Everyone knows that pushing sensitive data to git repositories early or late may lead to security issues. Usually to avoid such situations all the files which may contain any sensitive information, developers add to .gitignore
files which tells git that it should skip those files from adding to the repository and all the more pushing them to the remote one. There are many types of files which usually don’t add to repositories. Depending on used technologies they can be .env
files which contain environment variables, various configuration secret files, certificates, private keys etc.
Հաճախ տարբեր կայքերում և հավելվածներում կարելի է հանդիպել «Մուտք այլ կայքի միջոցով» կոճակների։ Առավել հաճախ հանդիպողներն են՝ մուտք Գուգլի, Ֆեյսբուքի, Թվիթերի և նմանատիպ հայտնի կայքերի միջոցով։ Փորձենք հասկանալ ինչի համար են նախատեսված այդ կոճակները, դրանց օգտակարությունը, դրանցից բխող տեղեկատվական վտանգները և այդ վտանգներից պաշտպանվելու եղանակները։
Եվ այսպես ինչի՞ համար են վերոնշյալ կոճակները։
Դրանք հնարավորություն են տալիս հավելվածներին և վեբ կայքերին նույնականացնել օգտատիրոջը։
Often in various websites and applications we can see buttons called “Login with social account”. The most common are login with Google, Facebook, Twitter and more similar famous websites. Let’s try to understand, what these buttons are for, benefits of these buttons, the information risk arising from them and ways of protecting the information.
What are these buttons for ?
They allow applications and websites to identificate users.
Once upon a time a boy named Promise decided to go travel in one of the famous worlds in his reality. Although Promise had a lot of determination inside himself, it was very hard to decide to leave his native place and go toward Bluebird. However he took everything that could be necessary for him during the journey and started his journey.
The purpose of Promise was to learn new techniques from the inhabitants of Bluebird. He always wanted to be the best in his field. …
Fisher-Yates shuffle is an algorithm for generating random permutation of finite sequence. The original method of this algorithm was described in 1938 by Ronald Fisher and Frank Yates. In this article is described thatoriginal method of the algorithm.
There’s possible to try algorithm using pencil and paper.
The basic method given for generating a random permutation of the numbers 1 through N goes as follows:
In this short article, I would like to tell some basics about the working mechanism of the MongoDB cursor. There’re a lot of cases when service is connected to the database but when requesting data from server it hangs and doesn’t get any response or even error exceptions.
Cursor is a prepared set of documents that contains documents matching current query criteria. In other words when we call .find() method in the server is creating that kind of virtual collection and cursor is pointing to start element of that collection.
With the.find() query there is a possibility to send an…