text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
Chameleon. Digital. Drawn by me..
0non-cybersec
Reddit
Climbed up in the dark, this was my view when the sun came up. Loughrigg, Lake District, UK. [OC] [1701x2126].
0non-cybersec
Reddit
I think I just found a portal to the 90s..
0non-cybersec
Reddit
Old friend on Facebook doesn't realize it's the laughing emoji..
0non-cybersec
Reddit
Documents on MicroSD. <p>Is there a way to view documents which are stored on my MicroSD in <a href="https://uappexplorer.com/app/com.ubuntu.docviewer" rel="nofollow">Document Viewer</a> (Ubuntu Core App Developers)? In <a href="https://uappexplorer.com/app/com.ubuntu.filemanager" rel="nofollow">File Manager</a> I've to enter the password before I could see the files. Creating symlinks seems one possible way but it might be that I've overseen one little thing.</p> <p>Music, Videos... which are also stored on my MicroSD can be used by other applications. All folders have equal rights...</p> <p>Thanks.</p>
0non-cybersec
Stackexchange
MRW the Chipotle worker gives me a HUGE scoop of chicken.
0non-cybersec
Reddit
definition of rational powers of real numbers. <p>Suppose that $b\gt1$ and x is a real number. Rudin defines $B(x)$ to be the set of all numbers $b^{t}$, where $t$ is a rational number and $t\le x$. I want to prove that if $r$ is a rational number then $b^{r} = \sup B(r)$ by showing that $b^{r_1}\lt b^{r_2}$ whenever $r_1\lt r_2$ and $r_1$,$r_2$ are rational. What is the idea behind proving it?</p>
0non-cybersec
Stackexchange
Multivariate Hermite Polynomials. <p>Let $h_0, h_1, \dots$ be the classical univariate Hermite polynomials, renormalized to have constant norm. Is $$x\mapsto\prod_{j=1}^n h_{l_j}(x_j), \quad l_j\in \mathbb N$$ a complete orthogonal system for $L^2(\mathbb R^n)$, as in the univariate case? The orthogonality is simple, but I still have some doubts on the completeness.</p>
0non-cybersec
Stackexchange
Many of the people who gathered are successfully tested positive for Convid 19..
0non-cybersec
Reddit
Install Ubuntu on late 2006 Macbook Without CD. <p>I have been trying for 14+ hours to install Ubuntu linux on my late 2006 Macbook. </p> <p>My Macbook has functional USB drives, but the optical drive is bad. </p> <p>I have tried all kinds of "how-to" guides online that include <code>sudo dd</code>, partitioning drives, EFI, etc. But when I try to boot with EFI (refind) with the USB, or on the new drive I partitioned and <code>sudo dd</code>'d, it fails. </p> <p>The screen comes up at boot with the penguin and Mac symbols, and other EFI things. But when I click on the penguin to run Ubuntu it states this:</p> <pre><code>Starting Legacy Loader USB load options 'USB' Error: Not Found returned from legacy loader Error: Not Found from LocateDevicePath Error: Load Error while (re)opening our installation volume. The firmware refused to boot from the selected volume. Note that external hard drives are not well-supported by Apple's firmware for legacy OS booting. Hit any key to continue </code></pre> <p>And then I have to shutdown and restart with the start button because the keyboard refuses to work.</p> <p>I am kinda at my wit's end with this. I really want Ubuntu. </p> <p>Is there any possible way to install Ubuntu on my Macbook without buying an external optical drive?</p> <p>I have seen the "networking" and "bittorrent" installation guides on the Ubuntu website, but I have no idea where to even start there. I don't really have any concept of what either of those are.</p>
0non-cybersec
Stackexchange
Scientists demonstrated a causal link between the gut microbiome and the immune system's ability to fight cancer. Together, the researchers identified a cocktail of 11 bacterial strains that activated the immune system and slowed the growth of melanoma in mice.
0non-cybersec
Reddit
apt-get broken after banana pro power off. <p>My banana pro (similar to raspberry pi) got shutdown during installation owncloud server via apt-get because of the power loss in the building. When I rebooted it says, that<br> <code>E: dpkg was interrupted, you must manually run 'dpkg --configure -a' to correct the problem.</code><br> I tried running this command, but the error is:<br> <code>dpkg: error: failed to open package info file '/var/lib/dpkg/updates/0007' for reading: Input/output error</code><br> The os it is running is bananian, based on debian 8. Is there any way to fix this error, without reinstalling the whole os?</p>
0non-cybersec
Stackexchange
Bitcoin and Litecoin wallets with push notification API?. <p>I am working on a project which includes btc and ltc transactions. I need Bitcoin and Litecoin wallets with APIs that could create Push notification on newly received transactions. With API I mean any kind of communication (Interface, REST API etc.). Can anybody show me the way or name the wallets? Wallet needs to be local not remote website with service.</p>
0non-cybersec
Stackexchange
NASA ISS Hoax Exposed as Fraud.
0non-cybersec
Reddit
What does this error message in XCode mean? Working with beginners C language, the code compiles and runs properly but xcode shows this yellow msg.. "Implicitly declaring library function 'abs' with type 'int(int)'" The code can be found at https://ideone.com/zBAm4q The error is in line #24 Thanks!
0non-cybersec
Reddit
PsBattle: Dude doing a cannon ball into the ocean..
0non-cybersec
Reddit
July 2012: Top of WAYWT. A couple folks have posted "Best of WAYWT" compilations over the past few months ([here](http://www.reddit.com/r/malefashionadvice/comments/vt27k/best_of_waywt_june_2012/) and [here](http://www.reddit.com/r/malefashionadvice/comments/nv9dh/what_mfa_wore_in_december_compilation_album/), for example), and while I'm slightly hesitant [for the same reasons that ehsu outlines in the previous thread](http://www.reddit.com/r/malefashionadvice/comments/vt27k/best_of_waywt_june_2012/c57dxls), I think it should be an official thing if we're going to keep doing it. Here's how I put the album together - * Any post that received 40+ upvotes (regardless of downvotes) was included. * If a post contained more than one photo, I used my judgment to pick the one that either showed the outfit the best or that garnered the most comments. * If a user had posts that met the 40+ in *multiple* WAYWT threads, I included a photo from each (so you'll see some guys more than once) It's worth noting that I'm not calling this a *WAYWT Hall of Fame* or *Best of WAYWT* - the aim is to be more objective than that. That said, if there was a WAYWT post that you felt was fantastic and underappreciated, put it in the comments. ____ [**The Album**](http://imgur.com/a/MlPWD#0) ____ What do you think? Should I keep posting an official version of this on the first of every month? Is it a way to showcase a diversity of well-done outfits, or does it just cement WAYWT as an upvote contest? Is that a bad thing?
