postgresql – pg_restore: [archiver] The magic string was not found in the file header: Check the source URL and make sure it's public

I tried to transfer a snapshot file from my local Postgrel database (which I uploaded to Google Drive and which is publicly accessible) to my remote Heroku database with the following URL:

heroku pg:backups:restore '' DATABASE_URL

I'm already logged into my Heroku app through the terminal I'm running the command on.
but I got the same mistake twice. I searched online and found threads like pg_restore: (archiver) did not find a magic string in the file header, but I could not help linking the two, since I'm two very new postgrel. I hope you draw my attention to the problems. Very appreciated.

Starting restore of to postgresql-symmetrical-52186... done

Stop a running restore with heroku pg:backups:cancel.

Restoring... !
▸    An error occurred and the backup did not finish.
▸    waiting for restore to complete
▸    pg_restore finished with errors
▸    waiting for download to complete
▸    download finished with errors
▸    please check the source URL and ensure it is publicly accessible
▸    Run heroku pg:backups:info r002 for more details.

=== Backup r002
Database:         BACKUP
Started at:       2019-09-14 21:14:26 +0000
Finished at:      2019-09-14 21:14:27 +0000
Status:           Failed
Type:             Manual
Backup Size:      0.00B (0% compression)

=== Backup Logs
2019-09-14 21:14:27 +0000 pg_restore: (archiver) did not find magic string in file header
2019-09-14 21:14:27 +0000 waiting for restore to complete
2019-09-14 21:14:27 +0000 pg_restore finished with errors
2019-09-14 21:14:27 +0000 waiting for download to complete
2019-09-14 21:14:27 +0000 download finished with errors
2019-09-14 21:14:27 +0000 please check the source URL and ensure it is publicly accessible

tls – Additional Encryption of SSL Certificate and Public Key before Handshake?

I'm currently working on a security-based product (VPN) and we have an important requirement that I can not figure out.

The connection between the user and the VPN server is based on the OTP algorithm (one-time pad) and I also have SSL on the server.

At the SSL handshake level, the certificate is sent to the client for review. But we also want to encrypt the certificate with OTP before it is sent over the network.

The client is an iOS app. I am also looking for a solution to have the OTP encrypted certificate first validated at the device level before it is validated by the SSL handshake. It's an extra level of security we want to integrate.

Any idea how I can do that? As far as I know, the SSL handshake is an automated process and can not be controlled.

Import the public Multisig address generated by Bitcoin Core into the electrum Multisig wallet for clock (2/3) and characters (1/3).

I have 3 machines and want to create (2/3) Multisig Wallet. Sign safely with other machines.

I have;
xpub1, xpub2, xpub3
xpriv1, xpriv2, xpriv3

Machine 1: in electrum:

New / Restore-> Multisig Wallet-> Use a passkey-> 2 / 3->
Cosigner1: xpriv1, cosigner2: xpub2, cosigner3: xpub3,

to view (2/3) Multisig Wallet and partial signing of (1/3).

How do I import machine 2 generated public addresses for Watch (2/3) and partial signing (1/3) after Machine 1?

The Electrum Wallet database looks like json-formatted. Do I have to enter it manually?(json("addresses"->"receiving")) or another way to import a corresponding address

wpa enterprise – I came across this network where public ip = local ip

By that I mean that when I type in ifconfig I get the same thing when I use an online website to get my public IP address. (like

It is a WPA2 Enterprise MGT network. (it needs both a username and password to log in)

All that appears on Wireshark are ARP Brodcasts, which I assume to be the DNS server. I tried running responder in analysis mode, which warned me that I was out of the subnet and could use ICMP redirection on the network (this message was displayed three times and different IP addresses were displayed each time.) After that it was all over nothing is displayed. I can still do a NetB scan to see other devices on my subnet (/ 24 does not supply anything while / 16 displays a bunch of computers).

Can you help me to identify this network? I would be very happy about your help! – Images in my WordPress are not updated for public viewers of my site

This is the view from my page:
This is what it looks like when I am logged out or someone else displays it:


These are feature images of my posts that I have exchanged using the Activate Image Replacement plugin.

