magento2 – Magento 2 Developer Training Prerequisite

I am taking Magento courses in Adobe commerce, but finding it difficult to follow the code structure. I am basically a OOPS and SQL developer so not that familiar with latest front end technologies. Can someone help which basic courses I should take before continuing with Adobe training. I am mainly struggling to understand the folder / file structures and how each of these files relate to each other.

What can I use to run docker containers on windows that won’t cost money per developer?

What can I use to run docker containers on windows that won’t cost money per developer? – Super User

macos – How to install an Automator action from unidentified developer?

I downloaded an APN certificate from Certificates, Identifiers & Profiles from the Apple Developer configuration pane. It’s an .action file that I cannot open, though.

Action Installer

Do you want to install the “downloadCertificateContent” action?

Actions are the components of Automator workflows. Installing this action will make it available in the Automator library.

Action Installer Error

Action could not be installed.

The action “downloadCertificateContent” was not loaded because it is from an unidentified developer.

I already enabled Third Party Actions in the Automator preferences:

Automator Third Party Action Preferences

Third Party Automator Actions

Enable Automator Actions from Third Parties

I downloaded it from here:

Certificates, Identifiers & Profiles certificate download page

What the heck is going on? Why is the action from an unidentified developer in the first place? The developer should be Apple. What are they doing, again?

Algorithms That Every Developer Should Know


What does Smallest width in Developer settings mean?

The propery smallest width is inversely proportional to the PPI setting (called ro.sf.lcd_density) that is specified in the file /system/build.prop. Meaning higher numbers for smallest width correspond to lower numbers for ro.sf.lcd_density.

The property ro.sf.lcd_density specifies the UI ‘density’: for lower numbers, it will render the same UI element using fewer pixels, making it smaller.

The upside of rendering the UI smaller is that it’s just like using a higher resolution (or lower DPI setting) on a desktop computer: you have more space to put everything because smaller things means you can fit more of those things on your screen.

The downside is that the smaller UI makes it harder to read for people having difficulties reading small fonts or discerning small details.

Another downside is that your touches need to be very precise to hit the smaller UI elements. Unfortunately the resolution of the hardware touch-sensors doesn’t scale along, so very precise touches are not that easy to achieve consistently, thus putting a lower limit to ro.sf.lcd_density for what you can comfortably use daily.

As a developer, what steps do I need to take to generate private-public keys?

This is written in swift, it’s open source and you can check out the source code to get an idea of what’s happening:

But as I’m coming to understand it myself, I’ll attempt to summarize. You need to have a seed (a random number as a starting point) of sufficient entropy, or randomness, that’s 2^256 bits long or 10^77, so pretty hard to repeat. Not every random number generator is actually random, for example some kinds of random are repeatable and are great for applications where you need to replicate results. But in this case you want to make it difficult to replicate. Every OS would have it’s own set of random number generator syscalls that may or may not be random enough to be cryptographically secure, so you’d have to check the docs on whatever you use to ensure it’s secure enough.

Generating mnemonic phrases is a little trickier. BIP-39 is the standard for implementing mnemonics in Bitcoin. This methods inserts bits of randomness, and then pulls some of the numbers out and selects the number pulled from an index of a vocabulary wordlist, hence generating the mnemonic phrase. It seems as if this is not quite as secure as a completely random key generated from sufficient entropy, as the possibilities is reduced from 2^256 to 2^132. Still pretty difficult to repeat though. See the following to understand how difficult this is to crack:

So to generate a private key that can be restored via mnemonic phrase, it must be BIP-39 compatible.

Rather than trying to recreate all this functionality from scratch, which I wouldn’t be able to explain succinctly, you could take advantage of libwally, or utilize the BC libraries or peruse them for your own learning/replication.

azure – MFA and developer access

How do we give access to some APIs with different levels of security?

I’m currently at a company where we have established a set of approved patterns of external exposure. In practice this means that users connect to the internal services from the internet through a BigIP proxy, which is federated with an AzureAD application registration.
The AzureAD AR is set up with conditional access and requires MFA for granting access tokens, which then only have a lifetime of 10 minutes. Since the BigIP server can fetch new tokens invisibly from AzureAD as long as the session is valid using a refresh token, this works fine for access from web browsers.

Now, it turns out that at least one of the services we wish to expose this way has an API that until this day has been open, as in no security at all, since it has only ever been exposed if the users were on VPN or physically connected to the servers network. During this period, several of the users have written small scripts to interact with the API for both fetching and changing data.

Now, the problem arises; the API needs protection when we are exposing it to the internet. However, even if we could generate a token at AzureAD from command line, it would time out very quickly. Optimally, we’d like for the users to identify themselves with MFA at most once per day for this API.

I’m open to creating a new script, if that would help, just point me in the right direction.

I’ve seen solutions for something like this, where a command line tool has opened a web browser, triggered a login and received the token through some back channel (google or aws tools come to mind). Anyone know how that’s done?

So, is it possible to support this use case? Any ideas?

Developer Hosting | Web Hosting Talk

I was a Webfaction user for years. That suited me well. Now that they are closing down, I need something similar.

I am not a reseller of websites. I do create multiple websites, and develop prototype websites for clients using Python.

Some apps I host to support my customers: mantis for bug reporting, wordpress for documentation type sites, and of course, my own prototypes.

I do need FTP for publishers to send files to me (I handle data conversion for a client who is a multi-journal publisher and many journals require FTP) and for my own use when needed to load data.

I am mainly a Python developer, but also interested in experimenting with other web technologies.

I am also a photographer, and would like to transfer some of my sites with my photography there.

Not looking to spend too much. Webfaction was quite affordable at less than $10 per month. Something around that would be good, including as much storage as I can get for that price!

Thanks in advance.

DreamProxies - Cheapest USA Elite Private Proxies 100 Cheapest USA Private Proxies Buy 200 Cheap USA Private Proxies 400 Best Private Proxies Cheap 1000 USA Private Proxies 2000 USA Private Proxies 5000 Cheap USA Private Proxies - Buy Cheap Private Proxies Buy 50 Private Proxies Buy 100 Private Proxies Buy 200 Private Proxies Buy 500 Private Proxies Buy 1000 Private Proxies Buy 2000 Private Proxies New Proxy Lists Every Day Buy Quality Private Proxies