lubuntu – Defines the File Manager drop action when the modifier key is pressed

When I drag a file from one file manager window to another, the file is moved from the source folder to the destination folder. If I keep the control key pressed, the file will be copied. If I hold down the Shift key, the file will also be moved. If you hold down the Alt key, the window moves instead, so I ignore this case.

I'd like to change this behavior to run a script of my choice that retrieves the source path / file and the destination path if the Shift key is held down when the file is dropped. Alternatively, it would work if I could copy the path on the source page from the menu or with the keyboard shortcut (for example, Ctrl + C) and then have a menu option / keyboard shortcut that performs the action in the destination window.

My main use (but not only) will be doing things like creating hard / soft links.

I use PCManFM under LUbuntu 18.04, but if another file manager is the only way, that's okay too.

u2f – Does the injection of my own key material into the authenticator undermine the authentication of the authenticator?

I want to be able to insert my own key material into the FIDO2 Authenticator. At least, there is no need to trust the seller (as we can not guarantee that the seller will keep copies of the keys for himself, at the request of the government or for any other reason).

Therefore, I believe that it would be very valuable for customers to be able to define their own key material.

Yubico, however, argues that if they allow it, "Undermine device authentication, which is likely to exclude these authenticators from high-security applications such as financial institutions".

I do not know exactly the rules in this area, so my main question is: if that's true, I'm struggling to understand why, by setting my own key material (and thus improving my personal safety), I would disqualify the authenticator being used.

Also it looks a bit ironic these days financial institutions tend to trust SMS and not U2F, although SMS is far from secure. However, I hope that this will change someday.

The discussion takes place here: Extension of the WebAuthn recovery credentials

Encryption – Storage of SSL private key in Load Balancer VS HSM

I have a setup that stops the SSL certificates on the load balancer (ie Load Balancer to the web server is in plain text). To perform the SSL termination, the private key is stored in the load balancer itself. I have an HSM in a data center.

Security people told me that the best course of action is to store the private key in an HSM.

I read Should SSL be terminated on a load balancer? and I understand that there's nothing wrong with stopping the SSL encryption on the Load Balancer.

However, must the private keys be self-paced (for security reasons)? Are there any technical issues with saving private SSL keys in a centralized HSM?

Convert the key to a value in the nested-join record

Let's say I have one Dataset consisting of nested Associations (in this case created by a Query) and I want to convert the first sentence of Keys in Values, Is there a way to do this without dropping it? Keyscreate a new column and then Join the two together?

Consider the following example where I take that Mean Age by sex and class of passengers in the Titanic ExampleData:

data=ExampleData({"Dataset", "Titanic"})(GroupBy("class"), 
 GroupBy("sex") /* KeySort, Mean, #age &)

Example record

Here is what I am looking for:

Enter image description here

And I can get it with this code:

final = Join(AssociationThread("class" -> #) & /@ Keys(data), 
  Values(data), 2)

The solution, however, seems to be more than necessary. Is there simpler / more elegant code that I neglect?

postgresql – Updates the name of the dynamic column with the key from the jsonb argument in PG 12

I want to write a generic procedure for Postgres 12 that updates the columns of a table depending on which data is provided in a jsonb Dispute. Of course it could also be in the application logic, but I try to move as much code as possible to the DB level.

That's the kind of thing I naively hoped would work:

CREATE PROCEDURE record_event(
  foo_arg integer,
  name_arg text,
  data_arg jsonb,
  occurred_at_arg timestamptz
AS $$
DECLARE column_name text;
  -- This part is incidental:
  INSERT INTO foo_event(foo, name, data, occurred_at)
    VALUES(foo_arg, name_arg, data_arg, occurred_at_arg);

  -- This is the part I'm struggling with:
  FOR column_name IN (SELECT * FROM jsonb_object_keys(data_arg)) LOOP
    PREPARE update_query(text, text, integer) AS
      UPDATE foo SET $1 = $2 WHERE id = $3;
    EXECUTE update_query(column_name, data_arg->>column_name, foo_arg);
$$ LANGUAGE plpgsql;

But pg does not like $1 in this position:

psql:src/db/migrations/foo/up.sql:43: ERROR:  syntax error at or near "$1"
LINE 15:       UPDATE foo SET $1 = $2 WHERE id = $3;

I also noticed that there is one json_populate_record() Feature that seems helpful here, but I do not really understand how to apply it to my situation from the documentation.

