ui – MacOS Catalina ldap browser supporting certificate authentication?

Sorry if this is long. Im specifically looking for an GUI based ldap browser here that supports certificate authentication; I previously used softerra On my HP.
I’ve looked into several things:
PhpLdap admin, Jxplorer, Ldapadmin tool.

I checked into LdapSofts ldap browser (which costs) but their forum hasn’t had any posts since 2019 so I’m not sure; I’ve got an email out to them about verifying certificate authentication.

I am aware of the Directory Utility on the Mac but I don’t need a full directory and am not sure it will do what I need.
I have Apache Directory Studio but it will not do cert auth (unless I’m missing something?).
I’m specifically using certs from a smart card.
I need the GUI to look at specific attributes of user accounts without having to convert them; which is why I’d prefer not to use CLI.
Thanks!

blockchain – What am I supporting? Anarchy?

I started buying crypto in 2018. I’m holding on for the ride…boom or bust. However, that doesn’t mean I’ll ever understand it, and I certainly don’t need to jump on any anarchic or utopian blockchain bandwagons.

My most pressing question is this: who or what am I supporting when I buy bitcoin or ether? Did I unwittingly support the overthrow of governments when I bought crypto?

Lastly, who benefited the most in the early days of crypto? The miners? Investors who got in early? And who stands to benefit now? Where is all the money going? (By money I still mean US Dollars!)

visual studio code – Markdown To PDF Supporting LaTeX And HTML in VSCode

I’m attempting to convert from Markdown to PDF in VSCode with the following requirements:

  1. Needs to support LaTeX
  2. Needs to support HTML/CSS
  3. Needs to support highlighting

I’m using the extension Markdown Preview Enhanced and have tried using the PDF converters it has (Puppeteer and Pandoc). This is what the output should look like (It’s a PNG though, not a PDF). For whatever reason the LaTeX is not rendering correctly, neither is the HTML.

I’m definitely open to using other extensions to convert the MDs to PDFs, any help would be great!

Other info:

  • Markdown Preview Enhanced uses Markdown-It to render the Markdown.
  • I’m using the following front matter for pandoc:

fontsize: 12pt
linkcolor: blue
urlcolor: green
citecolor: cyan
filecolor: magenta
toccolor: red
geometry: margin=0.3in
papersize: letter
output:
pdf_document:
highlight: tango

beginner – Prime number sequence supporting repeated iteration

I’m a long-time Java programmer, but recently I decided to give Kotlin a try. So far, I’m loving the language features, it feels much more expressive than what I’m used to. As practice, I wrote this function that produces a repeatable sequence of prime numbers (i.e. the sequence can be iterated multiple times, and will make use of results from past iterations to speed up future iterations). It feels pretty solid to me, but I’m wondering how it would look to a Kotlin veteran – are there language features that I’m not taking full advantage of, or conventions that I should be following?

One question I have in particular is regarding top-level function vs. subclass; here I chose to implement a top-level function primeSequence(): Sequence<Long> that returns an object, but I could have just about as easily implemented a class PrimeSequence : Sequence<Long>. Is there a good rule of thumb for when to use one or the other?

fun primeSequence(): Sequence<Long> = object: Sequence<Long> {
    private val knownPrimes: MutableList<Long> = arrayListOf(2L, 3L)

    private fun Long.isMultipleOf(n: Long) = (this%n == 0L)
    
    private fun Long.isPrime() = knownPrimes
            .takeWhile { it*it <= this }
            .none { this.isMultipleOf(it) }

    override fun iterator(): Iterator<Long> = object: Iterator<Long> {
        private var lastPrime: Long? = null

        override fun hasNext() = true

        override fun next(): Long {
            val nextPrime = when(val lastPrime = this.lastPrime) {
                null -> 2L
                2L -> 3L
                else -> {
                    if (knownPrimes.last() > lastPrime ) {
                        knownPrimes(knownPrimes.binarySearch(lastPrime) + 1)
                    } else {
                        val np = generateSequence(lastPrime+2) { it+2 }
                                .first { it.isPrime() }
                        knownPrimes.add(np)
                        np
                    }
                }
            }
            this.lastPrime = nextPrime
            return nextPrime
        }
    }
}

enterprise architecture – Is there any recognized pattern supporting or discouraging the access to multiple database from a single application?

Connecting multiple applications to the same database is generally a bad idea. It’s an integration anti-pattern you might call The Shared Database and it’s unfortunately a very easy anti-pattern to fall into.

It’s common for a database to be created as part of building an application. That application needs to store data somewhere, right? So you need a database and you create one. But then, after some time, other applications get created that might need access to some data that already exists (the usual suspects: users, customers, products, orders, etc). How do they get the data? Well, nothing simpler: just connect to the same database, right?

