<p>Thank You!</p>
| 0non-cybersec
|
Stackexchange
|
How to see all the bits of a file?. <p>I'm looking for a way to see all the bits of a file. I want to see all the 01's in my file, because I want to know what changes exactly happen when I edit a file using a closed-source application.</p>
| 0non-cybersec
|
Stackexchange
|
If you like cooking shows, I highly recommend Netflix Ugly Delicious. This show created by David Chang is astounding.
They take a dish and transport it's options around the world.
First episode is pizza. Second is tacos.
It's honest open and real.
| 0non-cybersec
|
Reddit
|
Retrieve cover artwork using Spotify API. <p>There is currently no way to retrieve the cover artwork using Spotify's Web API. Are there plans to implement these or any workarounds?</p>
| 0non-cybersec
|
Stackexchange
|
Porcelain bowl. Fired to cone 10. The size is about 10 inches and about 8 inches wide..
| 0non-cybersec
|
Reddit
|
These are a drawings. [PIC].
| 0non-cybersec
|
Reddit
|
Any way to simplify this expression?. <p>So I have a vector of asset allocation weights given by $x \in R^4$ and a covariance matrix of the asset returns $\Sigma \in R^{4,4}$. I know by the spectral theorem, $\Sigma = V DV^{-1}$ and the standard deviation of the returns is $\sqrt{x^T \Sigma x}$. Is there any way to use this info and simplify the expression for the standard deviation and remove the square root?</p>
| 0non-cybersec
|
Stackexchange
|
Seeking methods to solve $ \int_{0}^{\frac{\pi}{2}} \ln\left|2 + \tan^2(x) \right| \:dx $. <p>As part of going through a <a href="https://math.stackexchange.com/questions/2987994/integration-using-the-feynman-trick/3000330#3000330">set of definite integrals</a> that are solvable using the Feynman Trick, I am now solving the following: </p>
<p><span class="math-container">$$ \int_{0}^{\frac{\pi}{2}} \ln\left|2 + \tan^2(x) \right| \:dx $$</span></p>
<p>I'm seeking methods using the Feynman Trick (or any method for that matter) that can be used to solve this definite integral. </p>
| 0non-cybersec
|
Stackexchange
|
Just a space tree 🌲.
| 0non-cybersec
|
Reddit
|
Jon Stewart Devoured Hillary Clinton And The Media Ignored It.
| 0non-cybersec
|
Reddit
|
[Same driver as oncoming traffic Georgia video] BMW E34 M5 Driving/Drifting in TBILISI streets.
| 0non-cybersec
|
Reddit
|
iPhone SE locked and unable to unlock. <p>I forgot the pass code of my iPhone SE.<br>
I have switched it off now.<br>
Yesterday, I reset my pass code but now I can't remember it.</p>
| 0non-cybersec
|
Stackexchange
|
Gold Panda - You (The whole album Lucky Shiner is genius. Get on it asap. If you're feeling dangerous listen to Quitter's Raga as well).
| 0non-cybersec
|
Reddit
|
Donald Trump.
| 0non-cybersec
|
Reddit
|
Every time this guy starts a sentence....
| 0non-cybersec
|
Reddit
|
Stream video on VLC Player over sftp with ssh key authorization. <p>So I know that I can stream media to VLC using sftp, however my server uses ssh-key authorization and not username/password. Is there any way to allow VLC to use my private ssh key to connect to my server so I can stream media thru sftp?</p>
| 0non-cybersec
|
Stackexchange
|
Find the sum of the following infinite series. <p>Find the sum of the following infinite series in which numerator and denominator contains term which are product of integers in arithmetic progression:</p>
<blockquote>
<blockquote>
<p>$$\frac15+ \frac{1\times4}{5\times10}+\frac{1\times4\times7}{5\times10\times15}+\dots$$</p>
</blockquote>
</blockquote>
<p>I found this problem in an Indian competitive exam. I tried some conventional methods, but could not find the sum. Please offer any help you think is useful. Thanks!</p>
| 0non-cybersec
|
Stackexchange
|
So Sleepy.
