I am taking Magento courses in Adobe commerce, but finding it difficult to follow the code structure. I am basically a OOPS and SQL developer so not that familiar with latest front end technologies. Can someone help which basic courses I should take before continuing with Adobe training. I am mainly struggling to understand the folder / file structures and how each of these files relate to each other.
Super User is a question and answer site for computer enthusiasts and power users. It only takes a minute to sign up.
Sign up to join this community
Anybody can ask a question
Anybody can answer
The best answers are voted up and rise to the top
Docker is going to start charging for Docker Desktop for medium and large companies. This can cost up to $21/mo per developer.
What can I use to run docker containers on a windows personal desktop for development purposes that won’t cost money per developer?
I downloaded an APN certificate from Certificates, Identifiers & Profiles from the Apple Developer configuration pane. It’s an
.action file that I cannot open, though.
Do you want to install the “downloadCertificateContent” action?
Actions are the components of Automator workflows. Installing this action will make it available in the Automator library.
Action could not be installed.
The action “downloadCertificateContent” was not loaded because it is from an unidentified developer.
I already enabled Third Party Actions in the Automator preferences:
Third Party Automator Actions
Enable Automator Actions from Third Parties
I downloaded it from here:
What the heck is going on? Why is the action from an unidentified developer in the first place? The developer should be Apple. What are they doing, again?
Hello I am a software developer having a good years of experience in this field am also working with a team of expert I we be your software developer bring your project let get it done thanks
If you’re looking to expand your business in telegram, hit me up there (ys0seri0us)
Also, want to do promotion? I can give a shoutout in all of my bots (check portfolio)
smallest width is inversely proportional to the PPI setting (called
ro.sf.lcd_density) that is specified in the file
/system/build.prop. Meaning higher numbers for
smallest width correspond to lower numbers for
ro.sf.lcd_density specifies the UI ‘density’: for lower numbers, it will render the same UI element using fewer pixels, making it smaller.
The upside of rendering the UI smaller is that it’s just like using a higher resolution (or lower DPI setting) on a desktop computer: you have more space to put everything because smaller things means you can fit more of those things on your screen.
The downside is that the smaller UI makes it harder to read for people having difficulties reading small fonts or discerning small details.
Another downside is that your touches need to be very precise to hit the smaller UI elements. Unfortunately the resolution of the hardware touch-sensors doesn’t scale along, so very precise touches are not that easy to achieve consistently, thus putting a lower limit to
ro.sf.lcd_density for what you can comfortably use daily.
This is written in swift, it’s open source and you can check out the source code to get an idea of what’s happening:
But as I’m coming to understand it myself, I’ll attempt to summarize. You need to have a seed (a random number as a starting point) of sufficient entropy, or randomness, that’s 2^256 bits long or 10^77, so pretty hard to repeat. Not every random number generator is actually random, for example some kinds of random are repeatable and are great for applications where you need to replicate results. But in this case you want to make it difficult to replicate. Every OS would have it’s own set of random number generator syscalls that may or may not be random enough to be cryptographically secure, so you’d have to check the docs on whatever you use to ensure it’s secure enough.
Generating mnemonic phrases is a little trickier. BIP-39 is the standard for implementing mnemonics in Bitcoin. This methods inserts bits of randomness, and then pulls some of the numbers out and selects the number pulled from an index of a vocabulary wordlist, hence generating the mnemonic phrase. It seems as if this is not quite as secure as a completely random key generated from sufficient entropy, as the possibilities is reduced from 2^256 to 2^132. Still pretty difficult to repeat though. See the following to understand how difficult this is to crack:
So to generate a private key that can be restored via mnemonic phrase, it must be BIP-39 compatible.
Rather than trying to recreate all this functionality from scratch, which I wouldn’t be able to explain succinctly, you could take advantage of libwally, or utilize the BC libraries or peruse them for your own learning/replication.
How do we give access to some APIs with different levels of security?
I’m currently at a company where we have established a set of approved patterns of external exposure. In practice this means that users connect to the internal services from the internet through a BigIP proxy, which is federated with an AzureAD application registration.
The AzureAD AR is set up with conditional access and requires MFA for granting access tokens, which then only have a lifetime of 10 minutes. Since the BigIP server can fetch new tokens invisibly from AzureAD as long as the session is valid using a refresh token, this works fine for access from web browsers.
Now, it turns out that at least one of the services we wish to expose this way has an API that until this day has been open, as in no security at all, since it has only ever been exposed if the users were on VPN or physically connected to the servers network. During this period, several of the users have written small scripts to interact with the API for both fetching and changing data.
Now, the problem arises; the API needs protection when we are exposing it to the internet. However, even if we could generate a token at AzureAD from command line, it would time out very quickly. Optimally, we’d like for the users to identify themselves with MFA at most once per day for this API.
I’m open to creating a new script, if that would help, just point me in the right direction.
I’ve seen solutions for something like this, where a command line tool has opened a web browser, triggered a login and received the token through some back channel (google or aws tools come to mind). Anyone know how that’s done?
So, is it possible to support this use case? Any ideas?
I was a Webfaction user for years. That suited me well. Now that they are closing down, I need something similar.
I am not a reseller of websites. I do create multiple websites, and develop prototype websites for clients using Python.
Some apps I host to support my customers: mantis for bug reporting, wordpress for documentation type sites, and of course, my own prototypes.
I do need FTP for publishers to send files to me (I handle data conversion for a client who is a multi-journal publisher and many journals require FTP) and for my own use when needed to load data.
I am mainly a Python developer, but also interested in experimenting with other web technologies.
I am also a photographer, and would like to transfer some of my sites with my photography there.
Not looking to spend too much. Webfaction was quite affordable at less than $10 per month. Something around that would be good, including as much storage as I can get for that price!
Thanks in advance.