And now you have problems:

  • a database is an implementation detail. Now you exposed this to other applications;
  • an implementation detail can be changed because it’s just that, an implementation detail. Want to change the implementation of your database, change tables structures, schemas, etc? You can’t do it anymore without affecting other applications (anyone with the database connection credentials can basically reach out into your database and fetch data – you might have applications connecting to your DB without even knowing they exist).
  • if your database isn’t exactly how others need it, you might need to make changes to your DB for someone else’s use case. Or they will do so themselves 🙂 and break your application with your own database.
  • hello tight coupling, bye bye loose coupling. That’s bad however you put it.
  • you only store data, you don’t store behavior. The behavior is in your application. How can others reuse behavior? Maybe create a crap load of stored procedures to share the behavior. You get more and more entrenched into using that database vendor implementation. Want to change from Oracte to MySQL? You now need approval from others.
  • etc.

A shared database is like having neighbors paying you a visit and then refusing to leave. You now have to live with them.

So exposing “your” database to others by using and API, or a gateway, or a facade, or a service, or whatever, is a way to share the data and behavior without having to live with your neighbors. It’s a good practice that hides the implementation details. Of course it’s not without it’s disadvantages: it’s more complex than “select * from”, more verbose, it still is an integration point (which needs to evolve, maybe not at the same pace for everyone using it, so you now need API versioning), etc.

When it comes to one application connecting yo multiple DBs (as your title asks), things are simpler and less problematic concerning what I said above. But again, it’s a trade-off. Transactions might suck across multiple databases, so will joins. Keeping things separated makes sense but will cause performance degradation as now you need to open connections to more databases, etc.

At the end of the day, it’s not about patterns or anti-patterns, but trade-offs, thinking carefully about one design decision or another, and basically, a good dose of common sense.

transactions – The best JavaScript libraries supporting Bitcoin Core?

I highly recommend bcoin:

https://bcoin.io/
https://github.com/bcoin-org/bcoin

It is a nodejs library that can also run a fully validating node, SPV node, and BIP44 wallet. It’s used in production by many long-standing bitcoin companies such as Purse.io

You can even use the bcoin client to make RPC calls to bitcoin core, and of course you do not need to run the bcoin full node to take advantage of the library for TX construction and wallet functions.

sql server – SQL Graph DB Tables not supporting OLE DB Fast Load?

I try to use SSIS to load in SQL Server Graph DB an edge table, based on the documentation from MSFT it should behave like any normal table, if I use the OLE DB Destination with regular table load it works (but is super slow), so i wanted to use “table or view – fast load” configuration looks as expected but upon execution i get this error.

An OLE DB record is available. Source: “Microsoft SQL Server Native Client 11.0” Hresult: 0x80004005 Description: “JSON data for INSERT/UPDATE of graph pseudocolumn ‘$edge_id’ is malformed.”.

based on my understanding the edge_id should be auto created, therefore I’m a bit surprised, is fast load not supported on graph tables, hence the documentation is incorrect or what did I miss here ?

https – Hosting solutions supporting SSLv3

Stack Exchange Network


Stack Exchange network consists of 176 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

dnd 3.5e – Best supporting class for a 3.5 low level campaign?

Bard is the obvious choice, and it’s a good one. Inspire courage is good at 1st. Inspirational boost (swift action to add +1 to inspire courage, 1st-level bard spell, Spell Compendium) is available from 2nd level, as is cure light wounds, which is good enough for healing. Even at 1st, a bard can also zap wand of cure light wounds, which is really the best way to handle healing in the game anyway. At 3rd, you could go with the Song of the Heart (permanent +1 to inspire courage, feat, Eberron Campaign Setting), though honestly that might be too much.

Other obvious options would be some kind of spellcaster—cleric, obviously, though wizard or druid could be just as good. Certainly very good, but more work to run as an NPC, and the biggest advantages aren’t until higher levels anyway.

To go a different route, you could consider some kind of mundane lockdown build, a barbarian or fighter or knight with Combat Reflexes, Improved Trip and a guisarme. No healing that way—maybe dip cleric so you can zap a wand—but can offer some solid zone defense. Still, might be a little spotlight-intensive for a DMPC.

Anyway, my vote goes to the bard, the inspire courage is a great bonus that is a nice background feature, and spells and wands provide a nice way to offer some utility to the party.

Closing thought: dragon shaman is a really poor class. Perhaps recommend that player consider the dragonfire adept from Dragon Magic—extremely similar concept, much better design. It can even get the dragon shaman’s draconic auras if desired, though its own invocations are generally better.

ssh – Are hardware security keys (e.g ones supporting Fido2) “able to protect authentication” even in case of compromised devices?

Correct me if I am wrong, please.

I understand that 2FA (MFA) increases account security in case an attacker obtains a password which might be possible via various ways, e.g. phishing, database breach, brute-force, etc..

However, if the 2FA device is compromised (full system control) which can also be the very same device then 2FA is broken. It’s not as likely as opposed to only using a password but conceptually this is true.

Do hardware security keys protect against compromised devices? I read that the private key cannot be extracted from those devices. I think about protecting my ssh logins with a FIDO2 key. Taking ssh as an example, I would imagine that on a compromised device the ssh handshake and key exchange can be intercepted and the Fido2 key can be used for malicious things.

Additionally: Fido2 protects against phishing by storing the website it is setup to authenticate with. Does FIDO2 and openssh also additionally implement host key verification or doesn’t it matter because FIDO2 with openssh is already asymmetric encryption and thus not vulnerable to MitM attacks?