Does a Lich need spell books to relearn all spells after rejuvenating?

If someone takes the phylactery of a Lich, and carries it off, and then someone else “kills” the Lich, it reappears near the phylactery. But if the Lich is basically a wizard, then wouldn’t it have to relearn all the spells? In that case, if the spell books weren’t around (the phylactery wasn’t in the lair after all), then what powers does the rejuvenated Lich have? Would it then have to go back to the lair for the books? When a Lich travels, it must at least carry a copy of the books, right? Those books would be left behind with the newly destroyed Lich, I would imagine. Just trying to think through how all this might play out.

What’s the best practice for screen navigation after invalid user input?

Consider an Angular app with many user inputs over screens A, B and C. Screen C needs valid inputs from A and B; B from A only; and A is independent. Suppose while on screen B the user enters invalid inputs.

Question: What navigation should I support for B in this case?

My current thinking is to disallow navigation to C due to data validity issues. But what about navigating back to B? On the one hand, there are no validity issues, and the user may want to look up screen A to help with screen B inputs. On the other hand, this would complicate the app’s state management. An alternative is to disallow such navigation, possibly with an option to restore the last valid inputs at B. As I lack experience in UX, I’d appreciate answers to help me with this trade-off.

Post-terms-order Console errors after update

i have an issue after updating the last WP version. now i have this errors on my dashboard:

t_Terms_Order_Walker::walk($ elements, $ max_depth) should be compatible with Walker::walk($ elements, $ max_depth, …$ args) in /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_walkers.php on line 135

Warning: Cannot modify header information – headers already sent by (output started at /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_interface-class.php:25) in /home/c4ddwork/staging/2/wp-includes/functions.php on line 5946

Warning: Cannot modify header information – headers already sent by (output started at /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_interface-class.php:25) in /home/c4ddwork/staging/2/wp-admin/includes/misc.php on line 1252

Warning: Cannot modify header information – headers already sent by (output started at /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_interface-class.php:25) in /home/c4ddwork/staging/2/wp-admin/admin-header.php on line 9

Warning: Cannot modify header information – headers already sent by (output started at /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_interface-class.php:25) in /home/c4ddwork/staging/2/wp-includes/option.php on line 958

Warning: Cannot modify header information – headers already sent by (output started at /home/c4ddwork/staging/2/wp-content/plugins/post-terms-order/include/pto_interface-class.php:25) in /home/c4ddwork/staging/2/wp-includes/option.php on line 959


when i deactivate post-terms-order plugin, all theses errors disappear.

Can anyone help me please!

Thank you

Returning Social Security Number After Validation Checks on Web Based Form

I have a web based application form that is used to gather personal information for web based users. One of the fields is an SSN. My question is simple, in terms of security compliance (in general, OWASP, PCI, SOC2, etc), is it okay to prefill the SSN when the user is returned to the form because of validation issues?

For instance, say I fill out the entire form, I forgot to enter Birth Date (another field on the form), the form reload the page, displays a validation message related to a required field birth date, the form is then populated with the form fields the user already entered, First Name, Last Name, SSN, etc. Is it acceptable in terms of security compliance to repopulate their SSN (this is coming from the server side validation, not client side), or should I force the user to re-enter their SSN?

Server sending RST after Client Hello

We are facing intermittent TLS handshake issue while connecting from a C++ (Openssl 1.0.2e) client to a Java Server (Java 7). The issue is observed on load test after having around 100 session sending concurent requests, that too on linux platform. Server is sending RST message immediately after “Client Hello” message. On client side the SSL_CTX object is created with TLSv1_2_client_method(). On server side the context instance is created by invoking SSLContext.getInstance(“TLSv1.2”). Also we are limiting the enbled protocol to TLSv1.2 on server side. Whenever this issue is observed we have noticed that Client Hello Protocol on Wireshark as “TLSv1”, in all other cases(SUCCESS) the Client Hello Protocol is displayed as TLSv1.2.

Also I understand the Handshake layer version number is important and any TLS1.2 compliant server MUST accept any value {03,XX} as the record layer version number for ClientHello as per RFC5246. But whenever the failuere is observed, record layer is “TLSv1 Record Layer: Handshake Protocol: Client Hello”. In the case of successful handshake the record layer is “TLSv1.2 Record Layer: Handshake Protocol: Client Hello”. The client hello message for both the cases are given below, note that the cipher suites and signature algorithm are same in both the cases.