| 0non-cybersec
|
Reddit
|
Examples of xkcd's magic proofs. <p>Today's xkcd describes <a href="http://xkcd.com/1724/" rel="nofollow">magic proofs.</a> Can anyone think of some good examples of these?</p>
| 0non-cybersec
|
Stackexchange
|
urlencoded Forward slash is breaking URL. <p><strong>About the system</strong></p>
<p>I have URLs of this format in my project:-</p>
<pre><code>http://project_name/browse_by_exam/type/tutor_search/keyword/class/new_search/1/search_exam/0/search_subject/0
</code></pre>
<p>Where keyword/class pair means search with "class" keyword.</p>
<p>I have a common index.php file which executes for every module in the project. There is only a rewrite rule to remove the index.php from URL:-</p>
<pre><code>RewriteCond $1 !^(index\.php|resources|robots\.txt)
RewriteCond %{REQUEST_FILENAME} !-f
RewriteCond %{REQUEST_FILENAME} !-d
RewriteRule ^(.*)$ index.php [L,QSA]
</code></pre>
<p>I am using urlencode() while preparing the search URL and urldecode() while reading the search URL.</p>
<p><strong>Problem</strong></p>
<p>Only the forward slash character is breaking URLs causing 404 page not found error.
For example, if I search <code>one/two</code> the URL is </p>
<pre><code>http://project_name/browse_by_exam/type/tutor_search/keyword/one%2Ftwo/new_search/1/search_exam/0/search_subject/0/page_sort/
</code></pre>
<p>How do I fix this? I need to keep index.php hidden in the URL. Otherwise, if that was not needed, there would have been no problem with forward slash and I could have used this URL:-</p>
<pre><code>http://project_name/index.php?browse_by_exam/type/tutor_search/keyword/one
%2Ftwo/new_search/1/search_exam/0/search_subject/0
</code></pre>
| 0non-cybersec
|
Stackexchange
|
to get The way anywhere....
| 0non-cybersec
|
Reddit
|
What do people think of this crossover?.
| 0non-cybersec
|
Reddit
|
AITA for giving a bad reference?. To be clear, I'm more advising my husband on this one. But he doesn't use reddit, so I'm doing it for him
A woman (Sarah) that used to be our friend just contacted my husband and asked if she could use him as a reference. Our friendship with her/her family ended awkwardly because of two things.
1). Sarah worked for us, briefly. We had to fire her because she is freaking flaky, and she called off 40-50% of the time.
2). Sarah had a one sided flirting thing with my husband. It escalated over time but included
A) texting my husband they should run away together. (She claimed that her husband sent this. It would be ridiculously out of character for him)
B) She confided personal issues between her and her husband, but only if neither her husband nor I was present.
C) She engineered a situation where my husband would see her naked. Like, she called to ask for help, my husband says he was on his way, he knocked on her door, she said "come in", and she was topless pretending she was just getting changed and he caught her off guard
D) she invited him over for "game night" (usually with her husband and his friends), and she turned out to be the only one there.
In addition to what we know from our personal interactions we know a lot more about her. She flies through jobs like water. Her behavior has gotten her husband fired from at least two jobs. She has stalked/came onto more guys than just my husband.
She doesn't know all the details about why our friendship ended, because my husband likes/feels sorry for HER husband. But she knows it did not end well.
I think, if she is desperate enough to reach out to us for a reference, she deserves what she gets. My husband should fill out the reference and save some employer from a REALLY bad choice. (She's one of those ones who would interview well, but screw a place over).
My husband isn't sure if that's an asshole move. He thinks he should just politely decline. I think it's an asshole move to let some poor hiring manager get screwed over by her.
So what do you think, who's the asshole here?
| 0non-cybersec
|
Reddit
|
Lol.
