What should the dashboard look like with the top and side menus in a mobile device?

Current dashboard
My main concern is browsing the mobile device. I am new to UX. All ideas appreciated.

Is it possible to authenticate a user in Azure AD from a client side of the SharePoint 2013 Provider Add-in?

We develop a Add-in hosted by the SharePoint 2013 Provider who calls an API in Azure. The API, an application service with Azure AD authentication and Type of implicit subsidy OAuth. Our wish is to authenticate the current user and make it client side, not to use the permissions of the application and run from the previous code.

The problem is that an add-on hosted by a provider must have URL query strings such as SPHostUrl. We can not set the full URL in the app registration redirection URL, because SPHostUrl differs from one site to the other. When a user has successfully logged in to Azure AD, he will be redirected to the main page of the vendor-hosted add-in and the loosed SharePoint context.

spfx webparts – SharePoint Client Side Web Part: Added Web Part Does Not Display in Web Part List

I have created a webpart with the help of SPfx, called "Hello World"

Deployment on SharePoint Online.
Added as an app. and filed on page.

After that, I created another Webpart called "Webpart Test" in the same solution folder. and has it deployed.

but this time, "Test webpart" does not show up.

enter the description of the image here

Please suggest.

client side – AccessControlException Java Applet

I am taking a security course and a module on client-side attacks. This is why this message may seem bad or outdated.

I have a Java applet that fetches a malicious JAR file and then tries to download and run a malicious binary file on a Windows 7 host.

When debugging the applet in the Java Console, the following error appears:

basic: Applet resized and added to parent container
basic: PERF: AppletExecutionRunnable - applet.init() BEGIN ; jvmLaunch dt 186710 us, pluginInit dt 8044964 us, TotalTime: 8231674 us
java.security.AccessControlException: access denied ("java.util.PropertyPermission" "java.io.tmpdir" "read")
    at java.security.AccessControlContext.checkPermission(Unknown Source)
    at java.security.AccessController.checkPermission(Unknown Source)
    at java.lang.SecurityManager.checkPermission(Unknown Source)
    at sun.plugin2.applet.AWTAppletSecurityManager.checkPermission(Unknown Source)
    at java.lang.SecurityManager.checkPropertyAccess(Unknown Source)
    at java.lang.System.getProperty(Unknown Source)
    at Java.init(Java.java:19)
    at com.sun.deploy.uitoolkit.impl.awt.AWTAppletAdapter.init(Unknown Source)
    at sun.plugin2.applet.Plugin2Manager$AppletExecutionRunnable.run(Unknown Source)
    at java.lang.Thread.run(Unknown Source)
basic: Removed progress listener: sun.plugin.util.ProgressMonitorAdapter@1089de1
security: Reset deny session certificate store

I believe this corresponds to the line of code below:

String tmpdir = System.getProperty("java.io.tmpdir") + File.separator;

The applet has been compiled as below …

/opt/jdk1.7.0_80/bin/javac Java.java
echo "Permissions: all-permissions" > /root/manifest.txt
/opt/jdk1.7.0_80/bin/jar cvfm Java.jar /root/manifest.txt Java.class 
keytool -genkey -alias signapplet -keystore mykeystore -keypass mykeypass -storepass password123
jarsigner -keystore mykeystore -storepass password123 -keypass password123 -signedjar SignedJava.jar Java.jar signapplet

I think the solution is something like that detailed here, but I do not know what exactly to add to my code to get around this restriction. j & # 39; I all-permissions set in a manifest file on my local Kali box, but I do not know Java enough to know if this should or should not correct my error.

echo "Permissions: all-permissions" > /root/manifest.txt

What should I change to fix this exception and have my applet run?

Best approach for managing the database side for Microservices

We look to CI / CD. I have the obligation to choose a database-side management approach on several microservices. I have to assume that one can be in cassandra, another in sql, another in oracle .. They can be completely different.

