Everyone knows that pushing sensitive data to git repositories early or late may lead to security issues. Usually to avoid such situations all the files which may contain any sensitive information, developers add to .gitignore files which tells git that it should skip those files from adding to the repository and all the more pushing them to the remote one. There are many types of files which usually don’t add to repositories. Depending on used technologies they can be .env files which contain environment variables, various configuration secret files, certificates, private keys etc.

Actually if you are managing just a…


🇬🇧 English

Հաճախ տարբեր կայքերում և հավելվածներում կարելի է հանդիպել «Մուտք այլ կայքի միջոցով» կոճակների։ Առավել հաճախ հանդիպողներն են՝ մուտք Գուգլի, Ֆեյսբուքի, Թվիթերի և նմանատիպ հայտնի կայքերի միջոցով։ Փորձենք հասկանալ ինչի համար են նախատեսված այդ կոճակները, դրանց օգտակարությունը, դրանցից բխող տեղեկատվական վտանգները և այդ վտանգներից պաշտպանվելու եղանակները։

Նպատակը

Եվ այսպես ինչի՞ համար են վերոնշյալ կոճակները։

Դրանք հնարավորություն են տալիս հավելվածներին և վեբ կայքերին նույնականացնել օգտատիրոջը։


🇦🇲 Հայերեն

Often in various websites and applications we can see buttons called “Login with social account”. The most common are login with Google, Facebook, Twitter and more similar famous websites. Let’s try to understand, what these buttons are for, benefits of these buttons, the information risk arising from them and ways of protecting the information.

Purpose

What are these buttons for ?

They allow applications and websites to identificate users.


Once upon a time a boy named Promise decided to go travel in one of the famous worlds in his reality. Although Promise had a lot of determination inside himself, it was very hard to decide to leave his native place and go toward Bluebird. However he took everything that could be necessary for him during the journey and started his journey.

Promise is going to Bluebird

The purpose of Promise was to learn new techniques from the inhabitants of Bluebird. He always wanted to be the best in his field. …


Fisher-Yates shuffle is an algorithm for generating random permutation of finite sequence. The original method of this algorithm was described in 1938 by Ronald Fisher and Frank Yates. In this article is described thatoriginal method of the algorithm.

There’s possible to try algorithm using pencil and paper.

Steps of Fisher-Yates’ shuffle original method using pencil and paper

The basic method given for generating a random permutation of the numbers 1 through N goes as follows:

  1. Write down the numbers from 1 through N.
  2. Pick a random number K between one and the number of unstruck numbers remaining (inclusive).
  3. Counting from the low end, strike out the K-th number not yet…

In this short article, I would like to tell some basics about the working mechanism of the MongoDB cursor. There’re a lot of cases when service is connected to the database but when requesting data from server it hangs and doesn’t get any response or even error exceptions.

So what is the cursor?

Cursor is a prepared set of documents that contains documents matching current query criteria. In other words when we call .find() method in the server is creating that kind of virtual collection and cursor is pointing to start element of that collection.

Working mechanism of MongoDB cursor

With the.find() query there is a possibility to send an…

Meruzh Janoyan

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store