| 0non-cybersec
|
Reddit
|
Did I just 'autoremove' half my computer?. <p>I am trying to get Django/Python to run on my computer, but it's confusing that <code>python</code> runs Python v2 while there is also a Python v3 installed which needs to be run as <code>python3</code> (both come preinstalled?!) and either way, the Django installer complains. </p>
<p><strong>Anyway,</strong> I was trying to remove Django and the Python PIP installation utility, so <strong>I ran the command: <code>sudo apt-get autoremove python-pip*</code></strong> and the terminal output frankly scares me: <a href="http://pastebin.com/raw.php?i=b0RHs3e4" rel="nofollow">http://pastebin.com/raw.php?i=b0RHs3e4</a></p>
<p>It looks like it removed all kinds of things I didn't expect, including obviously vital and non-Python things like <code>ubuntu-desktop</code> and <code>unity8-common</code> <strong>and even <code>software-center</code>!</strong> </p>
<p>I'm afraid that if I log out of my session or reboot, then I'll never get this computer started again. </p>
<p><strong>What damage did I just do, and how can I recover?</strong> Why where all of these removed in the first place? How did "autoremove" trigger these to be included? (Luckily, my actual data is safely backed up.)</p>
<p><strong>Update 1:</strong><br>
The answer linked in the comment below looks relevant <em>but not complete.</em> Following the linked answer, my system did reinstall many packages as expected -- but others were not, so they are still missing from my system. Still worried whether my machine is broken. Among the removed-and-not-reinstalled packages are:</p>
<ul>
<li>account-plugin-tools</li>
<li>accountsservice-ubuntu-schemas</li>
<li>address-book-service</li>
<li>dbus-property-service</li>
<li>dcraw</li>
<li>exiftran</li>
<li>ffmpegthumbnailer</li>
<li>libhardware2</li>
<li>libhybris</li>
<li>libmedia1</li>
<li>libmirplatform6</li>
<li>libmirserver30</li>
<li>libpay2</li>
<li>system-image-common</li>
<li>system-image-dbus</li>
<li>unity-plugin-scopes</li>
<li>unity-scope-scopes</li>
<li>unity8-common</li>
<li>urfkill</li>
<li>xcftools</li>
<li>... and many others</li>
</ul>
<p>Can I just reinstall these with <code>apt-get</code> as well? </p>
<p><strong>Update 2:</strong><br>
As suggested in comments, I will now do <code>sudo apt-get install --install-suggests {my list of removed packages}</code>. Curiously, even core things like <code>software-center</code> were removed and are not even suggested. So I must include those explicitly in my command.</p>
<p>And I'm still afraid to reboot my computer. I hate it when I make nasty mistakes like this one, because I'm not guru enough to feel safe that I reliably fixed it again.</p>
| 0non-cybersec
|
Stackexchange
|
Republican strategist to Trump: 'Get a good legal team help now because a storm is coming.
| 0non-cybersec
|
Reddit
|
Not finding help anywhere, please help if you can ASHRAN BUG. Last night I queued for ashran while in a group forming an rbg, we got into the rbg and my ashran queue popped, I clicked decline and requeued for ashran after the rbg (didn't get the win) I'm currently seeking out my ashran cap, i requeued and clicked accept this time, in warspear, next thing it doesnt tp me there, so I requeue and go back into rbgs. I end up doing 1 more and then rbgs, it popped after my rbg but still would not let me in, now ashran will NOT let me queue, whenever I run in it kicks me out instantly, with no warning, and tells me "my group has been disbanded". I get no queue, nothing happens, i've switched computers reloaded ui a lot of basic troubleshoot but nothing. people on forums have complained but received no help.
| 0non-cybersec
|
Reddit
|
Xvfb - phantomjs - linux redhat enterprise 5. <p>I am trying to get phantomjs (a headless browser) working on my server...</p>
<p>Bottom line is i'm not having any luck.</p>
<p>The answer in the FAQ for phantomjs is to run it with Xvfb:
<a href="http://code.google.com/p/phantomjs/issues/detail?id=163" rel="nofollow noreferrer">http://code.google.com/p/phantomjs/issues/detail?id=163</a></p>
<p>However i have NO IDEA what this means or how to use it. I installed it with yum instal... that's as far as I got.</p>
<p>I even emailed the developer and asked him for explanation, he quickly responded by creating an issue in the bug tracker to add it to the documentation...</p>
<p><a href="http://code.google.com/p/phantomjs/issues/detail?id=177" rel="nofollow noreferrer">http://code.google.com/p/phantomjs/issues/detail?id=177</a></p>
<p>I would greatly appreciate if someone could contribute and write instructions on how to do this. </p>
<p>However, I am in a crunch and need it today so I would be more than willing to pay someone $100 to take care of this for me. Please text if interested - 1.941.993.0586</p>
| 0non-cybersec
|
Stackexchange
|
git-svn migration fatal: not a valid SHA1 update-ref refs/heads/master refs/remotes/trunk: command returned error: 128. <p>Trying to migrate a large but linear svn repository to git. The svn repository does not have the standard layout (trunk, branches, tags)...just one directory with the trunk.</p>
<p>Ubuntu 12.4 LTS,git 1.7.9.5.</p>
<pre><code>$ git svn clone https://coawstmodel.sourcerepo.com/coawstmodel/COAWST --authors-file=../users.txt COAWST
...
D WPS/metgrid/storage_module.F
D WPS/metgrid/process_domain_module.F
W: -empty_dir: WPS/metgrid/gridinfo_module.F
W: -empty_dir: WPS/metgrid/input_module.F
W: -empty_dir: WPS/metgrid/interp_option_module.F
W: -empty_dir: WPS/metgrid/module_date_pack.F
W: -empty_dir: WPS/metgrid/process_domain_module.F
W: -empty_dir: WPS/metgrid/storage_module.F
r635 = c19181c9718e701788b540ed0cc559e4fbddf413 (refs/remotes/git-svn)
M Tools/Docs/COAWST_User_Manual.doc
r636 = 1b7849c3e5a20856c9ddb909a5f53ddf8501ad33 (refs/remotes/git-svn)
Auto packing the repository for optimum performance. You may also
run "git gc" manually. See "git help gc" for more information.