0non-cybersec
Reddit
Satellite image of the fires down under.
0non-cybersec
Reddit
Some people I know are trying to stop cops from crashing their party..
0non-cybersec
Reddit
Why IDaaS & CASB are needed together to nullify cyber threats?.
1cybersec
Reddit
1440P Ultrawide Mini-ITX Xeon Workstation + Gaming.
0non-cybersec
Reddit
Help deciphering binary that creates 3 passwords. <p>I found a binary on a device I've been working on, it's called <code>genrandpass</code> and the only user input is a public key (which is a .bin file) that's stored locally on the device. It also gathers some other information, possibly from the environment to produce three passwords (there is a reference to the Box ID using <code>strings</code>). Looking thru the shell scripts pertaining to <code>genrandpass</code>, it takes the three generated passwords and:</p> <ul> <li>uses the first password as the root password</li> <li>uses the second password is called <code>$epass</code> and the third is called <code>$spass</code> (I only note the names in case it means anything to someone smarter than I.)</li> <li>it then copies <code>$epass</code> and <code>$spass</code> to the dropbear banner file and these are displayed whenever someone connects to dropbear (prior to even logging in).</li> </ul> <p>This makes me think that the developer had intended on being able to use the <code>$epass</code> and <code>$spass</code> variables to generate the actual root password. There are a few certificates and one Private key (decryption.pem) on the box itself. Not sure if it's the right key to decipher the code but I'd like to try because I have a few other models of these boxes that I haven't been able to break into yet. I'm just not sure what the correct commands are to try. Any ideas?</p> <p>genrandpass file at <a href="https://dl.dropboxusercontent.com/u/23091/genrandpass" rel="nofollow noreferrer">https://dl.dropboxusercontent.com/u/23091/genrandpass</a></p> <p>examples of the last 2 passwords generated:</p> <blockquote> <p><strong>$epass</strong>: SxTV2Z7TFvU0XKP/lYYTDlKAhlRR2jwkDGbWPF68go/oOx6x4Pr5DeyNRlx9oQGF05sHld/vyXXchmxlbzsVzPIwocWIq3OIr3J+ZFJrJYPss9VE7YWrwpyRlGwTVHDvZGIzCKXcaipJd85ldLiWUrNxMl4g+5kzwVA2a3I8LuiuixRFVmc8ji/W2W5ZeU5FTcbaiNjlpoRHjPFUkvHKJ4nHSfXpZuLDRS53hxcSnb8ZmvTmFP4ITAdyj9Yw+C2pvD+gSEWRB/H+1cFPQOTi7wr/FY8266QEWqGZw30ZEsMCUNCC0DgiIX+H68QKcU8QFYUJC5+vui3BtcOfFXKHZl==</p> <p><strong>$spass</strong>: RtcTy7fJ11XAQi1P2HiZM4MAxMZMA2NlD6wZL8jNYdrSL5i8qtkGztKDccmGqRWgjiVKI7TcVNcX3PhUSB3UfQCAF6KpBvH7NNezkExdwdM3W2mSnXJvyRLpDSJEgALs0wurUrqIYClZOjTc+xiJzOIUP0Gxb4d2ADOaKXHQ6n6H2Ss/1smITjrbXJ1K8RentZu26sAy3DW+zRIxtxnktSAGUscdG1oytlOL15aAROSL27NUcPSoA3+4o76zggq5TspIBTSmidVRUccEdXPyAzZggR0yqGNrm99uJXHlhw4zCW+GzKJFsJSTwDHZvCoeLERCLuyXFVrgmIISKf6E2V==</p> </blockquote>
0non-cybersec
Stackexchange
When it comes to defending my friends I don’t hold back.
0non-cybersec
Reddit
Add computers to HP CM1312 NFI MFP Scanner. <p>Does anyone happen to know how to add computers to the "Select Computer" menu of HP CM1312 NFI MFP Scanner? </p> <p>I remember that there was a check box somewhere in the application but it didn't work reliably on all computers.</p> <p>Isn't it possible to save scans on a network share or send them by e-mail?</p>
0non-cybersec
Stackexchange
Dog jumps over a river.
0non-cybersec
Reddit
2 sisters get lung transplants from same donor.
0non-cybersec
Reddit
Can an euler circuit contain euler path?. <p>I am just confused but I believe that by definition you a graph cant be both Euler circuit and Euler path. Euler circuit: a graph with all vertices having even degrees. Euler path: a graph with vertices of two odd degrees</p>
0non-cybersec
Stackexchange
Why does nesting quotes in backticks work in bash?. <p>More precisely, why does</p> <pre><code>"`command "$variable"`" </code></pre> <p>treat the outer quotes as enclosing the inner quotes, instead of expanding the variable outside any quotes?</p> <p>The exact command I used to test this is similar to an example brought up in another stackoverflow question about the correct method of quoting when using command substitution:</p> <pre><code>fileName="some path with/spaces" echo "`dirname "$fileName"`" </code></pre> <p>which correctly echoes "some path with", instead of complaining because of an invalid number of arguments.</p> <p>I read Bash's man page, where it states in chapter "EXPANSION", section "Commmand Substitution" that the new-style $() substitution preserves the meaning of any character between the parentheses, however, regarding backquotes, it only mentions that backslashes work in a limited way:</p> <blockquote> <p>When the old-style backquote form of substitution is used, backslash retains its literal meaning except when followed by <code>$</code>, <code>`</code>, or <code>\</code>. The first backquote not preceded by a backslash terminates the command substitution.</p> </blockquote> <p>My first thought was that backticks do the same, aside from the mentioned exception, thus "quoting" the inner double quotes, however, I got told that is not the case. The second observation that pointed me to this direction was that</p> <pre><code>a=\$b b=hello echo `echo $a` </code></pre> <p>prints "$b". Had the backticks let the dollar sign get interpreted, the first variable substitution should have occurred before the subshell was invoked, with the subshell expanding the string "$b", resulting in "hello." According to the above excerpt from the man page, I can even make sure the dollar sign is actually quoted, by using</p> <pre><code>echo `echo \$a` </code></pre> <p>and the results would still be the same.</p> <p><s>A third observation gives me some doubts though:</p> <pre><code>echo `echo \\a` </code></pre> <p>Result: "\a"</p> <pre><code>echo \a </code></pre> <p>Result: a</p> <p>Here it seems like both backslashes were retained until the subshell came into play, even though</s> the man page states that backslashes within backquotes do not have their literal meaning when followed by another backslash. EDIT: ^ Everything works as expected in this regard, I must have used the wrong shell (tcsh in my other terminal, and with a different character from "a").