20.6 C
New York
Thursday, April 3, 2025
Home Blog Page 3812

How one can arrange pgSQL for Fluent 4?



· 2 min learn


This can be a tutorial for inexperienced persons about utilizing PostgreSQL. I will present you the best way to robotically backup and restore the database.

NOTE: If you’re already accustomed to PostgreSQL, however you don’t know a lot about the best way to use databases in Vapor, you must learn my different tutorial about Fluent for inexperienced persons.

A fast intro to PostgreSQL

PostgreSQL is an open supply database, it’s obtainable for macOS, Linux and another working methods. You’ll be able to set up it through the use of the de-facto bundle supervisor on each platform. 📦

# Linux
sudo apt-get set up postgresql postgresql-contrib
sudo service postgresql begin
# verify service standing
sudo service --status-all
sudo service postgresql standing

# macOS
brew set up postgresql
brew companies begin postgresql
# verify service standing
brew companies record

You’ll additionally must set a correct password for the postgres consumer, which is the admin consumer by default with godlike permissions. You’ll be able to change the foundation password, you simply need to log in as a root & alter the postgres consumer report with the brand new go. 🔑

# Linux
sudo -u postgres psql postgres
# macOS
psql -U postgres

# psql (12.1)
# Sort "assist" for assist.
#
# postgres=#

# ALTER ROLE
alter consumer postgres with password 'mypassword';

# exit
q

To any extent further you’ll be capable to entry pgSQL as root on each platforms like this:

psql -h localhost -U postgres

It is strongly recommended to make use of a devoted consumer for each single database that you simply create as an alternative of working with a shared root consumer. Let me present you the best way to create a brand new DB with an related consumer.

# Checklist of databases
l
# Present present database
choose current_database();
# Create new database
create database mydb;
# Change database
c mydb
# Create consumer
create consumer myuser with encrypted password 'mypassword';
# Grant privileges for consumer on the database
grant all privileges on database mydb to myuser;
# Stop from psql console
q

That’s it, you’ll be able to handle your database through the use of the newly created myuser account.

# Log in again to psql console with myuser utilizing mydb
psql -h localhost -U myuser mydb
# Checklist all tables
dt
# Describe desk construction (can be helpful in a while)
d+ 

You'll be able to study extra about SQL instructions utilizing this pgSQL tutorial web site.

WARN: The command beneath can fully wipe your database, be extraordinarily cautious!

Now you're able to mess around with Fluent, however earlier than we begin I’d like to point out you some extra ideas & methods. Throughout growth, issues can go improper and also you would possibly want a contemporary begin in your DB. Right here’s the best way to drop & reinitiate all the pieces. 😱

# Reset database
c mydb
drop schema public cascade;
create schema public;
grant all on schema public to postgres;
grant all on schema public to myuser;
grant all on schema public to public;

The snippet above will delete the public schema, subsequent it’ll recreate it and add all the required permissions for the required customers. It’s fairly easy however nonetheless harmful. ⚠️

NOTE : You'll be able to execute SQL scripts straight from the terminal through the use of the next command: psql -h localhost -U myuser mydb -c "choose * from mytable;"

You'll be able to wipe all the pieces from the command line utilizing this “one-liner”:

# Run psql command from the command line
psql -h localhost -U postgres mydb
    -c "drop schema public cascade; 
    create schema public; 
    grant all on schema public to postgres; 
    grant all on schema public to myuser; 
    grant all on schema public to public;"

I favor to have each day backups from all my databases, this little shell script can do the job.

#!/bin/bash

# Backup database
BACKUP_DIR=/Customers/tib/backups
FILE_SUFFIX=_pg_backup.sql
OUTPUT_FILE=${BACKUP_DIR}/`date +"%Y_percentm_percentd__percentH_percentM"`${FILE_SUFFIX}
PGPASSWORD="mypass" pg_dump -U myuser -h localhost mydb -F p -f ${OUTPUT_FILE}
gzip $OUTPUT_FILE

# Take away previous backups
DAYS_TO_KEEP=30
discover $BACKUP_DIR -maxdepth 1 -mtime +$DAYS_TO_KEEP -name "*${FILE_SUFFIX}.gz" -exec rm -rf '{}' ';'

You'll be able to simply restore a database from a backup by coming into the next strains to the terminal:

# Restore database
gunzip -k file.gz
psql -U myuser -d mydb -1 -f mybackup.sql

Typically after I restarted my mac it occurred to me that the PostgreSQL stopped working. I needed to run the snippet beneath to repair the problem. The primary line stops the service, the second initialize a brand new database, and the third will begin the service once more. Alternatively, you can begin the database once more with the brew companies begin postgresql command.

pg_ctl -D /usr/native/var/postgres cease -s -m quick
initdb /usr/native/var/postgres
pg_ctl -D /usr/native/var/postgres -l /usr/native/var/postgres/server.log begin

I’m not a DevOps guru, be happy to tweet me if you recognize why this occurred to me. 😅

Associated posts


As a newbie server aspect Swift developer you will face many obstackles. I will present you the best way to keep away from the commonest ones.


Learn to construct a controller part that may serve fashions as JSON objects by a RESTful API written in Swift.


Get began with server-side Swift utilizing the Vapor 4 framework. Learn to construct a extremely easy HTTP/2 backend server.


Learn to implement Asynchronous JavaScript and XML (AJAX) calls utilizing Leaf templates and Vapor 4 as a server.


Practical Server Side Swift cover image

Get the Sensible Server Aspect Swift e-book

Swift on the server is a tremendous new alternative to construct quick, secure and scalable backend apps. Write your very first web-based software through the use of your favourite programming language. Learn to construct a modular weblog engine utilizing the most recent model of the Vapor 4 framework. This e-book will allow you to to design and create fashionable APIs that'll assist you to share code between the server aspect and iOS. Begin changing into a full-stack Swift developer.

Accessible on Gumroad

It is Time To Untangle the SaaS Ball of Yarn

0


It is Time To Untangle the SaaS Ball of Yarn

It is no nice revelation to say that SaaS purposes have modified the best way we function, each in our private {and professional} lives. We routinely depend on cloud-based and distant purposes to conduct our primary capabilities, with the outcome that the one true perimeter of our networks has develop into the identities with which we log into these providers.

Sadly – as is so typically the case – our urge for food for higher workflows, collaboration, and communications outpaced our willingness to ensure these instruments and processes have been safe as we hooked them into our environments, handing off our management of the safety of our knowledge. Every of those purposes asks for varied quantities of permissions into our knowledge, which regularly depend on different distributors’ providers, creating not a community, however a tangle of interdependent intricacies that has develop into so complicated most safety and IT groups do not even know what number of SaaS purposes are linked in, not to mention what they’re or their entry permissions.

Our collective – and comprehensible – temptation for flexibility and scalability led us to the place we at the moment are: most of us cannot function in trendy companies with out SaaS purposes as a result of they’ve develop into so important to our operations, but are discovering themselves weak to assaults on these cloud-based providers and purposes.

Risk actors perceive the “as-a-service” mannequin simply in addition to anybody, typically promoting Ransomware-as-a-Service on the darkish internet to their associates. They perceive that attacking these third-party SaaS software distributors results in not only one firm’s crown jewels, however many. We noticed a 68% rise in assaults from third-party apps in 2023, and researchers all agree that quantity will solely go up as SaaS adoption continues to rise.

Fortunately there are steps to take to untangle this ball of SaaS yarn IT and safety groups worldwide are left to cope with.

Discover ways to achieve visibility into the information publicly shared out of your SaaS apps

Perceive your SaaS setting and shadow IT

It appears so easy: if it’s essential to safe one thing, it’s essential to know it is there first. As we all know, although, in relation to SaaS, it is by no means easy.

Shadow IT – any instruments or applications which might be put in and have entry to the corporate’s knowledge with out the IT and/or safety groups realizing about it – is rampant. Suppose: when somebody in advertising and marketing wants to make use of a brand new design instrument obtainable as a SaaS software, they log in, grant it entry to your shared information for straightforward uploads and/or downloads, and so they do not wish to undergo IT to have it authorised due to any variety of causes (it takes too lengthy, the appliance would possibly get denied, they’re on a good deadline, and so on.). These purposes typically have immense quantities of visibility and permissions into firm knowledge with out anybody on the safety aspect even realizing they exist or searching for suspicious conduct.

To know the scope of the issue and why getting a full view of your SaaS setting, let’s do some tough math.

  • Most companies have, on common, ~500 enterprise purposes linked to their setting.
  • Of these, ~49% are sanctioned/authorised by IT/safety and ~51% are unsanctioned purposes.
  • Every software sometimes has 9 customers per app
  • If we multiply the variety of customers per software (9) by the variety of unsanctioned apps (~255), that equals a median of 2,295 doubtlessly distinctive assault vectors that IT and safety groups haven’t any perception into and risk actors love to take advantage of.

This is the reason understanding what number of purposes are hooked into your setting, what they’re doing, what their permissions are, and their exercise is a very powerful step. These permissions and oversight additionally must occur repeatedly: you by no means know when somebody would possibly bypass IT and add a brand new app or service and grant it full entry to your knowledge.

Uncover all purposes linked to your knowledge, together with shadow apps

Shut the open roads to your knowledge

Upon getting a deal with in your purposes, it is time to mannequin your permissions and guarantee these purposes and customers aren’t over-permission. This requires fixed monitoring, as properly: typically these purposes would possibly change their permissions constructions to require extra entry with out making that clear.

Not too long ago, the rash of high-profile breaches all related to cloud storage vendor Snowflake has truly highlighted how weak organizations typically are on this respect. Ticketmaster, Santander Financial institution, and Advance Auto Components all fell sufferer to the identical assault, which was the results of previous stolen credentials, a third-party storage supplier (Snowflake) permitting these cloud storage vaults to be arrange with out an IDP or MFA, and corporations sidestepping finest practices to arrange their large knowledge to be protected solely by passwords.

To take step one in securing their SaaS ecosystem, corporations should basically map it out: understanding all linked apps, related identities, and actions. This may be labor intensive and it’s simply the tip of the iceberg. There’s additionally hope that workers at fault will come clear about using an unsanctioned app.

To stop a breach corporations should:

  • Learn about all used SaaS purposes (each the identified and unknown), particularly these with deep entry wants or maintain proprietary/buyer knowledge
  • Guarantee these high-risk purposes are protected with IDP, MFA, and so on.
  • Guarantee customers of these purposes aren’t overprivileged
  • Be alerted and capable of take swift motion when the purposes and/or knowledge by them is accessed and/or moved in suspicious methods

This kind of entry, permissions, and utilization monitoring maintain the additional benefit of serving to your organization keep compliant with any variety of businesses and/or regulators. In case your knowledge is breached attributable to a breach from a 3rd occasion, not realizing concerning the software and its entry to the information is not properly acquired. This kind of monitoring should additionally not come on the expense of usability, both, as we see in our present state of affairs of rampant shadow IT.

Study how one can be notified of customers with out MFA enabled in your SaaS apps

In conclusion: safe how your corporation is working

Clearly, SaaS purposes are right here to remain, from gross sales enablement to database administration to AI instruments. It is thrilling and has opened up alternatives for us to work in new, progressive methods and locations. As we acknowledge this, it is also time to start out unraveling the SaaS ball of yarn that has develop into our surroundings.

As risk actors discover increasingly of those nodes of failure and dependency on this tangle, they are going to get higher at exploiting them with larger – and extra devastating – breaches. The extra we prioritize securing the best way we truly work, the extra we’ll be capable to accomplish.

Notice: This text is expertly written and contributed by Dvir Sasson, Director of Safety Analysis at Reco.

