uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 8 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   user   process   work   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   access   customer   travel   camera   material   test   standard   review   documentation   css   money   engineering   develop   webdesign   engine   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   app   yacht   content   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   live   easy   google   resource   operation   startup   monitor   training  


Tag selected: integrity.

Clear all

Showing 8 results.

Looking up integrity tag. Showing 8 results. Clear

What is Freemasonry | United Grand Lodge of England

https://www.ugle.org.uk/discover-freemasonry/what-is-freemasonry

Saved by uncleflo on February 9th, 2022.

One of the oldest social and charitable organisations in the world, Freemasonry's roots lie in the traditions of the medieval stonemasons who built our cathedrals and castles. It is here that a number of the famous elements of Freemasonry find their roots. In the medieval era, stonemasons often travelled around to find work in different locations. To demonstrate their level of qualification, they would use grips, words and signs in order to distinguish themselves from unqualified builders. Freemasonry uses building analogies to teach members how to lead productive lives that benefit the communities that they live in. In the medieval era, stonemasons wore aprons and gloves to protect themselves while working on shaping rough pieces of stone, but in today’s society Freemasons meet to build friendships and communities rather than cathedrals and castles. For Freemasons, there are four important values that help define their path through life: Integrity, Friendship, Respect and Charity. In today’s world filled with uncertainty, these principles ring as true now as they have at any point in the organisation’s history.

together freemason strength wise admittance acknowledgement lodge kindness fortunate charitable castle masonic integrity undertake uncertain apprentice productive collective divide demonstrate welcome medieval ceremony distinguish roots completion organisation world tradition cathedral distinguis live community value


JSON Web Token Introduction - jwt.io

https://jwt.io/introduction

Saved by uncleflo on April 10th, 2021.

JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA. Although JWTs can be encrypted to also provide secrecy between parties, we will focus on signed tokens. Signed tokens can verify the integrity of the claims contained within it, while encrypted tokens hide those claims from other parties. When tokens are signed using public/private key pairs, the signature also certifies that only the party holding the private key is the one that signed it.

token secure header verify authorization authentication credentials apis schema signature algorithm user browser resistant secret standard transmit information json object hmac key integrity web introduction development administration api check identity


The security impact of a new cryptographic library - Daniel J. Bernstein, Tanja Lange, and Peter Schwabe

https://cr.yp.to/highspeed/coolnacl-20120725.pdf

Saved by uncleflo on July 10th, 2017.

This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous cryptographic libraries such as OpenSSL. Specifically, this paper analyzes the security impact of the following NaCl features: no data flow from secrets to load addresses; no data flow from secrets to branch conditions; no padding oracles; centralizing randomness; avoiding unnecessary randomness; extremely high speed; and cryptographic primitives chosen conservatively in light of the cryptanalytic literature.

confidentiality integrity speed simplicity security simple integral performance confidential secure library hash salt implement paper academic review analysis feature explanation read article


Gedragsregels (MiFID)

http://www.fsma.be/nl/supervision/mifid.aspx

Saved by uncleflo on May 15th, 2017.

De Autoriteit voor Financiële Diensten en Markten streeft naar een eerlijke en correcte behandeling van de financiële consument en naar integere financiële markten. De verschillende actoren in de Belgische financiële sector staan, voor diverse aspecten, onder permanent toezicht om de stabiliteit van en het vertrouwen in de financiële markten en een loyale, billijke en professionele behandeling van de beleggers en financiële consumenten te waarborgen. Dit toezicht verloopt volgens het "Twin Peaks"-model of tweepolig model met twee autonome toezichthouders, namelijk de Nationale Bank van België en de Autoriteit voor Financiële Diensten en Markten, kort FSMA, die elk specifieke doelstellingen nastreven. De FSMA staat in voor het toezicht op de financiële markten en de informatie van ondernemingen, op bepaalde categorieën financiële dienstverleners en tussenpersonen, op de naleving van gedragsregels door de financiële bemiddelaars, op de commercialisering van de financiële producten voor het grote publiek en op de aanvullende pensioenen. De wetgever heeft de FSMA ook opgelegd een bijdrage te leveren aan de financiële vorming van de spaarders en de beleggers. In de voorstellingsbrochure vindt u een beknopte uitleg over de FSMA, haar bevoegdheden en haar organisatie.

financial integrity conduct authority guides institution reference vision how rules belgium technology organization search commercial finance investor product


Foolproof HTML escaping in Javascript - #! (shebang)

http://shebang.brandonmintern.com/foolproof-html-escaping-in-javascript/

Saved by uncleflo on February 22nd, 2015.

As any good web developer knows, it's important to be constantly vigilant with the handling of user data. We avoid buffer overflows and format string exploits (remember those?) by using safer languages or being careful in our C. To avoid SQL injection, we never build database queries by concatenating user-supplied data. These measures protect the integrity of the data on our servers, but what about our (non-malicious) users?

javascript escape html json ajax hack foolproof approach development web integrity server user security safe malicious administration


21.2. The Z File System (ZFS)

http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/filesystems-zfs.html

Saved by uncleflo on September 20th, 2013.

The Z file system, originally developed by Sun™, is designed to use a pooled storage method in that space is only used as it is needed for data storage. It is also designed for maximum data integrity, supporting data snapshots, multiple copies, and data checksums. It uses a software data replication model, known as RAID-Z. RAID-Z provides redundancy similar to hardware RAID, but is designed to prevent data write corruption and to overcome some of the limitations of hardware RAID.

zfs file system linux install booteable boot kenel howto guide handbook storage method integrity copy checksum mirror replication data raid snapshot space redundancy advanced


» Linuxaria – Everything about GNU/Linux and Open source 8 Twin-panel file manger for Linux

http://linuxaria.com/recensioni/twin-panel-file-manger-for-linux?lang=en

Saved by uncleflo on September 16th, 2013.

In general a file manager is a program that gives some kind of interface to the file system and that show in a graphical or textual way the files and directory, usually a file manager allow to do some standard operations such as delete, rename copy/paste and other typical operations that you can do on files. Twin-panel file managers have obligatory connected panels where action in one panel results in a reaction in the second. So for example you could move a file from the first to the second panel, or copy it. In this roundup I‘ll show you some of the most used Twin-panel file manager available on Linux, sometimes they are also called Orthodox file managers or command-based file managers and in general they have three windows (two panels and one command line window).

panel file management linux twin convenient fast speed administration guide compare comparison system integrity sort operating software tool opensource manager utility


None

http://www.techrepublic.com/blog/linux-and-open-source/how-to-compare-the-content-of-two-or-more-directories-automatically/

Saved by uncleflo on September 15th, 2013.

Marco Fioretti suggests some ways in Linux to automatically compare the contents of multiple directories in order to find missing, duplicate, or unwanted files. Many of us end up, inevitably, with so many files and folders that it is impossible to keep them under control without some specialized help. Luckily, as I'll show you in a moment, under Linux there are several, very efficient solutions to this problem. Multiple copies of many files, scattered all over the computer, waste space, create confusion, and slow down desktop indexers like DocFetcher. I have already explained how to find and remove the unwanted extra copies here.

guide check duplicate verify tool compare integrity opensource linux comparison folder content missing software tree file directory command administration backup


No further bookmarks found.