</p> <p>Although I have not been able to find out what actually happens, while I was searching for the answer, I came across some people mentioning the term "quoting context" with regards to command substitution, but without any explanation as to what it means or where it is described. I have not found any real reference to "quoting contexts" in either Bash references (gnu.org, tldp, man bash) or via DuckDuckGo.</p> <p>Additionally to knowing what is going on, I'd preferably like to have some reference or guidance as to how this behavior can be discerned from it, because I think I might have failed to put some pieces together from which this naturally comes. Otherwise I'll just forget the answer.</p> <p>To those recommending people to use the new-style dollar sign and parentheses substitution: on ca. 50 years old Unix machines with tens or hundreds of different proprietary environments (can't throw out a shell for a newer one), when one has to write scripts compatible between most shells that anyone might be using, it is not an option.</p> <p>Thanks to anyone who can help me.</p>
0non-cybersec
Stackexchange
Prove an estimation to approximate the $k$rd decimal place by Newton&#39;s method. <p>When I use Bisection method to find a solution $r$ of equation $f \in C^2[a,b]$, within tolerance $10^{-k}$ and approximate to the $k$rd decimal place.</p> <p>For each step, assume that $x_n=\frac{a_n+b_n}{2} \in \mathbb Q^c$. I want to approximate $x_n$ to the $l-$rd decimal place $\overline{x_n}$ ($l &gt; k$). I know that exit $N \in \mathbb N$ such that $$|\overline{x_n} - r| \leq 10^{-k } \text{ } \forall n \geq N.(1)$$ I tthink it will help calculate easier and guarantee the accuracy of approximation $\overline{x_n}$.</p> <p>Prove (1)</p> <p>Let $d_n=\frac{a_n-b_n}{2}$ $$|\overline{x_n} - r| \leq |\overline{x_n} - x_n | + |x_n -r| \leq \frac{1}{2}10^{-l}+\frac{d_n}{2}$$ clearly, $$d_{n+1} \leq \frac{d_n}{2}+\frac{1}{2}10^{-l}\leq ... \leq \frac{d_1}{2^n}+\frac{1}{2}10^{-l}. (2)$$ So that $$|\overline{x_n}-r|\leq \frac{d_1}{2^n}+10^{-l}$$ When $ n \longrightarrow \infty$ , $\frac{d_1}{2^n} \longrightarrow 0$, as $k &gt;n$ , exit $N$ such that $$|\overline{x_n} - r| \leq 10^{-k } \text{ } \forall n \geq N.$$ When I use Newton's method, I also want to have (1), but it's so hard for me to have the estimation like (2). I just know that $$|x_n -r| \leq \frac{M}{2m}d_n^2$$ $M:=\max_{[a,b]}|f|, m:=\min_{[a,b]}|f'|$. (Assume this method is successful).</p> <p>Help me, thank you so much !</p>
0non-cybersec
Stackexchange
Solve integral (convolution) equation. <p>Given a function: $u(t) = \exp\left( -\frac{At^2}{1+t}\right),$ $A&gt;0, t&gt;0,$</p> <p>and an equation: $\frac{d u(t)}{dt} = \int^{t}_0 \phi(t-\tau) u(\tau) d \tau .$</p> <p>How to find a closed expression for $\phi(t)$?</p>
0non-cybersec
Stackexchange
Remove Turbo Your Pc From Computer (Easy Guide).
1cybersec
Reddit
Crowdfunded Tax Dollars.
0non-cybersec
Reddit
Thanks /r/dogs, you helped me with my dog art!. Hi everyone, I posted here about a month ago with an idea to commission pet portraits with no idea where to start and it is under way, with mild success! Thanks for your support! If you have any suggestions or interest please leave a comment and check out my store! https://www.etsy.com/shop/GregPorterArt
0non-cybersec
Reddit
[Video] 10 years ago I was at the peak of my dancing, but I lost it all in the busyness of life. This year, I attempted to get it all back. Here’s what happened..
0non-cybersec
Reddit
The McLaren Senna Is an Insane $1.5 Million Supercar - Doug DeMuro.
0non-cybersec
Reddit
Parameters of the Mandart inellipse. <p>What are the parameters of the Mandart ellipse in terms of its associated triangle?</p> <p>It looks that information on the Mandart ellipse is less known than its Steiner counterpart. Easily found references <a href="https://en.wikipedia.org/wiki/Mandart_inellipse" rel="nofollow noreferrer">wiki</a>, <a href="https://mathworld.wolfram.com/MandartInellipse.html" rel="nofollow noreferrer">MathWorld</a> look incomplete, so the provided answer collects the missing parts together.</p>
0non-cybersec
Stackexchange
Why does using parentheses with a default constructor result in creation of the variable?. <p>After watching Louis Brandy talk at CppCon 2017 I was shocked to discover that this code actually compiles:</p> <pre><code>#include &lt;string&gt; int main() { std::string(foo); return 0; } </code></pre> <p>And for some reason <code>std::string(foo)</code> it is identical to <code>std::string foo</code> i.e. declaring a variable. I find it absolutely counterintuitive and can't see any reason for C++ to work that way. I would expect this to give an error about undefined identifier <code>foo</code>.</p> <p>It actually makes expressions like <code>token1(token2)</code> have even more possible interpretations than I previously thought.</p> <p>So my question is: what is the reason for this horror? When is this rule actually necessary?</p> <p>P.S. Sorry for the poorly worded title, please, feel free to change it!</p>
0non-cybersec
Stackexchange
How much security should I use for my web application?. <p>My question is, for a "normal" site, what do you think is enough to secure against methods used by "script kiddies"? For example, SQL injection, XSS, and stuff like that. </p> <p>Same question for password hashes. Do you think it is enough to hash with MD5 + random salt, or minimum SHA1 + random salt, or should something even stronger be used? </p> <p>I know that no application is fully secure, but I want to achieve good security without being overly complex.</p>
1cybersec
Stackexchange
Kyoto was the most spiritual place I've been to. More so that The Vatican, Luang Prabang or Varanasi..
0non-cybersec
Reddit
At least their boats are designed well.
0non-cybersec
Reddit
As a Christian turned atheist, this is all I had to say about the Chic-Fil-a appreciation day..