Here are two approaches that I discovered:

  1. Unified approach:
    Each microservice will have a folder in which the developers will place their scripts. Then the automation tool will run these scripts in order. (The problem that I can see here is that we will not use any comfortable technology, the devs scripting and the recording in the file are very primitive)

  2. Specified approach:
    Each microservice will generate an output in its own way. So, for .net, we will use a database project, for Oracle, I do not know, let's say that a tool will generate scripts, and so on. Then, an automation tool will release each microservice in its own takan approach. For .net will deploy dacpac, for oracle will execute the scripts of some folders.

Recommendations how to tackle this problem?

Plotting – PlotRange manually sets only one side of the plot

You can use PlotRange -> {Automatic, {1, All}}.

An example:

SeedRandom[1]
data = RandomReal[100, {100, 2}];
data = Append[data, {{500, 50}, {50, 500}}];

Row[{ListPlot[data,  ImageSize -> 300, 
    PlotLabel -> "PlotRange -> Automatic"], 
  ListPlot[data,  ImageSize -> 300, 
    PlotRange -> All, PlotLabel -> "PlotRange->All"]
  ListPlot[data,  ImageSize -> 300, 
    PlotRange -> {Automatic, {70, All}}, 
    PlotLabel -> "PlotRange -> {Automatic, {70, All}}"  ]}, 
 Spacer[20]]

enter the description of the image here

It works both ways. You can use PlotRange -> {Automatic, {All, 50}} to make the vertical plot range from the minimum of data to 50:

ListPlot[data,  ImageSize -> 300, 
  PlotRange -> {Automatic, {All, 50}}, 
  PlotLabel->"PlotRange -> {Automatic, {All, 50}}"  ]

enter the description of the image here

picture quality – Sony SEL 18-200mm very blurred on the right side of the photo

I own a Sony a6000 and recently upgraded the lens of the kit (10-50) for a 18-200 mm lens. The problem that I am confronted is that in the right part of the photos, mainly in wide angle, the photo is very fuzzy compared to the left part. I've attached some pictures so you can see for yourself. I even cleaned the lens and the sensor. I must say that the lens of the kit does not produce the same fuzziness, even if it is also a little fuzzy. Is it something of the lens or the sensor of the camera? Any help is appreciated

enter the description of the image hereenter the description of the image hereenter the description of the image here

security – client side hashing + server side hashing

Although I hope to never make a mistake, is it viable to make an unsalted mince at the beginning and send it back instead? If ever the same error or similar error should be committed, at least this is not a plain text password because the actual password has never been sent, but the back end will use always bcrypt for salt, hash and store the password safely?

Yes, you can do that. However, it will not yield much in terms of security. Why? Because it simply means that as far as the attacker is concerned, the hash sent by the client is the password.

In other words, if the database is leaking, the attacker does not have to determine the original plain text password, but only the hash sent to the server. Why? Because when the attacker modifies the front end or creates an unauthorized client to attack the server, it simply sends the hashes instead of the passwords.

In summary, the attacker does not need the original plain text password at all.

Although I understand that an unsalted hash is not particularly strong, if in the scenario of an incorrect configuration registering or storing in any way it is the password not chopped, at least a SHA512 hashed password is stored instead of a plain text password?

Yes, and that's all the attacker needs. Edit: well, that, and a little disturbing the code on the client side. Since we suppose to use the HTTPS protocol, we will assume that we are on a browser. Therefore, playing with client-side code involves using the browser development tools.


In some situations, it might be wise to do client-side cryptography, but it is not.

The only thing you probably have won is that the attacker who has already successfully stolen the hash and may have compromised a user's account will probably not be able to reuse it. to enter other services on which the user has an account …

… I repeat, once everything is done, maybe you'll win a little something …

… As you surely know, this is not a correct solution to this problem. This is evidenced by the fact that if everyone was doing the same client-side hash, then the attacker would be able to reuse those hashes.