Client Hello message when issue occurs:

Transport Layer Security TLSv1 Record Layer: Handshake Protocol: Client Hello     Content Type: Handshake (22)     Version: TLS 1.0 (0x0301)     Length: 358     Handshake Protocol: Client Hello         Handshake Type: Client Hello (1)         Length: 354         Version: TLS 1.2 (0x0303)         Random: 44e153eb9aa960e39e7dd4c01fbc1cc3770d95e0d70d6aac…             GMT Unix Time: Aug 15, 2006 10:26:11.000000000 India Standard Time             Random Bytes: 9aa960e39e7dd4c01fbc1cc3770d95e0d70d6aac83f458ab…         Session ID Length: 0         Cipher Suites Length: 228         Cipher Suites (114 suites)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)             Cipher Suite: TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5)             Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 (0x00a3)             Cipher Suite: TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1)             Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)             Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)             Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a)             Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069)             Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068)             Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)             Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038)             Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA (0x0037)             Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA (0x0036)             Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)             Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0087)             Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0086)             Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0085)             Cipher Suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)             Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 (0x00a7)             Cipher Suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 (0x006d)             Cipher Suite: TLS_DH_anon_WITH_AES_256_CBC_SHA (0x003a)             Cipher Suite: TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA (0x0089)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02e)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (0xc005)             Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)             Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)             Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)             Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)             Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)             Cipher Suite: TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4)             Cipher Suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 (0x00a2)             Cipher Suite: TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0)             Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)             Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)             Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040)             Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f)             Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e)             Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)             Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)             Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA (0x0031)             Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA (0x0030)             Cipher Suite: TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)             Cipher Suite: TLS_DHE_DSS_WITH_SEED_CBC_SHA (0x0099)             Cipher Suite: TLS_DH_RSA_WITH_SEED_CBC_SHA (0x0098)             Cipher Suite: TLS_DH_DSS_WITH_SEED_CBC_SHA (0x0097)             Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045)             Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0044)             Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0043)             Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0042)             Cipher Suite: TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)             Cipher Suite: TLS_DH_anon_WITH_AES_128_GCM_SHA256 (0x00a6)             Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA256 (0x006c)             Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA (0x0034)             Cipher Suite: TLS_DH_anon_WITH_SEED_CBC_SHA (0x009b)             Cipher Suite: TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA (0x0046)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02d)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)             Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)             Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (0xc004)             Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)             Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)             Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)             Cipher Suite: TLS_RSA_WITH_SEED_CBC_SHA (0x0096)             Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0041)             Cipher Suite: TLS_RSA_WITH_IDEA_CBC_SHA (0x0007)             Cipher Suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007)             Cipher Suite: TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)             Cipher Suite: TLS_DH_anon_WITH_RC4_128_MD5 (0x0018)             Cipher Suite: TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c)             Cipher Suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA (0xc002)             Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)             Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)             Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)             Cipher Suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)             Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)             Cipher Suite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x0013)             Cipher Suite: TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA (0x0010)             Cipher Suite: TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA (0x000d)             Cipher Suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)             Cipher Suite: TLS_DH_anon_WITH_3DES_EDE_CBC_SHA (0x001b)             Cipher Suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (0xc00d)             Cipher Suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc003)             Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)             Cipher Suite: TLS_DHE_RSA_WITH_DES_CBC_SHA (0x0015)             Cipher Suite: TLS_DHE_DSS_WITH_DES_CBC_SHA (0x0012)             Cipher Suite: TLS_DH_RSA_WITH_DES_CBC_SHA (0x000f)             Cipher Suite: TLS_DH_DSS_WITH_DES_CBC_SHA (0x000c)             Cipher Suite: TLS_DH_anon_WITH_DES_CBC_SHA (0x001a)             Cipher Suite: TLS_RSA_WITH_DES_CBC_SHA (0x0009)             Cipher Suite: TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0014)             Cipher Suite: TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA (0x0011)             Cipher Suite: TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA (0x0019)             Cipher Suite: TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0008)             Cipher Suite: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x0006)             Cipher Suite: TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 (0x0017)             Cipher Suite: TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x0003)             Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)         Compression Methods Length: 1         Compression Methods (1 method)             Compression Method: null (0)         Extensions Length: 85         Extension: ec_point_formats (len=4)             Type: ec_point_formats (11)             Length: 4             EC point formats Length: 3             Elliptic curves point formats (3)                 EC point format: uncompressed (0)                 EC point format: ansiX962_compressed_prime (1)                 EC point format: ansiX962_compressed_char2 (2)         Extension: supported_groups (len=28)             Type: supported_groups (10)             Length: 28             Supported Groups List Length: 26             Supported Groups (13 groups)                 Supported Group: secp256r1 (0x0017)                 Supported Group: secp521r1 (0x0019)                 Supported Group: brainpoolP512r1 (0x001c)                 Supported Group: brainpoolP384r1 (0x001b)                 Supported Group: secp384r1 (0x0018)                 Supported Group: brainpoolP256r1 (0x001a)                 Supported Group: secp256k1 (0x0016)                 Supported Group: sect571r1 (0x000e)                 Supported Group: sect571k1 (0x000d)                 Supported Group: sect409k1 (0x000b)                 Supported Group: sect409r1 (0x000c)                 Supported Group: sect283k1 (0x0009)                 Supported Group: sect283r1 (0x000a)         Extension: session_ticket (len=0)             Type: session_ticket (35)             Length: 0             Data (0 bytes)         Extension: signature_algorithms (len=32)             Type: signature_algorithms (13)             Length: 32             Signature Hash Algorithms Length: 30             Signature Hash Algorithms (15 algorithms)                 Signature Algorithm: rsa_pkcs1_sha512 (0x0601)                     Signature Hash Algorithm Hash: SHA512 (6)                     Signature Hash Algorithm Signature: RSA (1)                 Signature Algorithm: SHA512 DSA (0x0602)                     Signature Hash Algorithm Hash: SHA512 (6)                     Signature Hash Algorithm Signature: DSA (2)                 Signature Algorithm: ecdsa_secp521r1_sha512 (0x0603)                     Signature Hash Algorithm Hash: SHA512 (6)                     Signature Hash Algorithm Signature: ECDSA (3)                 Signature Algorithm: rsa_pkcs1_sha384 (0x0501)                     Signature Hash Algorithm Hash: SHA384 (5)                     Signature Hash Algorithm Signature: RSA (1)                 Signature Algorithm: SHA384 DSA (0x0502)                     Signature Hash Algorithm Hash: SHA384 (5)                     Signature Hash Algorithm Signature: DSA (2)                 Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503)                     Signature Hash Algorithm Hash: SHA384 (5)                     Signature Hash Algorithm Signature: ECDSA (3)                 Signature Algorithm: rsa_pkcs1_sha256 (0x0401)                     Signature Hash Algorithm Hash: SHA256 (4)                     Signature Hash Algorithm Signature: RSA (1)                 Signature Algorithm: SHA256 DSA (0x0402)                     Signature Hash Algorithm Hash: SHA256 (4)                     Signature Hash Algorithm Signature: DSA (2)                 Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403)                     Signature Hash Algorithm Hash: SHA256 (4)                     Signature Hash Algorithm Signature: ECDSA (3)                 Signature Algorithm: SHA224 RSA (0x0301)                     Signature Hash Algorithm Hash: SHA224 (3)                     Signature Hash Algorithm Signature: RSA (1)                 Signature Algorithm: SHA224 DSA (0x0302)                     Signature Hash Algorithm Hash: SHA224 (3)                     Signature Hash Algorithm Signature: DSA (2)                 Signature Algorithm: SHA224 ECDSA (0x0303)                     Signature Hash Algorithm Hash: SHA224 (3)                     Signature Hash Algorithm Signature: ECDSA (3)                 Signature Algorithm: rsa_pkcs1_sha1 (0x0201)                     Signature Hash Algorithm Hash: SHA1 (2)                     Signature Hash Algorithm Signature: RSA (1)                 Signature Algorithm: SHA1 DSA (0x0202)                     Signature Hash Algorithm Hash: SHA1 (2)                     Signature Hash Algorithm Signature: DSA (2)                 Signature Algorithm: ecdsa_sha1 (0x0203)                     Signature Hash Algorithm Hash: SHA1 (2)                     Signature Hash Algorithm Signature: ECDSA (3)         Extension: heartbeat (len=1)             Type: heartbeat (15)             Length: 1             Mode: Peer allowed to send requests (1) 

