nt.number theory – rank 1 evaluations which are not discrete on finite transcendental extensions of rationals

assume $ K = mathbb {Q} (X_1, dots, X_n) $ is a purely transcendental extension of rationals on an infinitely indeterminate number. Can anyone give an example of rank $ 1 $ evaluation on $ K $ who fails to be discreet?

If not, is there a theorem which shows that such a rank $ 1 $ should the assessment be discreet?

Can Extensions Control Hiding Contextual Menus Like Add Connection Point

We write a vscode extension for debugging purposes
We would like to display & # 39; add a conditional breakpoint & # 39; and & # 39; Add a connection point … & # 39; only under specific conditions
Can we achieve it
Please help

TLS 1.2 contact: should the server take all the extensions sent by the client?

Yes, each extension defines what it means.

A server that has never heard of this extension (for example, the server is old and the extension is new) ignores it, and the client must be ready to deal with it (at worst , by interrupting the connection after ServerHello, but generally by falling back to the behavior before the definition of the extension).

The extension specification must indicate what the server should do if it sees it and does not want to support it and what it should do if it wishes.

For example, a client may decide to terminate the connection if the server does not use SNI to choose the certificate (and indicates that by the extension server_name in ServerHello), or a client may decide that the OCSP stapling is required, or certificate transparency SCTs are required, or a client can decide to terminate a connection if a CBC cipher suite has been chosen and no agreement to do encrypt_then_mac was not indicated by encrypt_then_mac in ServerHello. Or a server may interrupt connections from clients that do not send server_name.

Authentication – Can Chrome Extensions Steal OAuth Tokens From Redirect-Uri?

This is a duplicate of a stack overflow issue, as it can be applied more to best security and authentication practices.

I am working on authentication between a Chrome extension, Google Cloud Platform and I am trying to send the id_token JWT to an AWS server to retrieve user data (and / or establish a session?).

My question is this – how can I prevent chrome extensions with tabs Read permissions for the GET request or redirected URI that has the JWT user fully validated?

The JWT confirms that a user is who he is, but how do I know if my Chrome extension is the one that makes the request to my backend?

I have some ideas:

  1. Maybe I can create a private window that only my extension can control

  2. Maybe i can somehow use the nonce or get the nonce from my server first

  3. Maybe my chrome extension has a private key or a way to verify with my backend, which has the public key

Any help would be appreciated, it is difficult to search for this specific scenario.


var url = 'https://accounts.google.com/o/oauth2/v2/auth' +
          '?client_id=' + encodeURIComponent(chrome.runtime.getManifest().oauth2.client_id) +
          '&response_type=id_token' +
          '&redirect_uri=' + encodeURIComponent(chrome.identity.getRedirectURL()) +
          '&scope=' + encodeURIComponent(chrome.runtime.getManifest().oauth2.scopes.join(' ')) +
          '&nonce=' + Math.floor(Math.random() * 10000000);

chrome.windows.create({ url: 'about:blank' }, function ({ tabs }) {
    chrome.tabs.onUpdated.addListener(
        function googleAuthorizationHook(tabId, changeInfo, tab) {
            if (tab.id === tabs(0).id) {
                if (tab.title !== 'about:blank') {
                    console.log(url);
                    if (tab.title.startsWith(chrome.identity.getRedirectURL())) {
                        const id_token = tab.title.split("https://security.stackexchange.com/#")(1);
                        console.log(id_token);
                    } else {
                        console.error(tab.title)
                    }

                    chrome.tabs.onUpdated.removeListener(googleAuthorizationHook);
                    chrome.tabs.remove(tab.id);
                }
            }
        }
    );

    chrome.tabs.update(tabs(0).id, { 'url': url });
});

How to know and remove unused custom modules / extensions in Magento 1.x and Magento 2.x?

I have two different Magento 1.9 and Magento 2.3 stores. I need to know the details of unused custom extensions and third-party modules of my stores, so I can disable / delete them. Is there a method or a way to do this in Magento?

Git Extensions – how can I avoid the "new branch" message when I'm supporting

Git noob here. I have local pensions that I regularly send to bitbucket. Git Extensions displays the highest entry in the commit graph with master next to that, which, I suppose, means that I have a branch called "master". If I look at the remote repository on bitbucket, I see the same thing.

Here is the dialogue:

enter the description of the image here

If I make a push from here, I get this message:

`The branch you are about to push seems to be a new branch for the remote.
Are you sure you want to push this branch?`

There already seems to be a lot of things on this subject, and it seems to be becoming more complex.