0non-cybersec
Reddit
[Serious] What severely fucked you up and left you traumatized?.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
*sad yee haw*.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Straight line problem : Find the number of points which lies between the figure : $(0,0) , (0,21); (20,0)$. <p><strong>Problem:</strong> </p> <blockquote> <p>Find the number of points which lies inside the triangle : $(0,0) , (0,21); (20,0) $</p> </blockquote> <p>Approach : </p> <p>Let us take point $A = (0,0)$, $B = (0,21)$, and $C = (20,0)$.</p> <p>Since the figure formed by joining these points $ABC$ is a triangle where: </p> <p>Point $A$ lies on origin; $B$ lies on $y$-axis and $C$ lies on $x$-axis. I am unable to find the condition to find the number of points which lies in this triangle. </p> <p>Please help in this context.. thanks...</p>
0non-cybersec
Stackexchange
What advantages would the Twitter streaming API provide?. <p>I'm in the very early stages of writing an application to mine through Twitter data looking for certain types of information. I've been using Twitterizer, which I have found effective in downloading the information (it provides interfaces to the "old" REST based API, and the newer streaming one).</p> <p>This would only be for personal use, so I don't think I would max out the number of API calls per hour on the old API, and it seems as though the streaming API is slightly slower. On the surface, it seems like the REST would suit me better, but I'm wondering if I'm missing any hidden advantages to using the streaming API that could benefit my application.</p>
0non-cybersec
Stackexchange
5s Animation Glitch. I've noticed something I cannot unsee. Any time I double click my home button and then zoom into an app or the home screen, at the very end of the zoom, the animation stops a few pixels away from the edge of the screen for a split second, then snaps the rest of the way out. Checked with a 4 and a 5 and neither of those phones experienced the same glitch. Anybody else see this?
0non-cybersec
Reddit
LPT: When taking something apart, take photos beforehand. Before taking something apart, take photos of the item from all angles, especially smaller parts or sections where there are many parts involved. You will be able to visually understand how your item should look when you put it back together. Also, you are creating an archive of your item (in case there's damage). I took apart my guitar and now I'm wondering if I put it back the right way...
0non-cybersec
Reddit
/usr/include vs /usr/local/include. <p>I just discovered that on my MAC <code>/usr/local/include</code> is a symbolic link to <code>usr/include</code> (since about 9 months), causing problems with homebrew. I wonder whether this link is normal? harmless? Is there a way to disentangle that (make <code>/usr/local/include</code> an independent directory containing those files that belong there (which ones are that?) and keep the rest in <code>/usr/include/</code>)?</p>
0non-cybersec
Stackexchange
Sanitizing Input in ASP.NET MVC Application. <p>I have an MVC app with a Service layer and I'm trying to figure out how to sanitize all inputs without going insane. </p> <p>I have <em>validation</em> under control - field-length, data-types, and other validation is being handled both on client and model (EF5). </p> <p>What I'm now trying to handle is preventing SQL injection and XSS - I was able to break my application by pasting some markup into one of my inputs. </p> <p>For example: </p> <pre><code> &lt;textarea data-bind="value: aboutMe"&gt;@Model.AboutMe &lt;/textarea&gt; </code></pre> <p>If I save some script tag in AboutMe:</p> <pre><code>&lt;script type="text/javascript"&gt;alert("hey")&lt;/script&gt; </code></pre> <p>the page breaks due to illegal characters:</p> <pre><code> Uncaught SyntaxError: Unexpected token ILLEGAL </code></pre> <p>I'm thinking I can just cherry-pick every single input and wrap it in some kind of SanitizeText() function that removes all brackets from anything that's been submitted, but this feel cheap and tedious, and doesn't address SQL injection.</p> <p>What's the proper way to go about this? </p>
0non-cybersec
Stackexchange
8 Questions to Ask Before You Sign a Lease.
0non-cybersec
Reddit
Hey Reddit, I heard you like pictures of cats. Here's a fat one..
0non-cybersec
Reddit
Choice and the Baire property in non-separable complete metric spaces. <p>It's known to be consistent with ZF+DC that every subset of $\mathbb{R}$ has the Baire property (BP). (E.g. Shelah's model). If so, then every subset of every complete separable metric space has the BP.</p> <p>Can we drop the word "separable" here? </p> <blockquote> <p>Is it consistent with ZF+DC that every subset of every complete metric space has the BP?</p> </blockquote> <p>In other words, working in ZF+DC, can we prove there exists a complete (non-separable) metric space $X$ and a subset $E \subset X$ without the BP? </p> <p>I'm not sure which way my intuition goes. On the one hand, non-separable metric spaces are big and maybe they can be weird, even without AC. On the other hand, a counterexample would have the property that the intersection of $E$ with every separable $S \subset X$ would (consistently) have the BP in $S$. That seems unlikely but I don't see how to disprove it.</p> <p>As one possible approach, a nonmeager proper linear subspace of any Banach space $B$ must not have the BP (by the Pettis lemma). Can we create such a beast in ZF+DC, for some non-separable $B$? We can't do it by taking the kernel of a discontinuous linear functional $f$, because it's consistent with ZF+DC that there aren't any (by considering sequences, the restriction of $f$ to some closed separable subspace $S$ would be discontinuous, making its kernel nonmeager in $S$).</p>
0non-cybersec
Stackexchange
