node js -> Sharepoint behind proxy

The situation:

  • Node Express.js app connects to SharePoint via pnp.js (REST)
  • this app MUST route through a proxy


  • How can I force the node express.js app to use the proxy ?

In powershell:

  • Invoke-WebRequest https://domain.x : NOK
  • Invoke-WebRequest https://domain.x -Proxy : OK

So I think I need the equivalent of the -Proxy parameter in my Express.js app.

Thanks for any pointers.

Idea behind using binary search to solve rolling ball?

What is the idea behind using binary search to solve this problem:

There is a segment of length meters, and there are $ L$ positions on it, numbered $ 1,2,…L$ , equally spaced by 1 meter apart each, in the given order. There are $ n$ balls on it, at positions $ s1, s2,…s_n$ . Each ball is either rolling to the left of to the right at the speed of 1 meter/second. Whenever two balls hit each other, both of them change direction instantly but keep the same speed. A ball also changes direction when it reaches one of the ends of the segment (position $ 1$ or $ L$ ). You are given $ q$ queries, each one gives you two numbers $ t_i$ and $ p_i$ , and you should output the position of the $ p_i$ -th ball after $ t_i$ second.

My solution moves the ball after every second and does not use binary search:

for query in range(q):   for ti, pi in array_ti_pi:      ti = ti % (2 * L - 1)      for i in range(n):         if dir[i] == 0:             balls_pos[i] = balls_pos[i] - ti         else:             balls_pos[i] = balls_pos[i] + ti      for i in range(n):         if balls_pos[i] < 1:             balls_pos[i] = 2 - balls_pos[i]         elif balls[i] > L:             balls_pos[i] = 2 * L - balls_pos[i] 

What is the rationale behind two staged credential input these days? [duplicate]

This question already has an answer here:

  • Is having the username and password fields on different pages more secure? 5 answers
  • Why do some sites ask for username/email and password on two separate screens? [duplicate] 6 answers

I have begun to notice some apps and websites (particularly ones made by Apple) which present user login in two steps. In the initial state, only the username/email field is shown. Once you enter a value and press return, then the password field appears.

What is the logic behind hiding this field initially? The field appears too quickly to believe that the app has validated your username/email with a remote service.

Is it possible to send packet to IP address behind NAT if you know public and local IP?

So I’m playing with WebRTC and I’ve found that you can get public IP and local IP of other computer.

Here is my code that show IP (the code is used to transfer the files between computers but it also show the IP of other party).

Can I with this information some how send a packet to the other party? Or the route the packet travel is something that is decided by routers and protocols.

Can anyone do something with this information to harm the person behind the NAT?

Nodejs pnp-auth (adfs) behind corporate proxy

We have a node/express app that connect to SharePoint onprem using pnp-auth and node-sp-auth-config. (IE connection settings : automatic) Works like a charm

Moving this app to another server On that server IE connection needs to be on manual proxy config to make be able to connect to SharePoint via the browser

For the node app the result is : nodejs app cannot connect to SharePoint “FetchError: request to ….. failed, reason: connect ETIMEDOUT …..:443 at ClientRequest. (d:\NODE\QOMV-CRExport\node_modules\pnp-auth\node_modules\node-fetch\lib\index.js:1444:11) at ClientRequest.emit (events.js:182:13) at TLSSocket.socketErrorListener (_http_client.js:392:9) at TLSSocket.emit (events.js:182:13) at emitErrorNT (internal/streams/destroy.js:82:8) at emitErrorAndCloseNT (internal/streams/destroy.js:50:3) at process._tickCallback (internal/process/next_tick.js:63:19)”

Anybody any pointers how to solve this ?


I don’t know how to identify the password behind the hash

so I am total noob at this , just starting out. I found online an web app that is vulnerable to blind sql injection, I manage to get in users table and I looked at my password, in the table was the hased version, this one->57b0fcbe39b9336d, now I know that my password is dinamo, knowing the hashed version and the original password how I can use this informations to find out the hashed method?

Can allies take cover behind my tower shield?

I am a champion who is wielding a tower shield. I raise my shield, and then Take Cover. On their turns, can my allies attempt to take cover behind my tower shield also?

The Take Cover action requires:

You are benefiting from cover, are near a feature that allows you to take cover, or are prone.

It isn’t clear to me if an ally standing behind my tower shield is benefiting from cover, or if my shield is a “feature that allows you to take cover”.