How can I get LOAD DATA LOCAL INFILE to work for MySQL 8.0.21 on a Windows machine?

I’ve created a file: 'C:\fff.txt' which contains data for my database table. Then I’m trying to load data from that file like this:

LOAD DATA LOCAL INFILE 'C:\fff.txt' INTO TABLE fff LINES TERMINATED BY '\r\n';  

but I get the following error all the time:

ERROR 2 <HY000>: File 'C:\fff.txt' not found (OS errno 2 - No such file or directory) 

I’ve added local_infile=1 to [mysql] and [mysqld] sections of my.ini file. When I type: SHOW GLOBAL VARIABLES LIKE 'local_infile'; I can see that it’s set to 'ON'. Is there a way to solve this problem?

How important is initial state for local search optimisation?

I have been enjoying Pascal van Hentenryck’s Discrete Optimisation course and we’re in Week 4 on the wonders of Local Search algorithms for combinatorial optimisation.

I’m wondering how important the initial configuration is to the quality of solution achievable in a fixed time or, somewhat equivalently, how quickly a solution of a given quality can be reached.

So if I have a good heuristic or intuition for how to arrange things in the first place, is it helpful to devote some processing time to setting that up or is it all dominated by the effect of the local search process?

For example, in the Cartesian Travelling Salesman Problem (where we’re working in a 2D plane and the cost of a journy is simply the straight-line distance) I might "feel" that a good route could roughly follow a clockwise sweep from the centre of the space. So I could use this to set my initial tour (i.e. order the nodes by their angle from the mean of all points). This intuition might be rubbish for certain instances and great for others, I was hoping to see a study where (let’s say random TSP) instances had been solved by following a heuristic first state as opposed to a completely random (but legal) first state.

Is there any chance of local PC getting infected when you analyse PCAP malware file in cloud server through putty?

Is there any chance of local PC getting infected when you analyse PCAP malware file in cloud server through putty?I want to run pcap malware to test snort in my cloud server.I want to know on doing so if it will affect my local machine.

/wp-admin not accessible after migrating to local host (no plugin issue)

I migrated my local WordPress site to my WPEngine account and it’s been working without any problem!

After adding some content, I decided to export the database from the live version and import it to my local version so that they are synced. I adjusted the two siteurl and home fields in the database and the home page (https://localhost:8888) comes up well but the /wp-admin page is forced to https and responds with ERR_SSL_PROTOCOL_ERROR error.

All the other pages of the website cannot be loaded and return this error: Not Found The requested URL /news was not found on this server.

It seems like a "permalinks" reset problem for inner pages!

All these problems would go away if I switch the database back to the one I was using for local version so I’m pretty sure it’s a database issue!

Thanks

Getting the hostname of devices in the local lan

I’m trying to get the hostnames of devices on my LAN.

This network is not a Windows network.

Up until now I was able to sniff DHCP requests and extract the hostname from there, but it looks like Android devices starting from Android 10 stopped filling out that particular field.

(I’ve also tried sending a netbios query)

Is there another way to coerce devices to tell me their hostnames?

Problems with using a non-reserved top-level domain for local DNS resolution

A network administrator at my organization (let’s call him "Bill") wants to configure an internal DNS with the live top-level domain (TLD) .int for internal IP address resolution (for Active Directory, internal websites, etc.). For example, the domain exampleinternalsite.int would resolve to the some internal site that isn’t visible to the public. Our organization has not registered these domain names with a registrar. Now I know that this is bad practice, but Bill remains unconvinced that this shouldn’t be done.

What are the problems with using a live top-level domain for internal name resolution? Specifically, what are the security implications? In addition, does this somehow conflict with some fundamental way on how DNS and name resolution is supposed to work?

Note: I originally asked this question on Network Engineering SE and was kindly referred over to this site as a better place for this question.

Metasploit unable to get local issuer certificate

I got the following versions: Framework: 5.0.86-dev Console: 5.0.86-dev

The os that metasploit is installed are windows 10.

I get a meterpreter session with an android device (genymotion virtual machine) device and desktop are on the same network and also device has enabled gps with pre-defined lat & long and when I enter the following command in meterpreter:

run post/multi/gather/wlan_geolocate APIKEY=my google map API key (clean, without quotes or anything else) GEOLOCATE=true

I get the result in the photo with the error as I describe in the title, does anyone know if its a version SSL problem or something? how and where to search to fix this problem?

enter image description here

Local file inclusion in JS written app

I am working on a project which requires the name of the page as a query parameter ‘path’ and the app stores path variable as res.query.path, so I’m concerned about LFI because my manager asked me to pay attention to it specifically. The app is using JS(express) and no PHP, so my first question is if the input is not handled carefully is it still vulnerable to PHP wrappers? and secondly, I’ve written a small function to sanitize user input, please tell if it vulnerable in an environment where path parameter is being prepended using: function prepare(dir){ return path.resolve('./public/' + dir) } for getting absolute path. and then used as input to res.sendFile().The following code removes the first character if not alphanumeric

function strip(dir){ const regex = /^[a-z0-9]$  /im  if(!regex.test(dir[0])){     if(dir.length > 0){         return strip(dir.slice(1))     }     return '' }  return dir } 

To be on the safe side I’ve also added

//Prevent directory traversal attack function preventTraversal(dir){     if(dir.includes('../')){         let res = dir.replace('../', '')         return preventTraversal(res) }   //In case people want to test locally on windows if(dir.includes('..\')){     let res = dir.replace('..\', '')     return preventTraversal(res) } return dir } 

The app’s request flow goes like this:let path=req.query.path => uses path=strip(path) => path =preventTraversal(path) => res.sendFile(prepare(page))