However, I noticed that I do not receive the message if I select the bottom URL radio button and then click Push, but the Remote The option box is always selected when the dialog box is displayed. My question is: – Is it possible to avoid this dialog? – one way would be to have GitExtensions remember the state of the radio button selection (but it will likely be a feature request).

Nt.Number Theory – Rademacher Extensions for 1/2 Weights

In a famous article, Rademacher used the circle theorem to give a formula of the Fourier coefficients of the partition function. $ 1 / f (q) $ or $ f (q) = prod_ {n = 1} (1-q ^ n) $and in another article he gave the coefficients of the j-invariant function $ j (q) $. In these cases, he was dealing with modular forms of weight -1/2 and 0 respectively.

My question is: is there a known formula of the Fourier coefficients of $ j (q) f (q) $?

This seems to be a modular 1/2 weight function and the usual circle method only works for a non-positive weight. On the other hand, it seems difficult to imagine that this does not exist in the literature. Thank you!

postfix – How to route emails to internal extensions and relay external messages with a transport card

I have two Postfix servers + one MX:

  • an audience is dedicated to sending email to external servers, for example: gmail.com, yahoo.fr .., when clients connect to their email client (Thunderbird, Outlook ..), call it smtp.example.com
  • the MX received the incoming emails and forwarded them (after checking the antispam) to the internal MTA, call it mx.example.com
  • the last is the internal MTA that connects the other MTAs and forwards the local mail to the IMAP cluster, call it internal-mta.example.com

Then some servers in the network have to send emails, for example the webmail.
So, I plug the webmail into the internal MTA.
The problem is that the internal MTA is in a private network, it does not connect to the outside. I want all messages received from the internal network to be forwarded to smtp.example.com, which is able to send outgoing messages.

For now, on internal-mta, I have these postfixes transport rules:

virtual_mailbox_domains = example.com
transport_maps = ldap:/etc/postfix/ldap-transport.cf

The transport card uses ldap to find out where the local mailbox is (based on an ldap attribute). There are two IMAP storage systems:

/etc/postfix/ldap-transport.cf
server_host = ldap://ldap.Example.com
search_base = ou=mail_users,dc=example,dc=com
bind_dn = reader_dn
bind_pw = passwd_dn
query_filter = (uid=%u)
result_attribute = mailHost
result_format = lmtp:%s

So, Internal Postfix gets all the addresses in example.com, asks the LDAP where the mailbox is and distributes the mail with LMTP.

Is this a way to add a faalback message to this transport that sends all other messages to smtp.example.com?

Thank you for all your advice

pathfinder 1e – lifesense can it detect elementals and golem extensions?

One of my player's characters is an oracle of life that has just received a sense of life. They argue that, since a golem is powered by elementals, it should be able to detect the elemental that it contains and thus detect the golems.

Would their argument hold water? Are elementals considered alive or simply animated by elemental energy, such as the negative energy undead?

schema – SQLServer: Storing File Extensions and Normalization?

After much research, I decided to store the pdf / img / txt / doc / etc files on a web server instead of a database. However, the reference to this file will be stored in SQL Server.

Until now I have …


| File_id (int) | FileName (varchar(260)) | Uploaded Date (Datetime2) | File Extension (varchar(4)) |
|---------------|-------------------------|---------------------------|-----------------------------|
| 1             | Billing Invoice         | 2019-10-20 etc            | pdf                         |
| 2             | Receipts                | 2019-10-20                | jpeg                        |
| 3             | Orders                  | 2019-10-21                | txt                         |

My question is: should I store the file extension as is or create an additional table for searching and using foreign key constraints?

| File_id (int) | FileName (varchar(260)) | Uploaded Date (Datetime2) | File Extension (FK to extension_id) |
|---------------|-------------------------|---------------------------|-----------------------------|
| 1             | Billing Invoice         | 2019-10-20 etc            | 1                         |
| 2             | Receipts                | 2019-10-20                | 2                        |
| 3             | Orders                  | 2019-10-21                | 3                         |

| Extension_id (tinyint) | Extension (varchar(4)) |
|------------------------|------------------------|
| 1                      | pdf                    |
| 2                      | jpeg                   |
| 3                      | txt                    |

I am a young computer engineer and I am concerned that too much standardization will cause later performance / readability issues, or simply clutter the database by adding useless tables.