Search Content

Displaying 1 - 20 of 43

… Importing foreign key references with Migrate Submitted by John Locke on Tue, … to work: Get sourceMigration mapping to work with multiple keys Make a migration with an entityreference target Source … in the code as:    * @param mixed $source_keys    *   Key(s) to be looked up against the source migration(s). This …

… a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) Add … a link to a How-To to implement checking for Yahoo domain keys: Postfix with dkfilter (DomainKeys Implementation) … …

… with their existing CSV exports, and one of them is a file that provides up to 5 pricebreaks for each project. … Here's what the data looks like in the source CSV file: ... This file has other pricing data, for customer-specific pricing, …

… discovered sooner rather than later -- or have all private keys also encrypt to a law-enforcement's key, so that law-enforcement can decrypt it. But what if your … easily attacked via social engineering, and these secret keys revealed? Having a skeleton key like this becomes a much …

… certificates and revoke the old ones, in case the private keys for the certificates were compromised. We have notified … that you get an entirely new certificate with a new key. Why? Because it's possible the private key that secures … part still relies on one more step -- revoking any old keys and certificates that might have been stolen. The …

… with them to create user content subscription access keys for individuals and groups – in order to see special … with them to create user content subscription access keys for individuals and groups – in order to see special …

… one other, critically important feature of how most public key encryption works -- it can be used as a digital … device key combined with your passphrase. On Amazon, keys are stored/managed through a key server. On many disk … works Self Disk, files This is mainly a matter of securing keys -- if you're not sharing encrypted data with others, you …

… use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple … use one-time login links instead of passwords, require SSH keys for access to production systems, have multiple …

… renewing their certificates. What's a certificate? Public Key Encryption made secure electronic communications … possible. Public Key Encryption involves two keys , or codes used to encrypt or decrypt data. One key is …

… to a new point release of Drupal means merging the new tag into our branch. Then we've written a script to update … and the development copy on develop. And it created a git tag for the particular release. On production, we have … back to development and re-roll the release. git log/git tag -- identify the current state of the code base -- should …

… this happens to you, it is like having a bad employee with keys to anything in your business. Only you don't even know … access to the site or server -- they can get in without a key. Code is what runs your Drupal or WordPress website, and …

… us a line ! Have some other security tips? Please add your comment below! Industry Business E-Commerce Software Drupal … Drupal 7 salts passwords very effectively. Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… addresses turn into links automatically. Allowed HTML tags: <a href hreflang> <em> <strong> <blockquote cite> …

… so that's what I hope to illuminate here. Read the comments inline... /** * Implements hook_views_data(). */ … or get refactored into a different module. Reply Add new comment You must have JavaScript enabled to use this form. … me when new comments are posted All comments Replies to my comment Comment About text formats Filtered HTML Web page …

… It turns out that another vendor had posted an AWS API key to a public Github server! This is like putting your … use. Worst Case Scenario A malicious attacker, with an API key granting sufficient access to an AWS account, can shut … site down. They had gotten the notice about the published key, went into the account and shut off every server they …

… browser-based application with a Drupal back end. The key difference between what I'm doing with Dojo and the more … Simply provide an array of functions to call as keys, and arguments inside a nested array. You do need to … Simply provide an array of functions to call as keys, and arguments inside a nested array. You do need to …

… for different tasks: billing, taxes, security updates, client projects, and articles. In Evolution I can easily show … on my laptop are on a strongly encrypted partition. My clients and I have nothing to worry about when the hard drive … on my laptop are on a strongly encrypted partition. My clients and I have nothing to worry about when the hard drive …

… reactions Threaded messages Ability to share encryption keys across devices, so you can read E2E messages from before … reactions Threaded messages Ability to share encryption keys across devices, so you can read E2E messages from before …

… based on what the site is doing for the business? The key point here is that when a client uses a technology we are … based on what the site is doing for the business? The key point here is that when a client uses a technology we are …

… cd into easy-rsa/ Edit vars as follows: * KEY_COUNTRY * KEY_PROVINCE * KEY_CITY * KEY_ORG * KEY_EMAIL … etc. Use ./build-key-pass for passphrase-encrypted keys.) Configure OpenVPN Server-Routed cd /etc/openvpn Copy …