Connecting to SQL Server from SSMA (the certificate chain was issued by an authority that is not trusted!)

I am trying to use SQL Server Migration Assistant for the first time from my home PC. I have SQL Server in one Docker container and Oracle in another. I can connect to Oracle from SSMA, however when trying to connect to SQL Server I see this error:

enter image description here

I have read plenty of questions on here that explain how to resolve the problem if it is seen when connecting from SQL Studio Manager e.g. this one: The certificate chain was issued by an authority that is not trusted. I have no problem connecting from SQL Studio Manager – just SSMA. How can I connect to SQL server from SSMA?

I have tried unticking ‘Encrypt connection’ on the SSMA SQL Server login window and I see the same error.

Connecting to Hidden Networks

I can see 1 of my 2 wifi networks. The 2nd wifi network doesnt show in my wifi pick list. One hidden network has a very strong signal, which leads me to beliwvw that it is my 2nd wifi network. I enter the SSID and the network security key (network password). It then says "do you want to allow your octo be discoverable by other pc’s and devices on this network". I hit Yes, and it says "Cant connect to this network".


Greg J

Connecting to a Postgres Database over SSL using Sockets in Python

I am trying to connect to a Postgres Database using sockets to enforce a particular TLS version from the client in order to verify that the Database does not accept connections from the client which uses an older version of TLS like tlsv1.1. The connection is failing on handshake with the following error :


Traceback (most recent call last): File "", line 12, in ssl_version=ssl.PROTOCOL_TLSv1_2) File "<>/python3.6/lib/python3.6/", line 1232, in get_server_certificate with context.wrap_socket(sock) as sslsock: File "<>/python3.6/lib/python3.6/", line 407, in wrap_socket _context=self, _session=session) File "<>/python3.6/lib/python3.6/", line 817, in init self.do_handshake() File "<>/python3.6/lib/python3.6/", line 1077, in do_handshake self._sslobj.do_handshake() File "<>/python3.6/lib/python3.6/", line 689, in do_handshake self._sslobj.do_handshake() ssl.SSLEOFError: EOF occurred in violation of protocol (_ssl.c:852)

The following is a snippet of the code:

    import socket     import ssl          hostname = <DB_Endpoint>     context = ssl.create_default_context()          with socket.create_connection((hostname, 8200)) as sock:         with context.wrap_socket(sock, server_hostname=hostname) as ssock:             print(ssock.version())      

PS: I am just trying to figure out a way to test if the Postgres Server rejects a connection from a client which only has

algorithm to find shortest path connecting EVERY node

I have received a problem to solve and I am not sure what algorithm to use.

TLDR; Find the shortest path to get to every node in a undirected graph

enter image description here

The problem states that one must visit every station in the shanghai metro in the shortest path possible. Interchange Stations (‘edges’) can be reused and you can start / stop anywhere.

I have created a lookup table that shows connected stations as well as the distance to travel (not shown)

"Xinzhuang": [   "Waihuan Rd." : 1 ], "Waihuan Rd.": [   "Xinzhuang": 2.2,   "Lianhua Rd.": 3 ], "Lianhua Rd.": [   "Waihuan Rd.": 4,   "Jinjiang Park": 5, ], "Jinjiang Park": [   "Lianhua Rd.": 9.1,   "South Railway Station": 10.3 ], "South Railway Station": [   "Jinjiang Park": 4.1,   "Caobao Rd.": 1.1,   "Shilong Rd.": 2.5 ], ... 

I found this leetcode problem but it did not mention any specific algorithm and since it was O(2^N * N) I wondered if there was a faster method than BFS.

Since my graph is so big, I was going to reduce the lines with a single path to a single node.

What algorithm can I use that will work in Polynomial time, OR has the least time complexity?

Connecting Google App Engine App with my subdomain

Our website is hosted with loopia at, but we also have a webapp running on Google App Engine which we would like to run on

We also have a couple of other subdomains running, but those are simply referred to via the IP address.

I have followed the steps at The Domain Mappings consist of four A, four AAAA and one CNAME records.

When I try to add all of them to (the documentation isn’t clear if this should be the domain or subdomain), I get an error saying there are colliding records. When I try to add them to, I’m able to add either the A’s and AAAA’s or the CNAME, but not both, or I’ll get a colliding record error again.

In both cases, just displays a Google backed 404 error, while is working without problems.

This is very similar to this question, except that we’re not using Google as our registrar.

How do I properly set up the DNS records so that the subdomain points to my webapp?

GnuPG – connecting to specific card reader when multiple reader available

Currently I can use

$   gpg --card-status 

to interact with smartcards that run the OpenPGP applet. Through trial-and-error, it seems that only the first card reader will interact with gpg. Using options that pass to scdaemon seem to be deprecated:

$   gpg --reader-port  1 --card-status gpg: WARNING: "--reader-port" is an obsolete option - it has no effect except on scdaemon 

Is there a way to interact with an OpenPGP smartcard that is not connected to the first card reader?

SSH fingerprints(GitHub) differ when connecting to different routers

You can see that the two fingerprints differ, the second(PcziX…) is the legit that can be found here:

I couldn’t find anything about the first(nThbg6…) So, what changed between attempt 1 and 2?

Attempt 1: I setup an old router yesterday as a repeater with OpenWrt. It is connected with WiFi to the main router and with ethernet to my PC.

Attempt 2: Directly connect to router WiFi with my PC


▶ git push origin master The authenticity of host ' (' can't be established. RSA key fingerprint is SHA256:PcziXGZE5iMp0Sm9dWn5qtfd/d7a+WOxIoQEL5pT33E. Are you sure you want to continue connecting (yes/no)? no Host key verification failed. fatal: Could not read from remote repository.  Please make sure you have the correct access rights and the repository exists. 


▶ git push origin master The authenticity of host ' (' can't be established. RSA key fingerprint is SHA256:nThbg6kXUpJWGl7E1IGOCspRomTxdCARLviKw6E5SY8. Are you sure you want to continue connecting (yes/no)?  

I clean flashed the router yesterday and checked the checksum too.

Any ideas what’s going on?

Connecting to REST server w/ digest auth using postman

Im having a hard time with a CTF, i managed to exploit a path traversal vulnerability that lead me to read a configuration file in php that indicates:

define('rest_auth', 'digest'); define('rest_username', 'webservices'); define('rest_password', 'thepassword');  define ("REST_SERVER_1", serialize (                                     array(                                           'server' => '',                                           'http_user' => rest_username,                                           'http_pass' => rest_password,                                           'http_auth' => rest_auth                                         )                                     ) ); 

The site is accessible by port 80 and its a login page, i tried using the credentials

define(‘rest_username’, ‘webservices‘); define(‘rest_password’, ‘thepassword‘);

but getting incorrect username and password.

I tried using postman to login to the REST server using a GET Request but it only responds with the source code of the login page. How can i access the data inside the REST server using postman and the credentials i have?

//EDIT How do i craft the URL request to show the data inside the REST server?


Can the ISP (or anyone spying on my WIFI network) see which VPN IP I’m connecting to?

I know that even when connected to a VPN, the ISP (or anyone who controls my WIFI network) could see that I am connected to (A VPN brand), what I would like to know is would they obtain the exact IP that I’m connected to.

As a side note, what could the ISP really see when I use VPN? I imagine packet size and frequency should be compromised, but what else? (MAC? hostname? DNS info?)