Jump to content
Welcome, welcome! Come in and register, and have some developer coffee. 👨‍💻 ×


  • Content Count

  • Joined

  • Last visited

  • Days Won


flashang last won the day on May 29

flashang had the most liked content!

Community Reputation

19 Good

1 Follower

About flashang

  • Rank
    Junior Kaki

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. It is ok to share the link for this online course ?
  2. We use a simple lock to protect some important keys. Saved private keys stored somewhere for SSH "to use it automatically". User have to secure their device / app to avoid unauthorized access. No matter password, fingerprint, iris to open some local stored key, This only available if most of the users have the "input device". Beside how to secure data and connection, Service provider have to think how could user change their devices without technical help, how to ensure that is a real user. The current accepted solution is password, additional with OTP. 🤔
  3. Extended to more smaller topics... Bank industry from provide security token to software token. Some OTP sms switch to app message or email. Using password to get key for decrypt, this should be most cost-effective solution. ---------- Government or some company create backdoor for their own convenient. They can do this on you, they can do this on everyone else. Trust is easy to lose, but hard to earn back. Some organization use different brands firewall together, because every brand have their weakness. (or may be they don't trust them all) People are lo
  4. Open Source hardware is another topic which may have a lot of "trace records". To simplify this content for more "human friendly reading", may be reduce technical keyword and use more common terms. To protect data (no matter stored in local or server), using strong password (or machine generated password, fingerprint, ..., etc), everyone know, but how many people do this ? How about those software company ? Why data leak issue happened on those big software company ? What action they do to reduce the damage ? How to prevent similar issue happened
  5. When you store some important things at somewhere, you should at least add some simple lock, to prevent unauthorized access. But why people forget this when online ? More government are roll out policy for online identity. All the services you used will be logged with timestamp. Irresponsible comments / sharing or forwarding of fake news may be summoned by the police. More security and data leak issue happen, some service provider may have different packages. But, they have to comply with government policy. Beside service provider, you may also have to give yo
  6. Sometime, we might think is there any alternative solution ? (correct me if any misunderstood) The main idea of this project is secure data in hosting server. If server management mistake may causes data leaked. When we store our project in a server, (server code + database) all the server side code, database config and password, all these data we want to secure. If we use the server for database only, (client app + server database) we can consider to encrypt the database, only client app have the password to open the database stored in the server. (
  7. flashang


    after reading reply from @FlierMate, a "ambiguous numeric format ..." message come out ... Did you mean: "0b10" "0d10" "0x10" 😅 😱
  8. When you login to a system, e.g. gmail, facebook, banking web site, ... the system will ask for username and password. The username could be your email, phone number, "username", IC, staff code, ... If a user forget their password and try do to a password recovery, system need to know "who" or technically "which account". so the system will ask "what is your username / email / phone / blah blah blah". and the "password recovery link with special key code" for recovery password will send to user "registered contact" which is either email or phone. without th
  9. For Account recovery feature, it should be done by machine (user send request, machine sent verify code, user enter verify code). No one shall interact with this process, and system shall not give any email / phone number except user himself / herself. (only when user call / email to support team, then they'll get the contact info) for MFA (most common are 2FA), the server which sent the verify code (sms / email), this feature shall be only access by process. This sms / email server should be one of the high sensitive server, which handle incoming / outgoing message.
  10. the easiest come out after reading this is to use preg to remove < anything include / > 🙂
  11. p/s : once you upload data on the Internet, you are facing the risk of data leaking. company who concern about ta security will setup their own servers, only access via VPN. only non critical / non core secret services on cloud. 🙂
  12. that's why some company spend a lot of money to maintain offline system which does not connect to network to handles sensitive data. other solution is to use internal database with encryption and user only permitted to access via middle way / stored procedures, with 'content level' permission. 🙂
  13. These are some of my humble opinion : All items may sort by category - alphabet and CamelCase unless is shortform, with meaningful description. e.g. CLI - Console Application Web - PWA (Progressive Web Apps) Web - Web Application * not sure should these 2 web group as one, as more web app are modified to PWA. For some category which might create confusion may need more description : e.g. Cloud App - Web ? Mobile App ? Desktop App ? For Languages, may be group by "Technology / Set / Usage", should treat all framework in same group : ASP.NET - C# / F# /
  14. flashang

    Path finding algorithm

    Try to do a simple compare. dataList = [ {"x1":36, "x2":73}, {"x1":83, "x2":121}, {"x1":39, "x2":77}, {"x1":87, "x2":125}, {"x1":59, "x2":96} ] def overlap( item, arr ): for x in arr : if item == x: continue # assume there is no duplicate in arr #1 a.x1 <= b.x1 <= a.x2 if item['x1'] <= x['x1'] and x['x1'] <= item['x2'] : print( item, ' is overlap with ', x , ' case 1' ) #1 a.x1 <= b.x2 <= a.x2 if item['x1'] <= x['x2'] and x['x2'] <= item['x2'] : print( item, ' is ov
  15. after do some search for "f09fa497" hugging face (U+1F917) you can just do a "convert" from "\\xF0\\x9F\\xA4\\x97" to "%F0%9F%A4%97" // reference // https://stackoverflow.com/questions/66868729/javascript-decode-hex-string-with-backslash function decode( code ) { var decode = decodeURIComponent( code.replace(/\\x/g, '%')); console.log( code ); console.log( decodeURIComponent( decode ) ); } function test() { var i = 0; var text = ""; var code = ""; for (i = 151; i <= 152; i++) { code = "\\xf0\\x9f\\xa4\\x" + i.toString
  • Create New...