What is this mono process running at startup?. <p>I'm running Lubuntu 14.04. I'm a little concerned about the following Mono process that runs at startup, though it seems to be inactive. The command used to start this process was :</p> <pre><code>/usr/bin/mono /usr/lib/mono/4.5/xsp4.exe --port 8084 --address 0.0.0.0 --appconfigdir /etc/xsp4 --nonstop </code></pre> <p>and started by <code>www-data</code>.</p> <p>I have never seen a Mono process run at startup before, and I can't think of a reason for it to be running. There also seems to be nothing in my startup services. Here is the output of <code>initctl list</code> :</p> <p><a href="http://pastebin.com/ttqKGPUH" rel="noreferrer">http://pastebin.com/ttqKGPUH</a></p> <p>What could this process be, and is it something to worry about ?</p>
0non-cybersec
Stackexchange
Shorter encoding than Base64. <p>I have this String that is encoded into Base64 String:</p> <pre><code>{ "appId": "70cce8adb93c4c968a7b1483f2edf5c1", "apiKey": "a65d8f147fa741b0a6d7fc43e18363c9", "entityType": "Todo", "entityId": "2-0", "blobName": "picture" } </code></pre> <p>The output is:</p> <pre><code>ewogICJhcHBJZCI6ICI3MGNjZThhZGI5M2M0Yzk2OGE3YjE0ODNmMmVkZjVjMSIsCiAgImFwaUtleSI6ICJhNjVkOGYxNDdmYTc0MWIwYTZkN2ZjNDNlMTgzNjNjOSIsCiAgImVudGl0eVR5cGUiOiAiVG9kbyIsCiAgImVudGl0eUlkIjogIjItMCIsCiAgImJsb2JOYW1lIjogInBpY3R1cmUiCn0= </code></pre> <p>In my case this is quite long. I can't use one way hashing in my case because it needs to be decoded on the other end. </p> <p>Is there an encoding that is at least just <em>~1/4</em> the size compared to Base64 encoding? </p>
0non-cybersec
Stackexchange
Enabling VT-x on Intel Core i5 3450 with MSI B75A-G41 mainboard. <p>I'm willing to enable the VT-X virtualization technology on my Intel Core i5 3450 CPU, however in the BIOS menu (I've the latest version: 17.8) of my MSI B75A-G41 mainboard, this option is greyed out even though it should be supported by my CPU.</p> <p><img src="https://i.stack.imgur.com/nhvUL.png" alt="Image of the BIOS Menu"> "Bios menu with the VT-D option greyed out"</p> <p>CPU-Z Report stating that my CPU does support VT-X: <img src="https://i.stack.imgur.com/vq19h.png" alt="i.stack.imgur.com/vq19h.png"></p> <p>Does someone know why the option is greyed out even if the "Intel Virtualization Tech" option is enabled and works fine?</p> <p>Maybe do I need to install some Intel software that will activate the option on my CPU? Here are the different available utilities for my mainboard: <a href="http://www.msi.com/product/mb/B75A-G41.html#/?div=Driver" rel="nofollow noreferrer">http://www.msi.com/product/mb/B75A-G41.html#/?div=Driver</a> I could install all of them but I don't want to because it would slow down my computer for nothing.</p>
0non-cybersec
Stackexchange
Fiber bundle and local trivial fibration. <p>If we have a fiber bundle <span class="math-container">$\pi:M\longrightarrow N$</span> which M and N be two compact smooth manifolds,is there a fibration on <span class="math-container">$M$</span>?</p> <p>If we have a surjective submersion <span class="math-container">$\pi:M\longrightarrow N$</span> such that for every <span class="math-container">$y\in N$</span> the fibers <span class="math-container">$\pi^{-1}(y)\subset M$</span> diffeomorphic on neighborhood of <span class="math-container">$M$</span>, is there a fibration on <span class="math-container">$M$</span>?</p>
0non-cybersec
Stackexchange
The way he take up two parking spots.
0non-cybersec
Reddit
My baby girl, the kindest of pups.
0non-cybersec
Reddit
Forcing SSH login on Ubuntu 14.04 server not working. <p>I've tried enabling SSH logins in my linux server. It can establish connection just fine trough my private key. I also went to <code>/etc/ssh/ssh_config</code> and edited the following field like this:</p> <pre><code>PasswordAuthentication no </code></pre> <p>But it still lets me login trough a username/password when I use putty or winSCP. Right now I can login both from user/password and SSH keys, which is rather pointless as far as security goes. What else do I need to do to ONLY allow SSH logins?</p>
0non-cybersec
Stackexchange
Study the convergence of the sequence of functions $f_n(x)= \frac{f(x)}{1+\frac{|f(x)|}{n}}$ (convergence in measure, pointwise and in $ L^2(R ^d)$. <p>Study the convergence of the sequence of functions $$f_n(x)= \frac{f(x)}{1+\frac{|f(x)|}{n}}$$ (convergence in measure, pointwise and in $ L^2(\mathbb{R} ^d)$).</p> <p>Let f be a measurable function such that $f \in L^2(\mathbb{R} ^d)$</p> <p>$$f_n(x)= \frac{f(x)}{1+\frac{|f(x)|}{n}}$$</p> <p>My attempt:</p> <p>1) $\{f_n\} \to f(x)$ pointwise on $\mathbb{R}^d$</p> <p>2)Convergence in measure:</p> <p>for all $\lambda&gt;0$, by the Chebyshev's inequality:</p> <p>$$\lim_{n \to +\infty} m \left( \left\{ x \in \mathbb{R}^d : |f_n-f|=\left|\frac{f(x)^2}{n+|f(x)|}\right|&gt; \lambda \right\} \right)&lt;\lim_{n\to +\infty} \int_{\mathbb{R}^d}\frac{f(x)^2}{n+|f(x)|} $$</p> <p>Now:</p> <p>$$g_n(x)= \frac{f(x)^2}{n+|f(x)|} \to g(x)=0$$ pointwise on $\mathbb{R}^d$ and $f(x)^2$ dominates $g_n$ on $E$ in the sense that $|g_n|&lt;f^2$ on $\mathbb{R}^d$ for all $n$.</p> <p>Therefore, by the lebesgue dominated convergence theorem:</p> <p>$$\lim_{n\to +\infty} \int_{\mathbb{R}^d}\frac{f(x)^2}{n+|f(x)|} = \int_{\mathbb{R}^d} \lim_{n\to +\infty}\frac{f(x)^2}{n+|f(x)|}=0 \\ \implies \lim_{n \to +\infty} m(\{x \in \mathbb{R}^d : |f_n-f|&gt; \lambda\})=0$$</p> <p>I would be thankful if somebody tell me whether my attempt is correct or not :) </p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
ELI5: How does a deep sea oil rig work?. How do they find the oil? How do they choose the exact spot to drill? How do they drill with 10,000 feet of water? When they drill down into the spot where all the oil is, how do they make the oil go up the pipe to the rig and not spill out all over the ocean? The rig itself is just a small platform, so where is all the oil that it is getting actually stored? How often do ships need to come pick the oil up?
0non-cybersec
Reddit
Real solutions of $x^5+ax^4+bx^3+cx^2+dx+e=0$. <p>If $2a^2<5b$,prove that the equation $x^5+ax^4+bx^3+cx^2+dx+e = 0$ has at least one complex root。Thanks.</p>
0non-cybersec
Stackexchange
Short but great documentary on the craziness and danger that was Action Park..
0non-cybersec
Reddit
Baby Moose Loses Her Mom, So Officials Blow Her Up.