Client Hello when handshake is successful:

TLSv1.2 Record Layer: Handshake Protocol: Client Hello Content Type: Handshake (22) Version: TLS 1.0 (0x0301) Length: 358 Handshake Protocol: Client Hello     Handshake Type: Client Hello (1)     Length: 354     Version: TLS 1.2 (0x0303)     Random: b2e7fe85a0e4403ae4fec4d698094b919375f9afed8efff4…     Session ID Length: 0     Cipher Suites Length: 228     Cipher Suites (114 suites)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)         Cipher Suite: TLS_DH_DSS_WITH_AES_256_GCM_SHA384 (0x00a5)         Cipher Suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 (0x00a3)         Cipher Suite: TLS_DH_RSA_WITH_AES_256_GCM_SHA384 (0x00a1)         Cipher Suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)         Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x006b)         Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 (0x006a)         Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA256 (0x0069)         Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA256 (0x0068)         Cipher Suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x0039)         Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038)         Cipher Suite: TLS_DH_RSA_WITH_AES_256_CBC_SHA (0x0037)         Cipher Suite: TLS_DH_DSS_WITH_AES_256_CBC_SHA (0x0036)         Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0088)         Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0087)         Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0086)         Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA (0x0085)         Cipher Suite: TLS_ECDH_anon_WITH_AES_256_CBC_SHA (0xc019)         Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384 (0x00a7)         Cipher Suite: TLS_DH_anon_WITH_AES_256_CBC_SHA256 (0x006d)         Cipher Suite: TLS_DH_anon_WITH_AES_256_CBC_SHA (0x003a)         Cipher Suite: TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA (0x0089)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384 (0xc032)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02e)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 (0xc02a)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 (0xc026)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA (0xc00f)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA (0xc005)         Cipher Suite: TLS_RSA_WITH_AES_256_GCM_SHA384 (0x009d)         Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA256 (0x003d)         Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035)         Cipher Suite: TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (0x0084)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)         Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)         Cipher Suite: TLS_DH_DSS_WITH_AES_128_GCM_SHA256 (0x00a4)         Cipher Suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 (0x00a2)         Cipher Suite: TLS_DH_RSA_WITH_AES_128_GCM_SHA256 (0x00a0)         Cipher Suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)         Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x0067)         Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 (0x0040)         Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA256 (0x003f)         Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA256 (0x003e)         Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x0033)         Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032)         Cipher Suite: TLS_DH_RSA_WITH_AES_128_CBC_SHA (0x0031)         Cipher Suite: TLS_DH_DSS_WITH_AES_128_CBC_SHA (0x0030)         Cipher Suite: TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x009a)         Cipher Suite: TLS_DHE_DSS_WITH_SEED_CBC_SHA (0x0099)         Cipher Suite: TLS_DH_RSA_WITH_SEED_CBC_SHA (0x0098)         Cipher Suite: TLS_DH_DSS_WITH_SEED_CBC_SHA (0x0097)         Cipher Suite: TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0045)         Cipher Suite: TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0044)         Cipher Suite: TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0043)         Cipher Suite: TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA (0x0042)         Cipher Suite: TLS_ECDH_anon_WITH_AES_128_CBC_SHA (0xc018)         Cipher Suite: TLS_DH_anon_WITH_AES_128_GCM_SHA256 (0x00a6)         Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA256 (0x006c)         Cipher Suite: TLS_DH_anon_WITH_AES_128_CBC_SHA (0x0034)         Cipher Suite: TLS_DH_anon_WITH_SEED_CBC_SHA (0x009b)         Cipher Suite: TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA (0x0046)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 (0xc031)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02d)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 (0xc029)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 (0xc025)         Cipher Suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA (0xc00e)         Cipher Suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA (0xc004)         Cipher Suite: TLS_RSA_WITH_AES_128_GCM_SHA256 (0x009c)         Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA256 (0x003c)         Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f)         Cipher Suite: TLS_RSA_WITH_SEED_CBC_SHA (0x0096)         Cipher Suite: TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (0x0041)         Cipher Suite: TLS_RSA_WITH_IDEA_CBC_SHA (0x0007)         Cipher Suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA (0xc011)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA (0xc007)         Cipher Suite: TLS_ECDH_anon_WITH_RC4_128_SHA (0xc016)         Cipher Suite: TLS_DH_anon_WITH_RC4_128_MD5 (0x0018)         Cipher Suite: TLS_ECDH_RSA_WITH_RC4_128_SHA (0xc00c)         Cipher Suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA (0xc002)         Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005)         Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)         Cipher Suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (0xc012)         Cipher Suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)         Cipher Suite: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (0x0016)         Cipher Suite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x0013)         Cipher Suite: TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA (0x0010)         Cipher Suite: TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA (0x000d)         Cipher Suite: TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA (0xc017)         Cipher Suite: TLS_DH_anon_WITH_3DES_EDE_CBC_SHA (0x001b)         Cipher Suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA (0xc00d)         Cipher Suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc003)         Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a)         Cipher Suite: TLS_DHE_RSA_WITH_DES_CBC_SHA (0x0015)         Cipher Suite: TLS_DHE_DSS_WITH_DES_CBC_SHA (0x0012)         Cipher Suite: TLS_DH_RSA_WITH_DES_CBC_SHA (0x000f)         Cipher Suite: TLS_DH_DSS_WITH_DES_CBC_SHA (0x000c)         Cipher Suite: TLS_DH_anon_WITH_DES_CBC_SHA (0x001a)         Cipher Suite: TLS_RSA_WITH_DES_CBC_SHA (0x0009)         Cipher Suite: TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0014)         Cipher Suite: TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA (0x0011)         Cipher Suite: TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA (0x0019)         Cipher Suite: TLS_RSA_EXPORT_WITH_DES40_CBC_SHA (0x0008)         Cipher Suite: TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5 (0x0006)         Cipher Suite: TLS_DH_anon_EXPORT_WITH_RC4_40_MD5 (0x0017)         Cipher Suite: TLS_RSA_EXPORT_WITH_RC4_40_MD5 (0x0003)         Cipher Suite: TLS_EMPTY_RENEGOTIATION_INFO_SCSV (0x00ff)     Compression Methods Length: 1     Compression Methods (1 method)         Compression Method: null (0)     Extensions Length: 85     Extension: ec_point_formats (len=4)         Type: ec_point_formats (11)         Length: 4         EC point formats Length: 3         Elliptic curves point formats (3)             EC point format: uncompressed (0)             EC point format: ansiX962_compressed_prime (1)             EC point format: ansiX962_compressed_char2 (2)     Extension: supported_groups (len=28)         Type: supported_groups (10)         Length: 28         Supported Groups List Length: 26         Supported Groups (13 groups)             Supported Group: secp256r1 (0x0017)             Supported Group: secp521r1 (0x0019)             Supported Group: brainpoolP512r1 (0x001c)             Supported Group: brainpoolP384r1 (0x001b)             Supported Group: secp384r1 (0x0018)             Supported Group: brainpoolP256r1 (0x001a)             Supported Group: secp256k1 (0x0016)             Supported Group: sect571r1 (0x000e)             Supported Group: sect571k1 (0x000d)             Supported Group: sect409k1 (0x000b)             Supported Group: sect409r1 (0x000c)             Supported Group: sect283k1 (0x0009)             Supported Group: sect283r1 (0x000a)     Extension: session_ticket (len=0)         Type: session_ticket (35)         Length: 0         Data (0 bytes)     Extension: signature_algorithms (len=32)         Type: signature_algorithms (13)         Length: 32         Signature Hash Algorithms Length: 30         Signature Hash Algorithms (15 algorithms)             Signature Algorithm: rsa_pkcs1_sha512 (0x0601)                 Signature Hash Algorithm Hash: SHA512 (6)                 Signature Hash Algorithm Signature: RSA (1)             Signature Algorithm: SHA512 DSA (0x0602)                 Signature Hash Algorithm Hash: SHA512 (6)                 Signature Hash Algorithm Signature: DSA (2)             Signature Algorithm: ecdsa_secp521r1_sha512 (0x0603)                 Signature Hash Algorithm Hash: SHA512 (6)                 Signature Hash Algorithm Signature: ECDSA (3)             Signature Algorithm: rsa_pkcs1_sha384 (0x0501)                 Signature Hash Algorithm Hash: SHA384 (5)                 Signature Hash Algorithm Signature: RSA (1)             Signature Algorithm: SHA384 DSA (0x0502)                 Signature Hash Algorithm Hash: SHA384 (5)                 Signature Hash Algorithm Signature: DSA (2)             Signature Algorithm: ecdsa_secp384r1_sha384 (0x0503)                 Signature Hash Algorithm Hash: SHA384 (5)                 Signature Hash Algorithm Signature: ECDSA (3)             Signature Algorithm: rsa_pkcs1_sha256 (0x0401)                 Signature Hash Algorithm Hash: SHA256 (4)                 Signature Hash Algorithm Signature: RSA (1)             Signature Algorithm: SHA256 DSA (0x0402)                 Signature Hash Algorithm Hash: SHA256 (4)                 Signature Hash Algorithm Signature: DSA (2)             Signature Algorithm: ecdsa_secp256r1_sha256 (0x0403)                 Signature Hash Algorithm Hash: SHA256 (4)                 Signature Hash Algorithm Signature: ECDSA (3)             Signature Algorithm: SHA224 RSA (0x0301)                 Signature Hash Algorithm Hash: SHA224 (3)                 Signature Hash Algorithm Signature: RSA (1)             Signature Algorithm: SHA224 DSA (0x0302)                 Signature Hash Algorithm Hash: SHA224 (3)                 Signature Hash Algorithm Signature: DSA (2)             Signature Algorithm: SHA224 ECDSA (0x0303)                 Signature Hash Algorithm Hash: SHA224 (3)                 Signature Hash Algorithm Signature: ECDSA (3)             Signature Algorithm: rsa_pkcs1_sha1 (0x0201)                 Signature Hash Algorithm Hash: SHA1 (2)                 Signature Hash Algorithm Signature: RSA (1)             Signature Algorithm: SHA1 DSA (0x0202)                 Signature Hash Algorithm Hash: SHA1 (2)                 Signature Hash Algorithm Signature: DSA (2)             Signature Algorithm: ecdsa_sha1 (0x0203)                 Signature Hash Algorithm Hash: SHA1 (2)                 Signature Hash Algorithm Signature: ECDSA (3)     Extension: heartbeat (len=1)         Type: heartbeat (15)         Length: 1         Mode: Peer allowed to send requests (1) 

