Distributed message queue, propagating queue leader/follower information

I’m designing a distributed queue message queue and I’m not sure how to get the leader information to another component. This is my current design:

distributed message queue

I have the following components:

  • FrontEnd: request validation, authentication, SSL offloading, server-side encryption, etc
  • Metadata Service: keeps queue metadata information
  • BackEnd Nodes: store messages. For each queue, we’ll have one leader and several followers for replication
  • Node Manager (for instance Zookeeper or etcd): takes care of leader/follower coordination in the BackEnd cluster

The picture shows the flow to handle a client request. The FrontEnd does the initial request processing and queries the Metadata Service to find out the leader for the given queue, and forwards the message to the corresponding leader.

My problems are with the Metadata Service. How should it fetch queue leader information? Directly querying/connecting to the Node Manager or should I introduce anoter component instead? Or should I get rid of the Metadata Service altogether and have the FrontEnd directly querying the Node Manager? The problem with the last option is that I still would need somewhere to store queue metadata information like creation date.

security – How can I access a website without it being able to determine any information about my device and network?

Phone is rooted

Basically I want to be able to access a website without it being able to determine any of the things it dermined about me (my device, ip address etc) when I accessed it last, no matter how advanced of a tracking mechanism it uses.

I want it to seem as if it is being accessed from a different device, completely unrelated to the device which I accessed it from previously. No connection between the two could be made.

An app called XprivacyLuna through Xposed comes to mind, but not sure if it could get around fingerprinting.

kernel – How to get information about segments of physical memory not described in System.map on linux

Your System.map file contains virtual addresses of static symbols of the table. It is not a physical memory map of your system. The virtual memory space is not contiguous and can have large holes in it, the specific layout depends on choices made by the kernel developers. On x86_64 bit linux, negative addresses (i.e. those with the high bits set, such as 0xffffffff81000000) are reserved by the kernel for kernel mode. Check out the Linux x86 memory map for more information on how the kernel lays out its virtual memory space.

If you want more information on what’s where in the kernel, the kernel exposes its symbol table to the root user if it’s compiled with the KALLSYMS option in /proc/kallsyms. There’s a detailed explanation of the difference between /proc/kallsyms and System.map in this question.

Finally, if you are interested in the physical memory map of the system, that is provided by the BIOS or UEFI to the system on boot. Your kernel logs this to the kernel message buffer (which you can query using dmesg) pretty early on in the boot:

(    0.000000) BIOS-provided physical RAM map:
(    0.000000)  BIOS-e820: 0000000000000000 - 0000000000098c00 (usable)
(    0.000000)  BIOS-e820: 0000000000098c00 - 00000000000a0000 (reserved)
(    0.000000)  BIOS-e820: 00000000000e6000 - 0000000000100000 (reserved)
(    0.000000)  BIOS-e820: 0000000000100000 - 00000000bfea0000 (usable)
(    0.000000)  BIOS-e820: 00000000bfeae000 - 00000000bfeb0000 type 9
(    0.000000)  BIOS-e820: 00000000bfeb0000 - 00000000bfec0000 (ACPI data)
(    0.000000)  BIOS-e820: 00000000bfec0000 - 00000000bfef0000 (ACPI NVS)
(    0.000000)  BIOS-e820: 00000000bfef0000 - 00000000c0000000 (reserved)
(    0.000000)  BIOS-e820: 00000000ffc00000 - 0000000100000000 (reserved)
(    0.000000)  BIOS-e820: 0000000100000000 - 0000000c40000000 (usable)

You can find this information at runtime in /sys/firmware/memmap.

Information marketing or affiliate marketing which one is better? | Proxies-free

I started information marketing business some-time ago but some of the content I submit to search engine dosn’t generate enough traffic and just few sell and order is been made.

But someone recently introduce to me affiliate marketing where you sell someone product to get a commission but from the research I conducted this business need money and traffic to produce money,should I continue with my information marketing business or swap to affiliate marketing which one is the better.

privacy – Impact of the System Information Leak

Here, The application stored **e.printstacktrace()** in a log file, which is accessible to a specific user group, we need such detailed information for debugging purposes.

As per the security team, they are provoking us to remove such detailed system information from the log file, So here my question is about how it will affect the security of the application.

Thanks in advanced

http – How to extract useful information from a extensive output?

~$ sudo nmap -dd -A -6 -T5 --open wwww.url_site.com

That gives an output of almost 2000 lines. So, from a more experienced user: what should I look for?

My intention was to find open ports with vulnerable services.

dd – I assume that debugging was make it easier to understand

A – It seems useful all the times.

-t5 – It was the fastest option

IPv6 – Since it’s more modern than IPv4

office 365 developer – How do i connect Sharepoint online List “More than that as well” with Salesforce for exchange of information

Stack Exchange Network

Stack Exchange network consists of 176 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

Is using Google Forms to share “passcode protected” information safe from brute force attacks?

I have recently seen many people use Google Forms as a way of sharing “passcode protected” information. They seem to have the first section of the form with a required field asking for a short piece of text (the “password”), and if the inputted text does not exactly match the required text, it gives you a custom error message telling you the “password” is incorrect. The second section of the form is the secret information, which you can’t see until you put in the correct “password” from the first form section. You don’t log in with a Google account either.

I’ve seen many schools use this as a way to share Zoom Meeting IDs and passwords with students. While it superficially seems to work well enough for most people, is this really a safe way of protecting private information? For example, are people who use Google forms to passcode protect information safe from things such as brute-force attacks? I’m fairly sure the “passwords” being used aren’t strong either.