I do not use caching on my WordPress site. I tried switching plugins on and off, switched between topics, and asked my hosting to delete any kind of server-side cache.

If you open the image on a new tab, the old view will be displayed. However, if you refresh it, the view will be refreshed.

Just visit this link:×200.png

When you refresh it, the picture changes.

Please help me with this problem.

Jump Box DNS in public

We have a jump box that allows people to connect to the system through SSH.

Would it be a security risk if you add a public DNS record pointing to the jump field? (Would not that be safety through darkness?)

Assuming that our system is hardened, a DNS entry in the jump box is really nothing wrong.

bitcoin core – How do I determine the descriptor of a particular extended public key?

I try to manage that bitcoin-cli getdescriptorinfo on one ypub... extended public key. Every time I do that, I get the message:

error code: -5
error message:
Invalid descriptor

How can I find the right descriptor for a particular ypub?

I'm trying to derive the addresses with Bitcoin Core and import them into my wallet. I'm pretty new to using Bitcoin Core, so I'm not even sure if this is the best way to do it. If not, what other method could I use?

Never make public members virtual / abstract – really?

In the 2000s, a colleague told me that it was an anti-pattern to make public methods virtual or abstract.

For example, he considered a class like this not well designed:

public abstract class PublicAbstractOrVirtual
  public abstract void Method1(string argument);

  public virtual void Method2(string argument)
    if (argument == null) throw new ArgumentNullException(nameof(argument));
    // default implementation

He said that

  • the developer of a derived class that implements Method1 and overrides Method2 must repeat the argument validation.
  • if the developer of the base class decides to add something to the customizable part of Method1 or Method2 later he can not do it.

Instead, my colleague suggested this approach:

public abstract class ProtectedAbstractOrVirtual
  public void Method1(string argument)
    if (argument == null) throw new ArgumentNullException(nameof(argument));

  public void Method2(string argument)
    if (argument == null) throw new ArgumentNullException(nameof(argument));

  protected abstract void Method1Core(string argument);

  protected virtual void Method2Core(string argument)
    // default implementation

He told me that making public methods (or properties) virtual or abstract is just as bad as making fields public. If you include fields in properties, you can later intercept access to these fields as needed. The same applies to public virtual / abstract members: pack them as shown in the picture ProtectedAbstractOrVirtual With class the base class developer can intercept all calls of the virtual / abstract methods.

But I do not see that as a design policy. Even Microsoft does not follow this: look at that Stream Class to check this.

What do you think of this policy? Does it make any sense or do you think it overcomplicates the API?

Why is no security lost when using 32-byte public keys in Schnorr signatures instead of 33?

Currently, the mailing list discusses how to break the 33rd byte of public keys when used in bip-schnorr.

Public keys are (x, y) Coordinates and compressed public keys simply replace the y Coordinate with a single byte indicating its strangeness. The whole y The coordinate can then be derived from the given one x Coordinate, and so the public key can be expressed in only 33 bytes instead of 64.

By removing the "oddness" byte, public keys are only expressed by the "oddness" symbol x coordinate, that is, there is two possible points on the curve that could be represented. This also implies that the same public key could actually be derived only with x coordinates two different private keys.

My question is why this does not affect the security assumptions of the Schnorr signature. Is it just a subtle effect, like replacing 256-bit security with 255-bit security? – 20000+ rotating public and private proxies

Fast HTTP and SOCKS5 back-connect proxies

With instant setup

Get unlimited access to over 20,000 public and private proxies


– Super fast server

– HTTP and SOCKS5 proxies

– Unlimited bandwidth

– USA EU ASIA WordWide Proxies

– Multiple subnets

– Immediate delivery

– These proxies switch to a new proxy every 3-10 minutes

– GEOlocation filter

– China Proxy Filter

– 4 access IPs.


50 backconnect ports – $ 50

100 backconnect ports – $ 100

200 backconnect ports – $ 180

Special price for GSA members: 30% discount on the life

Please post "I want 30% coupon code" in this thread and I will send code to your PM inbox.

If you have further questions, do not hesitate to contact us!


E-mail –

refund policy

We offer a 48-hour Money Back Guarantee on your first purchase so you can test our service.