25 April 2014

The Ruby Reflector



  Source Favicon
On Ruby News 4 months ago.

SHA256: af828bc0fe6aee5ffad0f8f10b48ee25964f54d5118570937ac7cf1c1df0edd3


SIZE: 14450990 bytes

MD5: a16561f64d78a902fab08693a300df98

SHA256: 1b467f13be6d3b3648a4de76b34b748781fe4f504a19c08ffa348c75dd62635e


SIZE: 16107702 bytes

MD5: b6cdc0e63185b4aeb268bdf6ebd4de9f

SHA256: 4d6a256b73b79f5b64182e1f55db3e61042bbe0166a45917e69c1b4e47247276 …

ruby-lang.org Read
  Source Favicon
By Tom of Heroku 5 months ago.

…with AES-256-CBC, random IV. The ciphertext is then HMAC'd with SHA256 for tamper protection. Secrets are held only by the addons app itself. Also present in the payload is a timestamp, telling addons to expire the cookie in six hours. All interactions between addons and our main API server are authenticated using that access token. For example, if you use addons.heroku.com to add Redis To Go or New Relic to your app, that results in addons.heroku.com decrypting your session …

blog.heroku.com Read
  Source Favicon
By Joshua Timberman of Chef Blog 7 months ago.

Get the SHA256 checksum of the private key. I use SHA256 because that's what Chef uses for file content. We'll use this to verify content later. % sha256sum vaultuser-ssh a83221c243c9d39d20761e87db6c781ed0729b8ff4c3b330214ebca26e2ea89d vaultuser-ssh

Assume that I also created the SSH key on GitHub for this user.

In order to have a file's contents be a JSON value for the data bag item, I'll remove the newlines ( \n ), and generate the JSON: ruby -rjson …

opscode.com Read
  Source Favicon
By Bryan McLellan of Chef Blog 1 year ago.

CHEF-3715 - Remove caching of SHA256 sums in Chef:: ChecksumCache

New Feature

CHEF-2004 - knife environment show should have an attribute selection option (-a / -attribute)

CHEF-3375 - remote_file support for URL lists to use as mirrors

CHEF-3520 - Bring knife-essentials commands into Chef proper

CHEF-3571 - Add a chef-apply ruby script into chef gem for running a single recipe without modifying the node's run_list

CHEF-3800 …

opscode.com Read
  Source Favicon
By Chris Kelly of New Relic 1 year ago.

We generated the SHA256 hash of the files from our build system and compared them against the SHA hash from the gems hosted on Rubygems.org. In all cases, the SHAs matched and we are confident that the gems hosted on Rubygems.org are the same we released, and therefore safe for you to install.

The hashes for the last seven gem releases are as follows: 4053418460a7d812b955673f6db4f7677d2d64a40caaef3debdc5bc150edec57 newrelic_rpm- 2c167f0b6459acd0bf09ec94e2c1c0fc869db55da77b235ca435bc0e52dbeea7 …

newrelic.com Read
  Source Favicon


- Obfuscated passwords in Query Logs

- SHA256 hashing with Salt for Authentication

- Use obfuscated password storage for command line tools

- Policy Based password validation

- Plugin authentication support for Replication

The post MySQL 5.6: Improvements in the Nutshell appeared first on MySQL Performance Blog .

mysqlperformanceblog.com Read
  Source Favicon
On Ruby News over 1 year ago.

SHA256: 712944f691b79f22f655547826400c26b13bc8c9e7bdc73a4abea45d5e766d85


SIZE: 12555429 bytes

MD5: 90b6c327abcdf30a954c2d6ae44da2a9

SHA256: 0d0e32a3554867e3eddbb23fbf30a72c4748622e010c23e31302d899fc005574


SIZE: 13871394 bytes

MD5: c0001d5d36ad2e3e6a84810abe585b79

SHA256: 058af4cf409c93cce1de74a6b3355ddcf740f3efae1ab02d63471fcdbed19088…

ruby-lang.org Read
  Source Favicon
On Coding Horror 2 years ago.

…salt. It's a lot easier to just crack the passwords. Even a "good" hashing scheme of SHA256(salt + password) is still completely vulnerable to these cheap and effective attacks.

But when I store passwords I use salts so none of this applies to me!

Hey, awesome, you're smart enough to not just use a hash, but also to salt the hash . Congratulations. $saltedpassword = sha1(SALT . $password);

I know what you're thinking. "I can hide the salt, so the …

codinghorror.com Read
  Source Favicon
By Phillip Gawlowski of RubyLearning Blog almost 3 years ago.

…bit length we want our hash to have. SHA2 exists in two variants: 256, also called SHA256, and 512, called SHA512. A longer key length takes longer to calculate, but is also more accurate, and much more difficult to attack with a rainbow table or other cryptanalysis.

Once we have our SHA object, we pass a String of data into the # digest to have the hash of this data returned as a String.

You can call the # digest method directly when you are working with MD5 or SHA1: require …

rubylearning.com Read
  Source Favicon
On codahale.com 4 years ago.

Use bcrypt

Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt . Use bcrypt .

Why Not { MD5 , SHA1 , SHA256 , SHA512 , SHA-3 , etc}?

These are all general purpose hash functions, designed to calculate a digest of huge amounts of data in as short a time as possible. This means that they are fantastic for ensuring the integrity of data and utterly rubbish for storing passwords.

codahale.com Read