Does what I am trying make sense and is it possible?

SSH public key sign-on for users who do not (yet) exist

How can I configure under Linux (eg Ubuntu 18.04)? sshd Allow public key sign-on for operating system users that do not already exist?

For example:

  1. On the server: / etc / ssh / sshd_config has AuthorizedKeysFile: /etc/ssh/keys/%u

  2. sudo mkdir -p /etc/ssh/keys

  3. sudo tee /etc/ssh/keys/foo <<< "$(cat"

  4. sudo systemctl restart sshd

  5. On the client: ssh foo @ server

In this scenario, the server does NOT have one foo Account in /etc/passwdbut I want to create one automatically and then use it pam_mkhomedir to create its home directory - all because the user can successfully authenticate with a public key.

My attempt:

  1. /etc/pam.d/sshd comment out @include common-auth (does not make any difference as public keys bypass this anyway)

  2. /etc/pam.d/sshd comment out @include common-account

  3. /etc/ssh/sshd_config LogLevel: DEBUG3 shows

debug1: matching key found
debug3: mm_answer_keyallowed: key is allowed
debug3: PAM: do_pam_account pam_acct_mgmt = 6 (Permission denied)

Install the Norton Setup product key and Norton

Norton is the best antivirus that protects devices against viruses, threats, trojans and tricks. protects your data and devices from viruses. This software can be used for Android, PC and Mac. After downloading this antivirus, you must enter the product key. You can download this software from Then enter your Norton Setup product key.

Javascript – How to hide a KEY API

I'm bringing an app with me VueJS and fire baseNevertheless, I have the configuration of Firebase and its KEY API in a javascript file, which I import to myself App.vueand will be uploaded to a server in Netlify.

I searched the internet and found that it compromised the security of the app. However, I can not figure out where to store it. What can I do

Lock – RangeI-N key lock compatibility in SQL Server

The documentation states that the RangeI-N lock (insert range, zero resource lock, used to test ranges before inserting a new key into an index) is self-compatible (see Compatibility Matrix), although a transaction A RangeI has -N lock on a particular key Another transaction can also receive such a lock.

Below that is the

When you include a value in a transaction, the range of values ​​decreases
into must not be locked for the duration of the transaction
Perform the insert operation. Lock the entered key value until
The end of the transaction is enough to maintain serializability.
Example of this INSERT statement:

INSERT mytable VALUES (& # 39; Dan & # 39;);

The RangeI N-mode keyguard is placed on the index entry
according to the name David, to test the area. If the lock is
Granted, Dan will be added and an exclusive (X) lock will be added to the
Value Dan. The RangeI-N key lock is only required for testing
the range and is not held for the duration of the transaction
Perform the insert operation. Other transactions can or insert
Delete values ​​before or after the entered value Dan. But none
Transaction attempting to read, insert, or delete the value
be locked until the inserting transaction is either committed or rolled

Quoting another source – Microsoft SQL Server 2008 internals: transactions and concurrency:

For example, the RangeIn Null lock is obtained from SQL Server
tries to insert in the area between the keys of a session
Serializable isolation. This type of lock is not often seen because of it
is usually very temporary. It is only held until it is true
The insertion location is found and the lock is converted to
an X lock.

I understand that this type of lock is while identifying the area in which the newly introduced key should be placed (I suppose that's what "testing area" means). In this case, the lock is released, the new key is inserted, and an X lock is placed.

However, I do not see how two RangeI-N locks are compatible with each other. If transactions A and B both set a RangeI-N lock on the same key because both want to insert a new key into the range and transaction A performs the insertion first, then the key insertion position specified by B may already be incorrect because The ranges have changed (A has added a new value there). Could someone explain that?