17 private links
Wheezy est le nom de code de développement de Debian 7.0. Wheezy a bénéficié d'une prise en charge à long terme (LTS) jusqu'au 31-05-2018. Cette version est maintenant archivée et ne reçoit plus de mise à jour officielle de sécurité. Cette version a été remplacée par la version Jessie le 25-04-2015.
Perl 5 with modern defaults
I saw developers taking other people's solutions for granted. Not thinking twice about the approach, not bothering about analyzing it. Ok, when this is Dan Abramov telling you how to use React or documentation saying that this is the only way to use its API, then yes, you probably should agree with it. Yet, when you're using some tech content without at least a bit of skepticism, then well, you still might go far in your career, but it also may hold you back.
Useful One-Line Scripts for Perl Jul 11 2018 | version 1.11 |
---|
Compiled by Peteris Krumins (peter@catonmat.net, @pkrumins on Twitter)
http://www.catonmat.net -- good coders code, great reuse
Latest version of this file is always at:
http://www.catonmat.net/download/perl1line.txt
This file is also available in other languages:
Chinese: https://github.com/vinian/perl1line.txt
Please email me peter@catonmat.net if you wish to translate it.
Perl One-Liners on Github:
https://github.com/pkrumins/perl1line.txt
You can send me pull requests over GitHub! I accept bug fixes,
new one-liners, translations and everything else related.
I have also written "Perl One-Liners Explained" ebook that's based on
this file. It explains all the one-liners here. Get it at:
http://www.catonmat.net/blog/perl-book/
No Starch Press has published "Perl One-Liners" as a real book too:
http://nostarch.com/perloneliners
On Saturday May 30th filmmaker and photographer David Jones of David Jones Media felt compelled to go out and serve the community in some way. He decided to ...
"History X", disponible partout : https://lnk.to/guizHistoryx Abonne toi à la chaîne : https://lnk.to/guizmoyt Retrouve tous les titres de Guizmo : https://g...
Extrait mon EP MDP "Double je" : https://backl.ink/MDPDORIA Disponible depuis le 6 décembre Réalisé par :Lokman Hundreds & Will Diez --------------------- Su...
We have a studio recorded version of this song, but wanted to do a LIVE cover of it! CLICK TO SUBSCRIBE - http://bit.ly/2EnUvWE Studio Recorded Version: http...
Slides of Tim Bunce's talk on Devel::NYTProf and optimizing perl code at YAPC::NA in June 2014. It covers use of NYTProf and outlines a multi-phase approach to optimizing your perl code.
Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. A free implementation of this protocol is available from the Massachusetts Institute of Technology. Kerberos is available in many commercial products as well.
The Internet is an insecure place. Many of the protocols used in the Internet do not provide any security. Tools to "sniff" passwords off of the network are in common use by malicious hackers. Thus, applications which send an unencrypted password over the network are extremely vulnerable. Worse yet, other client/server applications rely on the client program to be "honest" about the identity of the user who is using it. Other applications rely on the client to restrict its activities to those which it is allowed to do, with no other enforcement by the server.
Some sites attempt to use firewalls to solve their network security problems. Unfortunately, firewalls assume that "the bad guys" are on the outside, which is often a very bad assumption. Most of the really damaging incidents of computer crime are carried out by insiders. Firewalls also have a significant disadvantage in that they restrict how your users can use the Internet. (After all, firewalls are simply a less extreme example of the dictum that there is nothing more secure than a computer which is not connected to the network --- and powered off!) In many places, these restrictions are simply unrealistic and unacceptable.
Kerberos was created by MIT as a solution to these network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. After a client and server has used Kerberos to prove their identity, they can also encrypt all of their communications to assure privacy and data integrity as they go about their business.
Kerberos is freely available from MIT, under copyright permissions very similar those used for the BSD operating system and the X Window System. MIT provides Kerberos in source form so that anyone who wishes to use it may look over the code for themselves and assure themselves that the code is trustworthy. In addition, for those who prefer to rely on a professionally supported product, Kerberos is available as a product from many different vendors.
In summary, Kerberos is a solution to your network security problems. It provides the tools of authentication and strong cryptography over the network to help you secure your information systems across your entire enterprise. We hope you find Kerberos as useful as it has been to us. At MIT, Kerberos has been invaluable to our Information/Technology architecture.