0non-cybersec
Reddit
Remove, not hide, system tray icon of running apps. <p>I'm not looking to "hide" the icons using the Window setting, which shows an ugly arrow, I want to completely remove these icons.</p> <p>The Nvidia control panel has an in-built toggle that allows users to hide the icon while others offer no way to do that. </p> <p>I have found a few answers to the issue but they're all at least 5 years old and they recommend software that does not seem to work very well in Windows 10.</p>
0non-cybersec
Stackexchange
Primitives that share \chardef&#39;s peculiar behavior. <p>The <code>\chardef</code> primitive exhibits a peculiar behavior: the command</p> <pre><code>\chardef\controlSequence=&lt;number&gt; </code></pre> <p>behaves as though it were preceded by</p> <pre><code>\let\controlSequence=\relax </code></pre> <p>(see the answers to <a href="https://tex.stackexchange.com/q/376429/21685">this question</a>).</p> <p>Is there any other similar TeX primitive, <code>\p</code>, that behaves as though some tokens have been (re)defined just before <code>\p</code> is expanded/executed?</p> <p>* I'm looking for an exhaustive list, but a partial list is also welcome.</p>
0non-cybersec
Stackexchange
Pentesting for n00bs: Episode 9 - Grandpa.
1cybersec
Reddit
How do I display an html file on a web browser in Ubuntu?. <p>I am tasked with displaying a program on a web browser for my final project. The browser would be run from a cloud instance, and I have chosen to show an java applet that I have made. I have already install apache2, mysql, and php on the instance. How do I actually make the html file work on the instance, so that a user can go to the url and see the java applet?</p> <p>I am very new to ubuntu and linux in general, so a simple explanation would be preferred.</p>
0non-cybersec
Stackexchange
How to execute mvn command using IntelliJ IDEA?. <p>I am trying to add Oracle JDBC driver in my local Maven repo. I have found <a href="http://www.mkyong.com/maven/how-to-add-oracle-jdbc-driver-in-your-maven-local-repository/" rel="noreferrer">this</a> link to do so.</p> <p>I want to do the same from Inside IntelliJ IDEA. Is there any way to execute mvn commands from IntelliJ IDEA? </p>
0non-cybersec
Stackexchange
Auntie Jo is funny!.
0non-cybersec
Reddit
Cant find path to registry directory for sam password reset. <p>I am trying to reset the password on an old computer (a dell laptop) running windows 7 using an password reset disk</p> <p>However I cannot find the path to the registry.</p> <p>Directory <code>windows/system32/config</code> is the default and it doesn't work.</p> <p>How can I resolve this?as i cnt get to it through the administrative account</p>
0non-cybersec
Stackexchange
Inconsisent gap between number and text. <p>I got strange spacing issues. There is number and each text parallel. And there is different spacing between 1, 4, 7 and 'each' text. How can we fix this issue or it can't be fixed. I have not used any spacing and extra css properties.</p> <p><div class="snippet" data-lang="js" data-hide="false" data-console="true" data-babel="false"> <div class="snippet-code"> <pre class="snippet-code-css lang-css prettyprint-override"><code>@import url('https://fonts.googleapis.com/css?family=Spectral'); @import url('https://fonts.googleapis.com/css?family=Open+Sans|Spectral'); .bigger { font-size: 40px; } p { font-family: 'Open Sans', sans-serif; }</code></pre> <pre class="snippet-code-html lang-html prettyprint-override"><code>&lt;p&gt; &lt;span class="bigger"&gt;81&lt;/span&gt; &lt;small&gt;each&lt;/small&gt; &lt;/p&gt; &lt;br&gt; &lt;p&gt; &lt;span class="bigger"&gt;84&lt;/span&gt; &lt;small&gt;each&lt;/small&gt; &lt;/p&gt; &lt;br&gt; &lt;p&gt; &lt;span class="bigger"&gt;87&lt;/span&gt; &lt;small&gt;each&lt;/small&gt; &lt;/p&gt; &lt;br&gt;</code></pre> </div> </div> </p>
0non-cybersec
Stackexchange
put links without file extension (.php). <p>Is it possible to configure Apache in order not to show a file extension?</p> <p>For example: Say I have <code>domain.com/page.php</code> but want to have <code>domain.com/page</code> as the url.</p> <p>Any Ideas?</p>
0non-cybersec
Stackexchange
DNS configured in network manager but not working. <p>I have 2 DNS configured in network manager for my connection (Selected DHCP Addresses only).</p> <p>The DNS are working good if used with nslookup.</p> <p>/run/resolvconf/resolv.conf</p> <pre><code># Dynamic resolv.conf(5) file for glibc resolver(3) generated by resolvconf(8) # DO NOT EDIT THIS FILE BY HAND -- YOUR CHANGES WILL BE OVERWRITTEN nameserver 127.0.1.1 search domain.tld #edited </code></pre> <p>What dns is running on 127.0.1.1?</p> <p>If I run <code>nslookup thehost</code> it won't work. But if I run <code>nslookup thehost 192.168.1.4</code> (the dns configured in network manager) it works.</p> <p>So I would like to know which DNS is nslookup going through and what is happening after it. I suppose it is going to 127.0.1.1 but then I don't know which is this one (dnsmasq doesn't seem to be installed) and what it is doing.</p>
0non-cybersec
Stackexchange
Adobe Failed to Safeguard Privacy of 38 Million Customers.
1cybersec
Reddit
What is Group Policy and how does it work?. <blockquote> <p>This is a <a href="http://meta.serverfault.com/questions/1986">Canonical Question</a> about Active Directory Group Policy Basics</p> </blockquote> <p>What is Group Policy? How does it work and why should I use it?</p> <p><sub>Note: This is a Question &amp; Answer to new administrator that might not be familiar with how it functions and how powerful it is.</sub></p>
0non-cybersec
Stackexchange
I would appreciate it if you guys could check my video 😊.
0non-cybersec
Reddit
How do we know what dinosaurs look like?. Furthermore, how can scientist tell anything about the dinosaurs beyond the bones? Like skin texture and sounds.
0non-cybersec
Reddit
TIL that after George H.W. Bush, a Naval Aviator, was shot down and rescued by a submarine in WWII, he lived aboard that submarine for a month, assisting in the rescue of other aviators..
