I have a lot of store procedure and functions that are constantly updated … is there any way to track those changes from a Database mounted in postgresql?
Let's say we want to add a dynamic "loading bar" to our server-client game … the player presses "login", a bar appears and shows the percentage of assets loaded and server settings.
The only way I found … is very laborious and codified:
// We received our environment barPercentage += 10f; // Increasing the bar. updateBar(); // We received our player settings barPercentage += 5f; // Increasing the bar again updateBar();
As you can see, this monitoring of the progress of the received server data is very bad and must be adjusted every time an important part of the game structure changes.
What are good ways to implement a follow-up percentage on this side of the client? How do we really track the upload progress (related to the client and server) without coding it as I did in the code example? Are there good patterns or data structures?
I am creating an application to register and update the information of children, this information must be provided by their tutors. Each child can have multiple tutors, and a tutor can be a tutor for several children. This has been resolved by specifying a Table where I relate a student to each of their tutors through a single record and characterize that relationship accordingly.
Now, we face the need to specify read / write permissions among some of the tutors who give private lessons to a student. My idea is to create a new table where you relate each of the pairs formed by those tutors and specify the read and write permissions. The problem is that those permissions are not reciprocal, one tutor may have permissions on another, while that other may not have permissions on the first.
I don't know which one is better, have only one record for each pair of tutors and add Boolean fields for each type of permission possible, or define a type of parent-child record where parents have permissions on the child. This second option would mean having two records for each pair of guardians, where the tutor 1 is a parent over the guardian 2 and another where the tutor 2 is a parent over the guardian 1.
Please help me determine which would be better and why.
Suddenly, many users of this organization's systems began to report that they had been blocked from their Active Directory accounts.
The entire network is physical and local. There is no direct internet access. There is a firewall that connects the local network through VPN to a larger corporate network. Here are the components of the local network:
NY: Active Directory domain.
server1: Windows Server 2008 R2; Active Directory domain controller for
NY; Remote desktop license server; HyperV VM Host; Only administrators can connect.
server2: Windows Server 2008 R2; Remote desktop session host; member of
NY; Users connect to this machine regularly to work on documents.
NL: Windows Xp; VM running on HyperV hosted on
server1; member of
NY; used only by a few selected users (maybe 3) at regular times every week.
- Several other Windows XP virtual machines that run on
server1They generally run background services and are generally not connected to the use of Remote Desktop.
- Several HP thin client machines used for remote desktop connection to the above.
I started looking at the event log
server1 (the domain controller). I filtered the event 4740 "A user account was blocked" and discovered that this event occurred once every 2 or 3 minutes:
Each occurrence of the event looks like this:
A user account was locked out. Subject: Security ID: SYSTEM Account Name: SERVER1$ Account Domain: NY Logon ID: 0x3e7 Account That Was Locked Out: Security ID: NYJoeSmith Account Name: JoeSmith Additional Information: Caller Computer Name: NL
Each occurrence has a different Active Directory username, but the rest is the same in all cases.
This is an immediate warning signal for me, since the frequency and repetition of the locks seem to suggest that someone or something is running a list of usernames and trying to guess the passwords until those users are locked.
I notice that each of the events contains the line
Caller Computer Name: NL, Microsoft documentation for 4740 says it contains:
the name of the computer account from which the login attempt was received and after which the destination account was blocked.
As far as I can tell, this means that someone or something is trying to log in to
NY credentials, or that something in the
NL the machine is trying to authenticate using
To try to find the source, I enabled the following audit policies in "Local security policies" in
I was hoping to find some login attempts at the
NL event logs, but I didn't find anything that matched the blocking events found in
server1 keep recording a new lock every 2 to 3 minutes, the
NL Security logs only show 4 or 5 events in total every hour.
As a temporary solution, we begin to maintain
NL VM off when not in use, and locks stop while the machine is offline. This has been going on for several weeks now.
What other tools can I use, or what other records can I search / enable to locate the source of these login attempts that result in account locks?
There are two ways in which the medium can track a user
We will concentrate mainly on tracking based on the IP address. What I found was even if I read 5 articles this month. If I open the medium in an incognito window, I can see the content of the blog.
We also know that incognito browsing does not hide our IP address, it is "no VPN". So my question is how can the media not track me, when I use incognito and allows me to see the blog?
