## Design for grouping undo steps when editing text

Some undo for text editor editors handle text input differently.

• Every key press is a single undo step.
Typing in a word N characters long, requires N undo steps.
• Undo steps use word boundaries
Undoing will undo each word entered.
• Undo steps use timer-based boundaries
If you stop typing N milliseconds – this adds an undo step.
• Undo steps add boundaries every N characters entered.

Given these different ways of handling undo for text input, are there strong reasons to pick one of these over another?

## What are the exact steps to establish a HTTPS/SSL connection?

Before asking this question I got through a lot of posts for finding a simple explanation about:

• How an HTTPS/SSL connection establishes?

but I could not find a good one, in addition here, i can ask more question until it becomes clear for me, it may also be helpful for many others. And also there is another question Related to this topic:

• How the client generates the privet key?

## Auto-skipping steps on progress trackers

We are implementing a progress tracker for a 3 step task. However, step 2 (‘review step 1’) is not always applicable; it’s only applicable if one validation check after the submission of step 1 fails. If the check PASSES, should we jump straight to step 3 and skip step 2? Or should we always go to step 2?

The steps are visible on the UI, so I’m concerned users may see they’ve gone from step 1 to 3 without understanding why. However, taking them to step 2 is a bit pointless, as the only action they’ll have to do is ‘go to step 3’. In essence, we’d be saving them a click.

Thanks

## Minimum steps involved for an effective and efficient website redesign process?

I just started working for a web development agency, we work mainly with government so we want to align ourselves within that market with a professional, creative and functional website. We have a great blog and want to highlight our content and whitepapers, plus who we are, our vision and services.

We just started the Discovery phase of the project, and are in the process of doing personas and user journey mapping. I work there in project support and partly as a junior UX designer, alongside the contract designer, who is more of a UI designer than a UX designer, so it’s a bit of a learn as we go process. BUT we have a pretty strict deadline of Christmas where we’d like to have the final designs signed off, so we can start developing the site in January.

Our current plan/timeline is: – initial planning including pain points and wants for our existing website (done) – persona planning (done) – user journey mapping and doing value journey canvas for our 4 personas (in process) – content analysis – IA card sorting, treejacking, review and iteration – component mapping and content architecture – sketching session of new components – wireframing all vanilla pages – wireframing custom pages – prototyping key user journeys for customer testing – customer testing script – audience testing – prepare customer insights deck to present – presentation of customer insights – refine prototypes/wireframes – UI: Theme and Brand – UI Review

Which is quite a lot and definitely won’t get done by Christmas this year. So my question, is what is the absolute minimum process required for doing a website redesign?

## Undecidable: $w$ on which a TM M $M$ halts after $\leq w$ steps

The detailed question is:

Is there a word $$w$$ on which a TM M $$M$$ halts after a maximum of $$|w|$$ (word length) steps?

I highly assume, that this problem is not decidable because in the worst case you have to test every word that exists (infinite) to realize, that the TM never holds. However this isn’t a proof and I have to proofe this question (without the Rice’s theorem).

My idea was to use the subroutine technique to “convert” the problem into the halt-problem, the $$\epsilon$$-halt-problem or the total halt problem. I have no idea on how to turn this problem into an existing one – could you help me here please?

## Port Scanning: Question about next steps after Zenmap port scan

I am very new to offensive security

I have done a nmap scan on a public IP, its showing 4 ports open and the OS is undetectable, I have no idea how to proceed further, I appreciate any next steps further in this case. Below is a snippet from nmap output:

Not shown: 995 closed ports PORT     STATE    SERVICE      VERSION 25/tcp   filtered smtp 135/tcp  filtered msrpc 139/tcp  filtered netbios-ssn 445/tcp  filtered microsoft-ds 6009/tcp filtered X11:9  Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Aggressive OS guesses: ISS Proventia GX3002 firewall (Linux 2.4.18) (97%), Linux 2.6.22 (Debian 4.0) (97%), CMI Genus NEMA terminal (95%), D-Link DGS-1210 switch (95%), D-Link DI-604 wireless broadband router (95%), Efficient Networks SpeedStream 4100 ADSL router (95%), FreeBSD 6.1-RELEASE (95%), IBM i 6.1 (95%), Cobalt Qube 2700WG (Linux 2.0.34) (95%), Linux 2.4.20 (95%) No exact OS matches for host (test conditions non-ideal). 

## Real time filtering or Wizard steps

At this moment, I’m working on a product finder tool. By answering different questions, you get advice that suggests a product of your interest. So, the answers to questions could lead to different follow-up questions. This process isn’t linear.

I notice while designing that there are different ways to approach this. – A Wizard gives clear steps that help to create focus and guides through finding the right product. – At the same time, we want to create something which provides the user with the possibility to realtime change things and play around with the settings to get a different result very fast. But I noticed that accordions are getting though and not the flexibility that we want.

I put some quick wireframes to give a better understanding of the context. Any suggestions on this case? Examples are appreciated!

## Real time filtering vs. Wizard steps

At this moment, I’m working on a product finder tool. By answering different questions, you get advice that suggests a product of your interest. So, the answers to questions could lead to different follow-up questions. This process isn’t linear.

I notice while designing that there are different ways to approach this. – A Wizard gives clear steps that help to create focus and guides through finding the right product. – At the same time, we want to create something which provides the user with the possibility to realtime change things and play around with the settings to get a different result very fast. But I noticed that accordions are getting though and not the flexibility that we want.

I put some quick wireframes to give a better understanding of the context. Any suggestions on this case? Examples are appreciated!

## Maximum number of steps using Euclid’s Algorithm

Using Euclids algorithm, is it true that the maximum number of steps of $$GCD(a, b)$$ is at most $$b$$ when $$a\geq b> 0$$? And if so why?

## What are the steps necessary to perform a Denial of Service (DoS) attack, assuming i have someones IP?

I am trying to learn much much more about computers and the hacking realm. I am very new at this, and i have been studying endlessly for answers. I went on TOR and asked this same question, but to only be greeted with most likely malware apps wanting me to download. So here i am, asking you fine folks, how do i run a successful DoS attack? This is one of the most simple attacks out there, and yet i have no idea how to perform one. From what i understand about computers, when you send a network IP packets of bytes, it breaks down the packets so it can process them, so how tf do you send enough packets of bytes to completely crash the network/ overload the network?