Counting objects: 14143, done.
Delta compression using up to 8 threads.
Compressing objects: 100% (14039/14039), done.
Writing objects: 100% (14143/14143), done.
Total 14143 (delta 8350), reused 0 (delta 0)
fatal: refs/remotes/trunk: not a valid SHA1
update-ref refs/heads/master refs/remotes/trunk: command returned error: 128
</code></pre>
<p>I have tried variants with combinations of -s, -t Trunk, -t COAWST, --preserve-empty-dirs (which I would like to do), --no-meta-data (per Pro Git)...always the same final error.</p>
<p>Thanks for any suggestions!</p>
| 0non-cybersec
|
Stackexchange
|
In 2014, the USGS Native Bee Inventory and Monitoring Program could not classify this bee so, they simply named it (genus and species) as “bee cute furry face”.
| 0non-cybersec
|
Reddit
|
Rex Tillerson May Have Held Millions In ExxonMobil Stock As Trump Promoted The Oil Giant.
| 0non-cybersec
|
Reddit
|
Are Greek gods only a myth because Christianity came along?. So does that mean that one day Christianity will be just a myth TO THE MILLIONS OF PEOPLE WHO FOLLOW IT? BTW I'm Agnostic. But I love reading stories.
Edit: I know Christianity is a myth and so Is every other religion. But in mainstream society it is still seen as the word of god.
| 0non-cybersec
|
Reddit
|
Apache outputting without .log. <p>I am trying to fix an issue where an apache log is filling the /var/log/ partition. It is a single log in apache2 that is almost 4GB. I have set logrotate to rotate out at 3G, but it has not rotated the log. Additionally, the logrotate looks like this at the top,</p>
<pre><code>/var/log/apache2/*.log
</code></pre>
<p>which seems to imply it will only rotate .log files. The logs in apache2 are sitename.org, with no .log following it. Is this normal behavior/is it why the logs are not rotating properly? There are logs called sitename.org-error.log, and compressed versions of those, but I honestly don't know enough about how apache does logs to know if those are separate logs from the large file taking up the partition.</p>
| 0non-cybersec
|
Stackexchange
|
Adblock plus consuming too much memory in Chrome. <p>I have adblock plus extension in Chrome, but it eats up too much memory causing browsing to be slow or even hanging at times. Is there a way to tackle this or any alternate ad blocking tool which is not memory intensive?</p>
| 0non-cybersec
|
Stackexchange
|
Web Site Create Part 2.
| 0non-cybersec
|
Reddit
|
To my fellow helpdesk operators: What trouble ticketing system(s) do you use?. We are currently using a piece of software (plixer/webnm WebTTS) that is past its end-of-life (no more support/updates). To put it plainly, I hate it and want to migrate to something better. Suggestions? My only two requirements - Trouble ticketing that integrates with AD (auto-login is a must), and a knowledge center.
| 0non-cybersec
|
Reddit
|
Destiny 2 will have competitive and casual playlists. Competitive gamemodes include countdown and an unannounced mode.. [Link to tweet from crucible radio confirming competitive and casual playlists](https://twitter.com/CrucibleRadio/status/874099876874915850)
News comes from the latest [game informer](http://www.gameinformer.com/p/godigital.aspx]) release that goes in depth into destiny 2 specifics. It includes details on the new hunter arc subclass as well as the following information on competitive destiny 2. You can sign up above to read the full article and get the whole scoop. Specifically, Luke smith is quoted with saying
"Quickplay is the place where you're going to find more party games - Control, Clash, Supremacy"
and
"Competitive play has two modes - one we're not talking about right now, and the other is Countdown. These are objective modes...".
Exciting news!
| 0non-cybersec
|
Reddit
|
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application.
I need to scale my app adding some spot instances that EB do not support.</p>
<p>So I create a second autoscaling from a launch configuration with spot instances.
The autoscaling use the same load balancer created by beanstalk.</p>
<p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p>
<p>This work fine, but:</p>
<ol>
<li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p>
</li>
<li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p>
</li>
</ol>
<p><strong>UPDATE</strong></p>
<p>Elastic Beanstalk add support to spot instance since 2019... see:
<a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
| 0non-cybersec
|
Stackexchange
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.