Just to clarify: this is not a complaint. I have a genuine curiosity and our direct curiosity is a genuine question. I want to become a better developer and even small details like this count.
So, don't get me wrong, this is not a technical question about what
Dictionary make. It's about when to use it as a developer on a computer.
The reason for this is something that happened today at work. I started working on a project made by another developer. He is still on the team, so I can ask for information, etc. BUT:
He uses dictionaries in C # for EVERYTHING. We make payments and he receives a known response from a payment gateway API.
The fields are known, so if it were me, I would make an entity / model as I want to call it and then assign the values there and then save them in the database (that was the short story). Keep in mind that these are data that we need to save, but only for historical reasons. We are not really doing any operation about it.
It is a great entity (as in many fields). So I tried to work on the project and, of course, it was impossible to get intelligence about it. I needed a single key to return the value to the interface. Of course, I couldn't find it. I wasn't in any part of the projects (we have a monolith).
I had to spend about half an hour reviewing projects, commitments, history, then the database and then ended up asking him what happened to him, because I couldn't find it.
It was something really simple like
object.VariableInObject.Data("theKeyIwantFromTheDb") but actually looking for it was a nightmare. I got frustrated but asked a very polite question about & # 39; Why do you use dictionaries so much? Especially if the data is known.
His response was "because I don't think we should use objects for data that we will keep only for historical reasons" (that is, in this case, a person's payment history ").
I don't know if that is valid. It is? Because it was a nightmare to track the data in a great solution that I hadn't worked on before. If I were in the project and not in a dictionary, I would have found it immediately.
So, the question is in the title. Intelligent development in a team, when other people use your solution and need to work on it, should I use something like that, which is difficult to track?
I ask because I personally try to make it easier for other developers and it seems that he has experience (senior while I'm in the middle) and just doesn't give a … you know. He simply does what he likes (at least that's what it seems).
PS If that plays a role, the db is Nosql.
I live in Iran and I want to be active on Twitter against our oppressive government. Can my government track and detect me?
Twitter is prohibited here and we must use VPN. I use Outline (Shadowsocks) mainly. Is there any way to track users through information from ISPs or something? If using Outline is not a good option, is TOR using a good solution?
The importance of this question is that I can be sentenced to death only by a Twitter post! I do not want to be tracked. I delete the metadata from the images I publish and do some basic methods, but I want to make sure there is no problem with my activity on Twitter. What I have to do?
Google Analytics (GA) has started showing wrt analysis data to canonical URLs now. Previously it was easy to find data from AMP pages in GA, since one can easily filter the URLs ending in "/ amp". But now finding AMP data in GA doesn't seem easy.
The dimension & # 39; Source & # 39; of the AMP pages is like & # 39; example-com.cdn.ampproject.org & # 39 ;, so it can be used to filter AMP data (i.e., GA> Acquisition> References> Dimension & # 39; Source & # 39 ; O Behavior> Site content> Landing pages> Primary or secondary dimension such as & # 39; example-com.cdn.ampproject.org & # 39;) but for me, this data is not consistent with the AMP data I get from Google Search Console.
Custom dimensions can be used to identify AMP sessions, but is there any other way to accurately track AMP data without using the custom dimension? Thank you.
My goal is to develop software that is illegal in my country. Obviously I don't want anyone to track the code to me or prove that I developed it after implementation.
What precautions would be necessary? What traps should be avoided? Is there a tutorial?
I suspect that full disk encryption is required on your development machine and Internet connectivity through Tor.
What configuration would be necessary when developing in countries with political repression or similar conditions?
I'm not sure what it's called or even if it's possible, but here is the scenario I'm curious about:
I connect to a site that do not use SSL / TLS to do some work (unfortunately I must use this site and I have already told the owners to fix it).
My question is simply if someone (and if so, how) can track traffic to that site from a network that is not mine.
For example, I log in from my work PC, which is presumably in a secure network (that is, nobody is physically in the parking lot doing a MitM attack) but someone can do not In my work network, I simply smell the traffic to the http site itself and simply intercept the POST request there, regardless of where I am.
To clarify, I'm looking to know if it's possible without using & # 39; hacks & # 39 ;, but something like
tcpdump. So, for example, I know that if an attacker has compromised the web server or my work PC, they can smell my traffic easily, but at that time, they will no longer be out of my network.
Here is a picture I take.