Search Content

Displaying 1 - 20 of 43

… which we'll discuss next, is that our destination is not a node, but an entityreference field. So our destination class …           ),         );         node_save($node);         $model_array[$row->BvItemNo] = …

… a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) Add … a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) … …

… A slick migration trick - convert columns to multi-value field with subfields Submitted by John Locke on Tue, …     source: PricingMethod     map:       O: O     default_value: ''   -     plugin: skip_on_empty     method: row … YAML parser requires them to be quoted. So now we have a value built up that pretty much matches the entity field …

… discovered sooner rather than later -- or have all private keys also encrypt to a law-enforcement's key, so that law-enforcement can decrypt it. But what if your … easily attacked via social engineering, and these secret keys revealed? Having a skeleton key like this becomes a much …

… Am I affected? Freelock production servers are a mix of Ubuntu 10.04 and Ubuntu 12.04. Ubuntu 12.04 ships with a version of OpenSSL …

… with them to create user content subscription access keys for individuals and groups – in order to see special … with them to create user content subscription access keys for individuals and groups – in order to see special …

… been reading our blog, you'll know we're huge fans of Riot , which now has full end-to-end encryption in beta. … a green bar in the lock section. Device/key verification Riot/Matrix, PGP You validate a certificate thumbprint with …

… use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple … use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple …

… renewing their certificates. What's a certificate? Public Key Encryption made secure electronic communications … possible. Public Key Encryption involves two keys , or codes used to encrypt or decrypt data. One key is …

… of disk. While that doesn't really add any significant value to a deployment process, and while there's really no … to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have …

… and running a pyramid scheme? If your confidential client information could be revealed as easily as using a bic … companies, 3 different Drupal versions, scads of different clients. We rocked it -- we had only 3 failures across the … companies, 3 different Drupal versions, scads of different clients. We rocked it -- we had only 3 failures across the …

… management master gets compromised, you've given away the keys to the kingdom. Code management. Using automated … management master gets compromised, you've given away the keys to the kingdom. Code management. Using automated …

… want to keep secret -- mainly your passwords, and security keys widely used to protect information and identity. Have … secure SSL certificate on a server might have its private key stolen, and incorporated into a fake certificate -- which … -- because a new 0-day attack could give the attacker the keys to your online kingdom. The good news is, browsers have …

… // if at all possible. $join_table = ''; if (!array_key_exists('table', $info)) { $join_table = $table['alias'] . … */ function mymodule_views_data() { // The top level key is usually the entity type, or a database table, but can actually be anything. // Inside that top level key, you need to specify a literal 'table' element, and any …

… This is Why You Need Another Backup Submitted by John Locke on Thu, 06/21/2018 - 15:12 At … your storage volumes. Worse, they could easily delete your backups, if your backups are managed in the same account. …

… browser-based application with a Drupal back end. The key difference between what I'm doing with Dojo and the more … Simply provide an array of functions to call as keys, and arguments inside a nested array. You do need to … Simply provide an array of functions to call as keys, and arguments inside a nested array. You do need to …

… keyboards with water, I ran some fresh water over the keys and then set to work. I removed the keyboard, the palm … keyboards with water, I ran some fresh water over the keys and then set to work. I removed the keyboard, the palm …

… reactions Threaded messages Ability to share encryption keys across devices, so you can read E2E messages from before … reactions Threaded messages Ability to share encryption keys across devices, so you can read E2E messages from before …

… based on what the site is doing for the business? The key point here is that when a client uses a technology we are … based on what the site is doing for the business? The key point here is that when a client uses a technology we are …

… cd into easy-rsa/ Edit vars as follows: * KEY_COUNTRY * KEY_PROVINCE * KEY_CITY * KEY_ORG * KEY_EMAIL … etc. Use ./build-key-pass for passphrase-encrypted keys.) Configure OpenVPN Server-Routed cd /etc/openvpn Copy …