So, if the user has different passwords for different services, your approach does not yield anything.

applications – Meaning of this icon, sometimes its side

Battery Exchange Network

The Stack Exchange network includes 175 question-and-answer communities, including Stack Overflow, the largest and most reliable online community on which developers can learn, share knowledge and build their careers.

Visit Stack Exchange

Equation Resolution – Solve 16×16 matrix equality with a nonlinear combination of variables on one side and real ones on the other

I'm trying to solve the following problem: $ A = B $ or $ A_ {bis} $ is a symmetric 16×16 matrix of numbers and $ B $ is a symmetric matrix of variables.

$ B $ definition

To define $ B $, I define first $ Y $ as following:

Y = {{Subscript(y, 11), Subscript(y, 12), 0, 0, 0, 0, 
   Subscript(y, 17), Subscript(y, 18), 0, 0, Subscript(y, 111), 
   Subscript(y, 112), 0, 0, 0, 0},
      {Subscript(y, 12), Subscript(y, 22), Subscript(y, 23), 0, 0, 0, 
   Subscript(y, 27), Subscript(y, 28), Subscript(y, 29), 0, 
   Subscript(y, 211), Subscript(y, 212), Subscript(y, 213), 0, 0, 0},
      {0, Subscript(y, 23), Subscript(y, 33), Subscript(y, 34), 0, 0, 
   0, 0, Subscript(y, 39), Subscript(y, 310), 0, Subscript(y, 312), 
   Subscript(y, 313), Subscript(y, 314), 0, 0},
      {0, 0, Subscript(y, 34), Subscript(y, 44), Subscript(y, 45), 
   Subscript(y, 46), 0, 0, 0, Subscript(y, 410), 0, 0, 
   Subscript(y, 413), Subscript(y, 414), Subscript(y, 415), 
   Subscript(y, 416)},
      {0, 0, 0, Subscript(y, 45), Subscript(y, 55), Subscript(y, 56), 
   0, 0, 0, 0, 0, 0, 0, Subscript(y, 514), Subscript(y, 515), 
   Subscript(y, 516)},
      {0, 0, 0, Subscript(y, 46), Subscript(y, 56), Subscript(y, 66), 
   0, 0, 0, 0, 0, 0, 0, Subscript(y, 614), Subscript(y, 615), 
   Subscript(y, 616)},
      {Subscript(y, 17), Subscript(y, 27), 0, 0, 0, 0, 
   Subscript(y, 77), Subscript(y, 78), 0, 0, Subscript(y, 711), 
   Subscript(y, 712), 0, 0, 0, 0},
      {Subscript(y, 18), Subscript(y, 28), 0, 0, 0, 0, 
   Subscript(y, 78), Subscript(y, 88), Subscript(y, 89), 0, 
   Subscript(y, 811), Subscript(y, 812), 0, 0, 0, 0},
      {0, Subscript(y, 29), Subscript(y, 39), 0, 0, 0, 0, 
   Subscript(y, 89), Subscript(y, 99), Subscript(y, 910), 0, 
   Subscript(y, 912), Subscript(y, 913), 0, 0, 0},
      {0, 0, Subscript(y, 310), Subscript(y, 410), 0, 0, 0, 0, 
   Subscript(y, 910), Subscript(y, 1010), 0, 0, Subscript(y, 1013), 
   Subscript(y, 1014), 0, 0},
      {Subscript(y, 111), Subscript(y, 211), 0, 0, 0, 0, 
   Subscript(y, 711), Subscript(y, 811), 0, 0, Subscript(y, 1111), 
   Subscript(y, 1112), 0, 0, 0, 0},
      {Subscript(y, 112), Subscript(y, 212), Subscript(y, 312), 0, 0, 
   0, Subscript(y, 712), Subscript(y, 812), Subscript(y, 912), 0, 
   Subscript(y, 1112), Subscript(y, 1212), Subscript(y, 1213), 0, 0, 
   0},
      {0, Subscript(y, 213), Subscript(y, 313), Subscript(y, 413), 0, 
   0, 0, 0, Subscript(y, 913), Subscript(y, 1013), 0, 
   Subscript(y, 1213), Subscript(y, 1313), Subscript(y, 1314), 0, 0},
      {0, 0, Subscript(y, 314), Subscript(y, 414), Subscript(y, 514), 
   Subscript(y, 614), 0, 0, 0, Subscript(y, 1014), 0, 0, 
   Subscript(y, 1314), Subscript(y, 1414), Subscript(y, 1415), 
   Subscript(y, 1416)},
      {0, 0, 0, Subscript(y, 415), Subscript(y, 515), 
   Subscript(y, 615), 0, 0, 0, 0, 0, 0, 0, Subscript(y, 1415), 
   Subscript(y, 1515), Subscript(y, 1516)},
      {0, 0, 0, Subscript(y, 416), Subscript(y, 516), 
   Subscript(y, 616), 0, 0, 0, 0, 0, 0, 0, Subscript(y, 1416), 
   Subscript(y, 1516), Subscript(y, 1616)}}

As you can see, Y is a nice symmetric matrix with a coefficient of 0 or unknown. $ B $ is defined as the inverse of $ Y $: $ B = Y ^ {- 1} $.

I'm performing this step on a workstation with the following line:

B = Inverse(Y)

About 20 GB of RAM seems to be needed to perform this inversion.

$ A $ definition

$ A $ is defined from a matrix $ Z $. $ Z $ is a 16×16 symmetric matrix of positive numbers (any random symmetric matrix will do the trick). $ A $ is defined as $ A_ {i, j} = Z_ {i, j} $ if $ Y_ {i, j} neq 0 $ and $ A_ {i, j} = $ 0 if $ Y_ {i, j} = $ 0

A = Table(
  If(MatchQ(Y((i, j)), Subscript(y, x_)), Z((i, j)), 0), {i, 16}, {j, 
   16})

In other words, if the element $ (i, j) $ of $ Y $ is equal to $ 0then the element $ (i, j) $ of $ A $ is set to $ 0.

The same simplification is applied to $ B $ get $ B_ {f} $: $ B_ {i, j} = Y ^ {- 1} _ {i, j} $ if $ Y_ {i, j} neq 0 $ and $ B_ {i, j} = $ 0 if $ Y_ {i, j} = $ 0

Bf = Table(If(MatchQ(Y((i, j)), Subscript(y, x_)), B((i, j)), 0), {i, 
  4}, {j, 4}) 

Then I try to find all the coefficient of $ Y $ solving the system $ A = B_ {f} $, for example. with:

Solve(Table(
   If(MatchQ(Y((i, j)), Subscript(y, x_)), Yinv((i, j)), 0), {i, 
    16}, {j, 16}) == 
  Table(If(MatchQ(Y((i, j)), Subscript(y, x_)), A((i, j)), 0), {i, 
    16}, {j, 16}))

There are 64 variables and 16×16 equations. Most equations are 0 = 0 because of the simplification applied. Remain the equations on the diagonal and the equations on the diagonal element $ (i, j) $ or $ Y_ {i, j} neq 0 $.
that is to say that there are 16 diagonal equations + 96 non diagonal equations. In fact, there are only 48 unique diagonal equations because the system is symmetric, so 48 of these off-diagonal equations are redundant.

Yesterday I tried the program described above. After 12 hours of calculation, Mathematica finally exceeded the memory capacity of the workstation: 128 GB of RAM.

I'm now trying the same approach with the function NSolve. What can I do to optimize the calculation and find a solution in a reasonable amount of time? Is there a better method of resolution?

I may have an idea of ​​the expected value ranges, but I do not know how to add them to the calculation.

Any help would be appreciated, and sorry for the long post πŸ™‚