verification

Data verifications in Getter/Setter or elsewhere ?

I'm wondering if it's a good idea to make verifications in getters and setters or elsewhere in the code. This might surprise you be when it comes to optimizations and speed-ing up the code, I think you should not made verifications in getters and setters but in the code where your're updating your files or database. Am I wrong ?...

How do I change the default *.elog log file name for an interpreted Specman session?

I want to be able to specify the file name stem for the log file in a Specman test. I need to hard-code the main *.elog filename so that I don't get variance between tests and confuse the post-processing scripts. Is there a constraint or command line I can pass into Specman? ...

Code to verify updates from the Google Safe Browsing API

In order to verify the data coming from the Google Safe Browsing API, you can calculate a Message Authentication Code (MAC) for each update. The instructions to do this (from Google) are: The MAC is computed from an MD5 Digest over the following information: client_key|separator|table data|separator|client_key. The separator...

What online services mail coded postcards for address verification?

At about 24:20 in Stack Overflow Podcast 26 Joel Spolsky said there are services that mail postcards with codes for address verification. Spolsky: You know what we could have badges for? We could have badges for like: "Real Address". Like I have proven that you live at a certain address. Atwood: We could. Spolsky:...

Clients to upload data to central server using WCF, how to verify data was uploaded?

Hi, Less than 10 client computers, each with their own installation have to upload data to a central server. The client database looks like: tblSales - rowGuid - randomNumber Central Server database: rowGuid randomNumber dateInserted I plan to use WCF to send the files to the central server. How can I verify the rows were insert...

In Specman, how can I tell if a reference to a unit has the do-not-generate modifier in front of it?

In Specman, how can I tell if a reference to a unit has the do-not-generate modifier, '!', at the reference's definition? e.g. unit foo_u { }; extend sys { foo : foo_u is instance; foo_ptr_generated : foo_u; keep foo_ptr_generated == foo; !foo_ptr_notgenerated : foo_u; connect_pointers() is also { foo_ptr_notgene...

Verify certificate against Java certificate store via CLI

How can I verify an X509 (or DER-formatted) certificate against the Java certificate store via the command line? I've looked into using the keytool utility, but it looks like it only handles import/export/display functionality (no verification). EDIT: It looks as though keytool can be used for verification, but only if an import is at...

Verfying a database is as you expect it it be

I've been writing a java app on my machine and it works perfectly using the DB I set up, but when I install it on site it blows up because the DB is slightly different. So I'm in the process of writing some code to verify that: A: I've got the DB details correct B: The database has all the Tables I expect and they have the right colum...

Determining the health/validity of an email address

Routine maintenance on a website often involves verifying that links are valid, flagging bad ones, etc. I know how to match email addresses via a script (especially in the context of a web page where they'd be in mailto: links). My question is how would I verify they're OK without spamming the address? Stripping-off the domain and veri...

What's the probability that X *consecutive* bits in an array of N bits is set to 1?

I'm trying to code a simple, sufficiently accurate filter for validating a piece of hardware in an RTL simulation. We're simulating the randomness inherent in a chip's flip-flops, by randomly initializing all the flip-flops in the design to either 0 or 1. This corresponds to the chip's flip-flops getting some random value during power-...

Is using 2 different hash functions a good way to check for file integrity?

I have a website where users can upload their files; these are stored on the server and their metadata recorded in a database. I'm implementing some simple integrity checks, i.e. "is the content of this file now byte-for-byte identical as when it was uploaded?" An example: for content of userfile.jpg, MD5 hash is 39f9031a154dc7ba105eb4f...

fingerprint verification

hi. i am doing my final year proj in fingerprint authentication. i 've completed binarization, thinning, minutiae extraction. i am doing it in matlab. i am stuck with the verification. i don't know how to perform verification. so please help me out to solve this problem. i would be grateful to ppl who help .. thanks in advance. please he...

Prevent visitors from opening certain pages

I have as ASP.Net 2.0 website with SQL Server as database and C# 2005 as the programming language. The website is almost complete and all the links are working fine. But I want to prevent normal users from opening a couple of pages. When any user clicks on those specific links, another page opens which contains a ASP Login control. The u...

How to handle translation of UI widgets in a massive project?

I am working on a large Java 1.4.2 project (~3000 files...) that contain lots of GUI widgets. There is a requirement to translate all text on the UI widgets to different languages (Italian, French, German), only European languages at this point. How would you go about designing a solution for such a problem? How would you verify that ...

Exporting tasks to 'C using DPI

I have an verilog based test-bench, interfaced to 'C source using DPI. Now using DPI I am planning to write my whole firmware. To do this I need 3 things Register Read Register Write Interrupt handler As I understand, register reads and writes are tasks that I need to export from the RTL test-bench. And Interrupt handler (I implemented...

How to handle ssh host key verification with 2 different hosts on the same (but changing) IP address?

I have 2 ssh servers behind a nat firewall at a location that changes its wan IP every day. They are always at the same wan IP address on a given time but on different ports. I am connecting to server A this way: ssh -p 22001 [email protected] and to server B: ssh -p 22002 [email protected] So I get 2 different host keys for t...

Online fingerprint authentication

Hi there; The company has a web-based punch card application, but my boss wants to make employees punch in and out using their fingerprint rather than sharable passwords. Is there any free/open source/commercial SDKs that can be used? With a Java or ActiveX based embeddable component? Thanks in advance. ...

URL Verification in multi-tenant architecture

what would be the best way to verify URLs in a multi-tenant architecture web-app to make sure that a user from one org does not gets access to the another org's data simply by changing the query string parameters. I dont want to be doing a verification on each page load. the app is being built on ASP.net 3.5. ...

Captcha algorithm

I've notised that Stack Overflow only presents me with a captcha occasionally. Does anyone know if it has a good algorithm for sensing if I might be a robot or, instead if it's just random. Reducing reliance on captchas is obviously a good thing. ...

XML signature verification library in C ...

Are there any available libraries in C language to verify XML signatures ? , I could only find one library for C++ from http://santuario.apache.org/c/index.html. ...