When this issue occurs (ie. SSL_do_handshake() fails) SSL_get_error returns SSL_ERROR_SYSCALL, but ERR_get_error() returns 0. We are calling these two methods immediately after SSL_do_handshake().

Appreciate your assistance as this is going for some time.

How to organize big amounts of texts after several Ajax calls?

Sorry if this is a dumb question, I’m trying to figure out the more appropiate way to deal with some content presentation.

I have 10 category buttons on a page, each one is assigned to a div.

On those divs, I would show Ajax results, on the click of their specific button.

However, if people enabled all of the 10 buttons, the amount of text that would be shown would be too large, and unmanageable from a user interface point of view.

How should I resolve this situation and create an appropiate interface?

Is Ajax pagination a possible solution for me? How to combine separate Ajax calls with a generic pagination system? Otherwise, can you point me to some other ideas?

Thanks,

Should I regenerate SSL cerfecicates after upgrading Openssl

As you may already know old Openssl versions were vulnerable(OpenSSL 1.0.1 through 1.0.1f (inclusive)) by the HeartBleed vulnerability. currenly our server is running Tomcat7 which is built in a vulnerable Openssl, so we upgraded into Tomcat8 but we didn’t regenerated the SSL certeficates.

So my question is I wonder if we should regenerate the SSL certeficates with the new installed version Openssl, to avoid the Heartbleed vulnerability and may be performance issues?

Thanks for your help!

Starting with an initially empty AVL-tree, draw the resulting AVL-tree after insertion

Starting with an initially empty AVL-tree, draw the resulting AVL-tree after inserting the following elements one after another. 50, 70, 30, 10, 20, 15.

I’m not sure if I am doing it correctly since I am new to AVL trees. Do I rotate if there’s an inequality after the insertion or do I insert everything then only rotate the AVL tree?

Here’s my attempt:

  1. First I insert 50, 70, 30, 10, 20.
      50       /  \     30  70     /    10     \      20 

Then I realise there’s an imbalance so I do a rotation and get

      50       /  \     20  70    /  \   10  30 

There’s one more element to insert which is 15. so, I insert it into the tree

      50       /  \     20  70    /  \   10  30    \     15 

and there’s an imbalance again. So I rotate it

      20      /   \   10    50     \   / \     15 30  70 

My question here is do I insert everything then only rotate or rotate whenever there’s an imbalance while inserting? I did the latter. May I know if my approach is correct? I’m new to AVL trees. Thank you