https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
## Using EKSCTL | |
#Describe Addon Versions | |
eksctl utils describe-addon-versions --kubernetes-version 1.24 | grep AddonName | |
#Describe Addon Configuration | |
eksctl utils describe-addon-versions --kubernetes-version 1.24 --name tetrate-io_istio-distro | grep AddonVersion | |
#Create Addon | |
eksctl create addon --cluster ${testcluster} --name tetrate-io_istio-distro --version latest --force |
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
Make sure the following options are off:
Disable pre-fetching
# Usage: copy-to-docker-volume SRC_PATH DEST_VOLUME_NAME [DEST_PATH] | |
copy-to-docker-volume() { | |
SRC_PATH=$1 | |
DEST_VOLUME_NAME=$2 | |
DEST_PATH="${3:-}" | |
# create smallest Docker image possible | |
echo -e 'FROM scratch\nLABEL empty=""' | docker build -t empty - | |
# create temporary container to be able to mount volume | |
CONTAINER_ID=$(docker container create -v my-volume:/data empty cmd) | |
# copy files to volume |
WSL 2 uses a Hyper-V Virtual Network adapter. Network connectivity works without any issue when a VPN is not in use. However when a Cisco AnyConnect VPN session is established Firewall Rules and Routes are added which breaks connectivity within the WSL 2 VM. This issue is tracked WSL/issues/4277
Below outline steps to automatically configure the Interface metric on VPN connect and update DNS settings (/etc/resolv.conf) on connect/disconnect.
Some of the books I'll be recommending are based on .NET. Do not be discouraged. We shouldn't strive to stick to a specific technology stack. Your ambitions and goals will evolve over time and that might lead you a completely new space. Moreover, there are lessons to be learned from an environment that's different from what you're used to.
"C# in depth" by Jon Skeet (Book)
"F# for C# developers" by Tao Liu (Book)
F# to C# interop tips by Scott Wlaschin (Gist)
/* SQL Server Statistics Explained with Playing Cards | |
v0.1 - 2020-08-14 | |
https://BrentOzar.com/go/learnstats | |
This first RAISERROR is just to make sure you don't accidentally hit F5 and | |
run the entire script. You don't need to run this: | |
*/ | |
RAISERROR(N'Oops! No, don''t just hit F5. Run these demos one at a time.', 20, 1) WITH LOG; | |
GO |
Add a local rdp user via user data at launch of a Windows EC2 instance. Note that this includes a password passed in thru both the user data and powershell command line and is a bad security practice because they can be viewed later. At a minimum, you should connect to the instance immediately after launch and change the password interactively. Also, delete the userdata from the instance after launch. More secure would be to connect the instance to a domain for authentication or use AWS native tooling to connect to the instance (e.g., AWS Session Manager).
<powershell>
# Be sure to set the username and password on these two lines. Of course this is not a good
# security practice to include a password at command line.
using System; | |
using System.Text; | |
using System.Text.RegularExpressions; | |
namespace MainColorConsole | |
{ | |
class Program | |
{ | |
static void Main(string[] args) | |
{ |
TLDR: JWTs should not be used for keeping your user logged in. They are not designed for this purpose, they are not secure, and there is a much better tool which is designed for it: regular cookie sessions.
If you've got a bit of time to watch a presentation on it, I highly recommend this talk: https://www.youtube.com/watch?v=pYeekwv3vC4 (Note that other topics are largely skimmed over, such as CSRF protection. You should learn about other topics from other sources. Also note that "valid" usecases for JWTs at the end of the video can also be easily handled by other, better, and more secure tools. Specifically, PASETO.)
A related topic: Don't use localStorage (or sessionStorage) for authentication credentials, including JWT tokens: https://www.rdegges.com/2018/please-stop-using-local-storage/
The reason to avoid JWTs comes down to a couple different points: