Beyrut’ un Öteki Yüzü

Yazar: enes koc Kategori: Genel

Beyrut’ a “hep yıkılıp hiç yok olmayan şehir” derler.

Yorum (comment) (0)

Lübnan-Suriye gezim

Yazar: enes koc Kategori: Genel

Bir zamanlar Fransız sömürgesi altında kalmış bu topraklara uygun bir Fransız müziği ile Beyrut-Sayda-Sur-Byblos-Harisa-Tripoli-Baalbek-Şam görüntülerim.
Biraz sabır, yükleme uzun sürebilir….

Şarkıyı dinlemek isteyenlere :
http://fizy.com/#s/1omdbv

Yorum (comment) (0)

For encode:  <WASROOT>java/bin/java -cp <WASROOT>/deploytool/itp/plugins/com.ibm.websphere.v6(xxx)/ws_runtime.jar com.ibm.ws.security.util.PasswordEncoder  <password>

result:   decoded password == “password”, encoded password == “{xor}Mzs+Lz47MjYx”

For decode: <WASROOT>java/bin/java -cp <WASROOT>/deploytool/itp/plugins/com.ibm.websphere.v6(xxx)/ws_runtime.jar com.ibm.ws.security.util.PasswordDecoder   {xor}Mzs+Lz47MjYx

result:      encoded password == “{xor}Mzs+Lz47MjYx”, decoded password == “password”

Yorum (comment) (0)

If you have a stash file (*.sth) you can use this perl script to learn password:

#!/usr/bin/perl -w

use strict;

die “Usage: $0 <stash file>\n” if $#ARGV != 0;

my $file=$ARGV[0];
open(F,$file) || die “Can’t open $file: $!”;

my $stash;
read F,$stash,1024;

my @unstash=map { $_^0xf5 } unpack(“C*”,$stash);

foreach my $c (@unstash) {
    last if $c eq 0;
    printf “%c”,$c;
}
printf “\n”;

Yorum (comment) (0)

The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. This is in short how it works.

  1. A browser requests a secure page (usually https://).
  2. The web server sends its public key with its certificate.
  3. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted.
  4. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data.
  5. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.
  6. The web server sends back the requested html document and http data encrypted with the symmetric key.
  7. The browser decrypts the http data and html document using the symmetric key and displays the information.

Yorum (comment) (0)

Portal server has a concept of Property Extension Database or which is more commonly known as lookaside database, that you can use to store additional attributes that cannot be stored in the LDAP user registy.

Ex. Lets say you configured portal to use your LDAP server but your LDAP server is either read-only or you need a custom attribute say favoriteMovie that cannot be added to LDAP server. In that case you can configure a lookaside database, and use it store the favoriteMovie attribute for the user.
Yazının tamamını okuyun (read more) »

Yorum (comment) (1)

Gabriel

Yazar: enes koc Kategori: Seçmeler

Give a few minutes for this song

If youtube can not open ;
http://fizy.com/#s/1lvl70

Yorum (comment) (0)