
Registered since September 28th, 2017
Has a total of 4246 bookmarks.
Showing top Tags within 8 bookmarks
howto information development guide reference administration design website software solution service product online business uk tool company linux code server system application web list video marine create data experience description tutorial explanation technology build blog article learn world project boat download windows security lookup free performance javascript technical network control beautiful support london tools course file research purchase library programming image youtube example php construction html opensource quality install community computer profile feature power browser music platform mobile user process work database share manage hardware professional buy industry internet dance advice installation developer 3d search access customer travel camera material test standard review documentation css money engineering develop webdesign engine device photography digital api speed source program management phone discussion question event client story simple water marketing app yacht content setup package fast idea interface account communication cheap compare script study market live easy google resource operation startup monitor training
Tag selected: integrity.
Looking up integrity tag. Showing 8 results. Clear
Saved by uncleflo on February 9th, 2022.
One of the oldest social and charitable organisations in the world, Freemasonry's roots lie in the traditions of the medieval stonemasons who built our cathedrals and castles. It is here that a number of the famous elements of Freemasonry find their roots. In the medieval era, stonemasons often travelled around to find work in different locations. To demonstrate their level of qualification, they would use grips, words and signs in order to distinguish themselves from unqualified builders. Freemasonry uses building analogies to teach members how to lead productive lives that benefit the communities that they live in. In the medieval era, stonemasons wore aprons and gloves to protect themselves while working on shaping rough pieces of stone, but in today’s society Freemasons meet to build friendships and communities rather than cathedrals and castles. For Freemasons, there are four important values that help define their path through life: Integrity, Friendship, Respect and Charity. In today’s world filled with uncertainty, these principles ring as true now as they have at any point in the organisation’s history.
together freemason strength wise admittance acknowledgement lodge kindness fortunate charitable castle masonic integrity undertake uncertain apprentice productive collective divide demonstrate welcome medieval ceremony distinguish roots completion organisation world tradition cathedral distinguis live community value
Saved by uncleflo on April 10th, 2021.
JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA. Although JWTs can be encrypted to also provide secrecy between parties, we will focus on signed tokens. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties. When tokens are signed using public/private key pairs, the signature also certifies that only the party holding the private key is the one that signed it.
token secure header verify authorization authentication credentials apis schema signature algorithm user browser resistant secret standard transmit information json object hmac key integrity web introduction development administration api check identity
Saved by uncleflo on July 10th, 2017.
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic libraries such as OpenSSL. Specifically, this paper analyzes the security impact of the following NaCl features: no data flow from secrets to load addresses; no data flow from secrets to branch conditions; no padding oracles; centralizing randomness; avoiding unnecessary randomness; extremely high speed; and cryptographic primitives chosen conservatively in light of the cryptanalytic literature.
confidentiality integrity speed simplicity security simple integral performance confidential secure library hash salt implement paper academic review analysis feature explanation read article
Saved by uncleflo on May 15th, 2017.
De Autoriteit voor Financiële Diensten en Markten streeft naar een eerlijke en correcte behandeling van de financiële consument en naar integere financiële markten. De verschillende actoren in de Belgische financiële sector staan, voor diverse aspecten, onder permanent toezicht om de stabiliteit van en het vertrouwen in de financiële markten en een loyale, billijke en professionele behandeling van de beleggers en financiële consumenten te waarborgen. Dit toezicht verloopt volgens het "Twin Peaks"-model of tweepolig model met twee autonome toezichthouders, namelijk de Nationale Bank van België en de Autoriteit voor Financiële Diensten en Markten, kort FSMA, die elk specifieke doelstellingen nastreven. De FSMA staat in voor het toezicht op de financiële markten en de informatie van ondernemingen, op bepaalde categorieën financiële dienstverleners en tussenpersonen, op de naleving van gedragsregels door de financiële bemiddelaars, op de commercialisering van de financiële producten voor het grote publiek en op de aanvullende pensioenen. De wetgever heeft de FSMA ook opgelegd een bijdrage te leveren aan de financiële vorming van de spaarders en de beleggers. In de voorstellingsbrochure vindt u een beknopte uitleg over de FSMA, haar bevoegdheden en haar organisatie.
financial integrity conduct authority guides institution reference vision how rules belgium technology organization search commercial finance investor product
Saved by uncleflo on February 22nd, 2015.
As any good web developer knows, it's important to be constantly vigilant with the handling of user data. We avoid buffer overflows and format string exploits (remember those?) by using safer languages or being careful in our C. To avoid SQL injection, we never build database queries by concatenating user-supplied data. These measures protect the integrity of the data on our servers, but what about our (non-malicious) users?
javascript escape html json ajax hack foolproof approach development web integrity server user security safe malicious administration
Saved by uncleflo on September 20th, 2013.
The Z file system, originally developed by Sun™, is designed to use a pooled storage method in that space is only used as it is needed for data storage. It is also designed for maximum data integrity, supporting data snapshots, multiple copies, and data checksums. It uses a software data replication model, known as RAID-Z. RAID-Z provides redundancy similar to hardware RAID, but is designed to prevent data write corruption and to overcome some of the limitations of hardware RAID.
zfs file system linux install booteable boot kenel howto guide handbook storage method integrity copy checksum mirror replication data raid snapshot space redundancy advanced
Saved by uncleflo on September 16th, 2013.
In general a file manager is a program that gives some kind of interface to the file system and that show in a graphical or textual way the files and directory, usually a file manager allow to do some standard operations such as delete, rename copy/paste and other typical operations that you can do on files. Twin-panel file managers have obligatory connected panels where action in one panel results in a reaction in the second. So for example you could move a file from the first to the second panel, or copy it. In this roundup I‘ll show you some of the most used Twin-panel file manager available on Linux, sometimes they are also called Orthodox file managers or command-based file managers and in general they have three windows (two panels and one command line window).
panel file management linux twin convenient fast speed administration guide compare comparison system integrity sort operating software tool opensource manager utility
Saved by uncleflo on September 15th, 2013.
Marco Fioretti suggests some ways in Linux to automatically compare the contents of multiple directories in order to find missing, duplicate, or unwanted files. Many of us end up, inevitably, with so many files and folders that it is impossible to keep them under control without some specialized help. Luckily, as I'll show you in a moment, under Linux there are several, very efficient solutions to this problem. Multiple copies of many files, scattered all over the computer, waste space, create confusion, and slow down desktop indexers like DocFetcher. I have already explained how to find and remove the unwanted extra copies here.
guide check duplicate verify tool compare integrity opensource linux comparison folder content missing software tree file directory command administration backup
No further bookmarks found.