0non-cybersec
Reddit
Why do Chromium and Chrome delete all cookies after closing the browser?. <p>I am unable to stay signed in on Chromium and Google Chrome. I sign in to website A, close all tabs, open website A again, and am still signed in. I quit Chromium or Google Chrome, open website A, and have to sign in again.</p> <p>I believe the problem is from Chromium because I can stay signed in on website A on other browsers. I checked <a href="https://support.google.com/chrome/thread/2211795?hl=en" rel="nofollow noreferrer">this thread</a> and confirm that at <code>chrome://settings/content/cookies</code>, I have disabled <code>Clear cookies and site data when you quit Chrome</code>. That issue seems to continue unsolved.</p> <p>I am using Chrome <code>81.0.4044.138</code> and Chromium <code>766739</code>.</p> <p>How can I stay signed in on a website with Chromium or Chrome?</p> <p><strong>Update</strong>: I reinstalled Chromium and Google Chrome and have the same problem. I have since learned how to <a href="https://stackoverflow.com/questions/3274875/how-to-get-cookie-expiration-date-creation-date-from-javascript">inspect cookies</a>. On Facebook, for example, I have cookies that expire in 3 months:</p> <p><a href="https://i.stack.imgur.com/aHiuG.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/aHiuG.png" alt="cookies before quitting browser" /></a></p> <p>After I quit and restart Chromium, all cookies from facebook are gone:</p> <p><a href="https://i.stack.imgur.com/4ThMC.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/4ThMC.png" alt="no cookies after quitting browser" /></a></p> <p>Another problem that could be related is that each time I launch Chromium or Chrome, I get these two alerts, as if I were launching it for the first time:</p> <p><a href="https://i.stack.imgur.com/BSOEj.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/BSOEj.png" alt="alert about incoming network connections" /></a></p> <p><a href="https://i.stack.imgur.com/Pi0xK.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/Pi0xK.png" alt="alert about keychain access" /></a></p> <p>I believe this is a problem with the browser on this operating system because of these two alerts, and because Brave which is also based on Chromium does not give these problems.</p> <p>And for reference, my settings do not ask to clear cookies after restarting:</p> <p><a href="https://i.stack.imgur.com/xuxai.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/xuxai.png" alt="cookie settings" /></a></p> <p><strong>Second update</strong>: I updated Chromium (Version 86.0.4207.0 (Developer Build) (64-bit), 18 July 2020) and Google Chrome (Version 84.0.4147.105 (Official Build) (64-bit), 18 July 2020) and they both have the same problem. I verify that cookies are enabled, sign in to a website, quit the browser, go to the same website, and I am signed out, even though the website has cookies stored. Here is an example of cookies from StackOverflow saved on the browser, which looks the same for Chromium and Chrome:</p> <p><a href="https://i.stack.imgur.com/3OAAl.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/3OAAl.png" alt="saved cookies" /></a></p> <p><strong>Note</strong>: Moved to <a href="https://superuser.com/questions/1575143/why-do-chromium-and-chrome-delete-sign-in-cookies-after-closing-the-browser">SuperUser</a>.</p>
0non-cybersec
Stackexchange
Is anyone else *a little* concerned about the direction of the NFL's rules?. ###**NOTE: I probably titled this incorrectly. Please don't think of it as some "all is lost!" kind of thread. I was hoping it'd spark a little discussion about the history of rules changes, not just bellyache about how "all is lost in the NFL" and how one preseason game is an example of an issue. That's definitely not the case.** I've been thinking about the NFL's direction lately and how it changes thanks to the competition committee, as well as the history of the league. Then I saw the graphic for [illegal contact penalties from yesterday](http://i.imgur.com/ptNnMrg.png). As /u/ciscocertified pointed out about the Seahawks: "It is fun football to watch as well." Here's what really sucks, though: The NFL historically thinks otherwise. They make big money on the borderline casual/devoted fans that don't know a ton about football but do know that they love big touchdowns. QBs and passing sell to a huge chunk of their audience, and the rules are again being tweaked in favor of offense. In a way, it's becoming more like the CFL; [cue Doug Flutie](http://mmqb.si.com/2014/06/24/cfl-doug-flutie-grey-cup-canadian-football-league/): "The game in Canada was more exciting, more explosive, more wide open. It was what the NFL is now becoming." Personally, I love the sound of pads crunching, the confrontation of two athletes and most of all, interceptions. **I'm not a gloom-and-doomer, but I do think 2014 will mark another not-insignificant change in the new NFL similar to that of 1978 and 2004 (though likely not on those levels).** Let's look back for a moment: ##The Rules Changes of 1978 > "[The rules changes] accomplished what we wanted to accomplish: More big plays, more scoring, more excitement in the game." - Don Shula In 1978, the NFL and competition committee wanted to make the game more exciting and end the "Dead Ball Era." [Turn to Wikipedia for the list of changes](http://en.wikipedia.org/wiki/1978_NFL_season#Major_rule_changes), but take note of this one in particular: > "To open up the passing game, defenders are permitted to make contact with receivers only to a point of five yards beyond the line of scrimmage." Also known as the "Mel Blount rule." That, in addition to the changes to legal vs. illegal contact by offensive linemen heavily swayed the landscape of the NFL going forward. [Let this NFL.com video do a bulk of the explaining, it's pretty solid](http://www.nfl.com/videos/nfl-network-top-ten/09000d5d8111333a/Top-Ten-Things-that-Changed-the-Game-1978-rule-changes) (and where the Shula quote comes from). ##The Rule Change of 2004 Following the 2003 AFC Championship game, the league decided to address illegal contact penalties. [ESPN's Len Pasquarelli wrote at the time](http://sports.espn.go.com/nfl/columns/story?id=1771047): > "Look for a lot more five-yard penalties in the secondary, and longer games, early in the campaign as officials keep defensive backs from mauling receivers." Packers.com writer Vic Ketchman (whose mailbag column I would strongly advise any fan to read) [explains how it compares to today pretty well](http://www.packers.com/news-and-events/article-ask-vic/article-1/Packers-should-prosper-from-new-major-point-of-emphasis/a7a433c7-13f0-4f8c-aad5-abf5b0b7b984): > *"With the new emphasis on pass coverages and expected pass interference calls this season, do you think this will affect the game as it did in 1978? Call this change the Richard Sherman rule vs. the Mel Blount rule?"* > "You don’t have to go back that far. Go back to 2004; that’s the year of the last major emphasis. The Colts receivers got roughed up by the Patriots in the 2003 AFC title game, so the league mandated a major point of emphasis on enforcement of the five-yard chuck rule in 2004, which produced a record-setting season for Peyton Manning. Now, after the Seahawks roughed up Manning’s receivers in the Super Bowl, the league has decided it’s time for another major point of emphasis. Call it the Peyton Manning rule, I and II." ##Hope remains Ketchman has talked a lot lately about what he thinks is an imaginary "line in the sand" that the league will eventually cross, where its offensive-favored changes will inevitably reach a point of ridiculousness. When that happens, it will dial the rules back in favor of defense in order to not, y'know, hemorrhage money. From the same column as the answer above: > "That’s the ultimate line in the sand and the league must identify it and go no farther. The charm of football always has been and always will be the game’s inherent physical danger. Without physical danger, there is no fear. Without fear, there is no excitement." As with everything related to a multi-million or multi-billion dollar industry, you always need to follow the money trail. I'm sure many feel that way in regards to the NFL's safety initiatives or the sudden spectacle that is the NFL Draft. But when it comes to redefining the game itself, the scope and scheme of entire teams can be impacted (personally, this is the biggest reason why I like Packers GM Ted Thompson. His crew has been building the team based on how the league operates). Still, I miss the days where I'd pop in the "Hit After Hit" VHS tape and watch highlight reels of players laying the wood on one another, getting back up and getting after it on the next play. The league wouldn't even think of glamorizing that style of play anymore. And while I care about the well-being of players, I do wonder if they miss that kind of pounding action, too. So, is this 'much ado about nothing?' Will defensive-minded teams like the Seahawks be at a disadvantage this coming year? Are you a "traditional," defense-wins-championships sort of fan, or do you enjoy the modern NFL?
