Welcome to Software Development on Codidact!
Will you help us build our independent community of developers helping developers? We're small and trying to grow. We welcome questions about all aspects of software development, from design to code to QA and more. Got questions? Got answers? Got code you'd like someone to review? Please join us.
Posts by Canina
The purpose of a cryptographic salt is to make the same input (password) hash to different values in different instances, yet retain the hash function's deterministic properties. Salting accomplish...
While [the Apple "goto fail bug"] is pretty interesting, it's anecdotal evidence. I understand that it's still possible to produce bugs like this. One could also reasonably argue that it could ha...
As with every other security-related question, the first step toward answering this is that you'll need to answer for yourself: what are you trying to protect against? Security isn't a binary quant...
The traditional approach is to create either a single dotfile, or a single dot-directory, directly under the user's home directory, named for your application. Thus ~/.thromblemeisteradmin (which c...
You can, in a sense, do I believe even better than using Stack Overflow's hosted, proprietary service. You can run your very own instance of the Codidact software (that is, QPixel) locally, on a s...
Any time an SQL SELECT query does not have any explicit ORDER BY clause, I personally find it useful to mentally read it as saying "I don't care about ordering of the output of this query". If you...
I am working on a website which unfortunately uses a mix of linked and inline CSS and Javascript (and, even more unfortunately, I can't do a lot about the use of inline CSS and Javascript), and am ...
Your grep invocation will first search for files which contain foo and print a list of the lines from each which contain the word foo; the second grep invocation will take this list and filter it d...
The awk gsub function takes as its first argument a regular expression indicating the substring to be replaced, and replaces a matching substring with the value of the second argument, which is the...
This is pretty much exactly what formail is good at. Specifically useful for this case, formail lets you extract headers, given an email message on RFC 822-esque format. In bash, if you have the ...
My initial approach would be to increase n by 1 (thus shifting the original range from -1..+1 to 0..+2), turn that range into 0..+1, and then simply map from that to your 0..+319 output range. flo...
I doubt that there is an actual standard HTTP response code to indicate exactly what you're looking for. 202 (Accepted) is close, but doesn't really seem to me to be about a situation where the cli...
"Hash Sum mismatch" printed by apt-get on Debian and derivatives means that the file as downloaded had a different cryptographic checksum (hash) than what's listed in the packages list. In this ca...
Nothing. Or anything. Or whatever you want it to mean. As a general rule of thumb: If you explicitly exit from a program with a specific exit status, then you know the meaning, or set of mean...
Misconception This isn't so much an issue of left/right alignment, as the browser beginning the rendering of each consecutive block wherever the content of the preceding block ends, instead of pas...
Since you ask if a CMS necessarily must be implemented using all three, the answer clearly becomes a theoretical "no" if a CMS can be implemented with anything less than all three, and a practical ...
I honestly have no idea why you feel that OOP would be necessary in order to keep track of variable assignments in a language interpreter. People wrote both interpreters and compilers long before o...
I have line-based data on the form x1=y2; a3=b4; c5=d6; ... Matching this with a extended regular expression is fairly straightforward; for example, one can do something not entirely dissimilar...
All three obvious current possibilities are problematic, but for different reasons. Ignoring the matter of how to format the tag name for a moment... GNU/Linux focuses on one (admittedly very...
1. What type of tags will we allow? (Should specific tags like UrlRewrite be allowed?) I would argue that urlrewrite (or perhaps more appropriately since Microsoft renders it as URL Rewrite, url-...
From the further details you added, it does indeed sound like you have some stale connection state on your system. The fact that you can get DNS replies when you query a DNS server by IPv4 address,...
It looks like filter() effectively takes two arguments; the array to be filtered, and a predicate expression resulting in a boolean indicating whether the entry should be included in the output or ...
Since this is pretty clearly a homework exercise, and the point of those is for you to learn, I'm going to be evil and not spoon-feed the answer to you. However, I will give you some pointers. Fi...
It works fine for me. Here's a minimal working example: <!DOCTYPE html> <html> <body> <form> <input type="text" name="field" id="field" value="old value"> <i...
I'll readily admit I'm not too familiar with MySQL specifically, but personally, I would try to avoid listing all the primary key values in an ad-hoc query. What I would rather do personally is to...