0non-cybersec
Reddit
shet.
0non-cybersec
Reddit
How open is Java now? Google being sued by Oracle for building Android with Java.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Fortigate 50B can&#39;t access settings. <p>I'm using an Fortgate 50b router, but without knowing why, I lost the configuration of the gatway.</p> <p>How do I reset to the initial configuration? </p> <p>I can't access the web-config on <a href="https://192.168.1.99" rel="nofollow noreferrer">https://192.168.1.99</a>.</p>
0non-cybersec
Stackexchange
What are SQL Execution Plans and how can they help me?. <p>I've been hearing a lot lately that I ought to take a look at the execution plan of my SQL to make a judgment on how well it will perform. However, I'm not really sure where to begin with this feature or what exactly it means.</p> <p>I'm looking for either a good explanation of what the execution plan does, what its limitations are, and how I can utilize it or direction to a resource that does.</p>
0non-cybersec
Stackexchange
How can I tell what software and updates must be checked or unchecked?. <p>Is there a comprehensive list detailing the software and updates somewhere? I obviously want my pc as secure as possible but also want everything running smoothly.</p> <p>In Ubuntu software - everything being checked seems ok? Is that right?</p> <p>In other software there are 2 unchecked boxes for canonical partners, should they be checked?</p> <p>In updates everything is checked, is this OK?</p> <p>I use vlc, web browser, etc that I want to keep updated...Is this the right place I should be looking/checking/unchecking?</p> <p>Does every download I do add to these lists automatically? I'v just noticed a whole lot of unknown new lists on another pc that are not the same as on this pc and many(that were added) are unchecked?</p> <p>Where is the best place to read up more on this information to make heads or tails from it?</p>
0non-cybersec
Stackexchange
Direct server return loadbalancer for mariadb galera cluster with 2 networks. <p>Is it possible to configure LVS (keepalived) loadbalancer with direct server return (DSR) for 2 leg network setup?</p> <p>The desired architecture is as follows: mariadb galera cluster, where each node has 4 NICs. The networks attached are C, B, R and M. There are also 2 loadbalancer nodes with 3 NICs attached to C, B and M networks. All are RHEL7 systems. The networks M and R are not important for the discussion, they will be used for management and data replication respectively.</p> <p>What I would like to achieve is to have requests coming from the network C to virtual IP on the active loadbalancer and go to the DB cluster through the network B. Then a DB node would respond directly to the calling client on network C.</p> <p>Network diagram (for simplicity one client, LB and server):</p> <pre><code> ---------- | Client | ---------- | *.3.50 | v net C ====================================== ^ LB VIP=*.3.1 ^ | | | *.3.20 | *.3.200 ---------- --------------- | LB | | Real server | ---------- --------------- | *.4.10 | *.4.200 | | v v net B ====================================== </code></pre> <p>When I set real server IPs from network C in keepalived configuration it seems working, but it stops when I change them to network B IPs.</p>
0non-cybersec
Stackexchange
to drive on to the truck..
0non-cybersec
Reddit
Is there a way to manually post to a rest webservice using a browser. <p>Is there a way to manually post an xml to a webservice using a browser something like:</p> <pre><code>POST http://url/Endpoint &lt;xml file text&gt; </code></pre>
0non-cybersec
Stackexchange
is it possible for some infinite cardinality of numbers to exhibit $x \cdot x = 0$ while other numbers $y \cdot y \neq 0$?. <p>Suppose that there are some numbers, or mathematical objects. Suppose that these numbers have operation $+$ and $\cdot$. $\cdot$ and $+$ are commutative - that is $x \cdot y = y \cdot x$ and $x+y = y+x$. There is $0$ which makes $x+0 = 0+x = x$ for every $x$, and $x \cdot 0 = 0$. Also, $x(y+z) = xy+xz$. </p> <p>If the set $A$ of all numbers has cardinality equal or greater than countably infinite, is there any consistent way to have a set of numbers $B \subset A$ of infinite cardinality that exhibits $x \cdot x = 0$ where $x$ is same $x$, while there is also a set of numbers $C \subset A$of infinite cardinality that exhibits $x \cdot x \neq 0$?</p>
0non-cybersec
Stackexchange
I can't stop the scratches from appearing on my iPhone 4 screen!!. I keep it IN MY POCKET with my earbuds in an really soft carrybag and NOTHING ELSE. I'm so careful with it and I've had it 10 days and already has a bunch of tiny (but noticeable) scratches on the front and I'm just so frustrated. I was excited that the glass was supposed to be so much harder than the previous models on which I only got one or two scratches between screen protectors. I'm waiting on my InvisibleShield to arrive in the mail. Anyone else incredibly frustrated or have suggestions?
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
'Pawn Sacrifice' Poster Starring Tobey Maguire as Bobby Fischer.
0non-cybersec
Reddit
TIL when Bono was 14 years old, his mother died at her father's funeral..
0non-cybersec
Reddit
Copy Table from one MySQL server to another. <p>Is there a way to copy or export a large table from MySQL server to postgres without affecting servers performance. </p> <p>I mean the table is very large and using mysqldump or any select query has bad consequences.</p> <p>Overall my question is: if there is a way to get the copy of the production database or table without performance problems on production.</p>
0non-cybersec
Stackexchange