Discovered this text attention-grabbing? This text is a contributed piece from one among our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we submit.



Organ donations have an issue: 1000’s of pancreases are unaccounted for

0


There are some mysteries that I concern I’ll by no means see resolved. Who was DB Cooper and what occurred to him? Who robbed the Gardner Museum of its Vermeer and Rembrandts in 1990? And, most pressingly: the place are the 1000’s of pancreases taken out of Individuals’ useless our bodies in 2021, 2022, and 2023 that had been by no means transplanted into anyone?

Let me again up. Pancreata (the right plural type of “pancreas”) are a type of organs you possibly can’t stay with out. With out one, you don’t have insulin to manage blood sugar or enzymes essential to digest meals. So all donated pancreata come from useless individuals who register as organ donors. Within the US, we outsource the job of accumulating organs from useless our bodies to personal teams referred to as organ procurement organizations, or OPOs. Every OPO has a monopoly on organs in a selected geographic space; there are 56 teams whole, a few of which solely cowl a part of a state and a few of which cowl a number of states.

For a while now, unbiased analysts and investigative reporters have argued that OPOs are underusing deceased donor organs by the tens of 1000’s. One report from 2019 estimated that yearly 28,000 usable organs (principally kidneys but in addition pancreata, hearts, livers, and many others.) from deceased donors are by no means used; one other put the quantity at 75,000. This, when the nationwide waitlist for organs is greater than 100,000 individuals lengthy.

Traditionally, OPOs have confronted perverse incentives. As an example, they had been most frequently evaluated on the idea of what number of organs are recovered per “eligible demise,” however “eligible demise” is a willpower made by the OPOs themselves. That made it straightforward to juice the stats by, as an illustration, classifying some deaths as “ineligible” even when the organs had been completely usable. That made “organs recovered per eligible deaths” go up with out truly getting extra individuals organs. OPO contracts with the federal authorities are fairly profitable, which implies OPO executives have ample cause to combat laborious to retain them.

In 2019, President Donald Trump issued a fairly good govt order instructing the Facilities for Medicare and Medicaid Companies, which oversees OPOs, to alter the best way they’re evaluated. The order led to 2 new metrics that had been meant to be tougher to sport. The rule was finalized in December 2020, and — after additionally being reviewed and permitted by the Biden administrationtook impact in March 2021. It got here with actual tooth: OPOs that did significantly badly would face decertification, which means one other OPO with a greater monitor document of serving sufferers would take over their territory.

The rule had the potential to power OPOs to gather extra organs and save 1000’s extra lives yearly. However the OPOs rapidly found out a brand new loophole.

The start of the pancreas loophole

The rule’s new metrics had been meant to be primarily based on goal standards. It requested OPOs to tally the entire variety of deceased individuals 75 and youthful with causes of demise suitable with donation, after which estimate the variety of deceased donors annually as a share of that whole inhabitants, and the variety of organs truly used as a share of that whole inhabitants. The denominator was now one thing that OPOs couldn’t tamper with. That meant, hopefully, that they’d be judged solely on what number of organs they recovered and transplanted into individuals — on what number of 1000’s of lives they saved.

However whereas OPOs couldn’t muck with the denominator anymore, they might nonetheless muck with the numerators. Being a donor usually signifies that your organs are utilized in a transplant, however there’s a carveout for one organ: the pancreas. A slender 2004 regulation permits researchers working scientific trials to conduct transplants of islet cells (the components of the pancreas that produce insulin) as a possible treatment for diabetes. Due to that regulation, OPOs might “recuperate” pancreases for islet cell transplant analysis, and get credit score for recovering extra organs below the brand new rule. However the federal authorities by no means requested for any proof that these organs had been a part of any FDA-approved analysis.

Certain sufficient, the entire variety of pancreata that OPOs labeled as for “analysis” grew from 513 in 2020 to a whopping 3,238 in 2023. The variety of donors whose solely recovered organ was a pancreas designated for analysis grew from 25 to 429, in response to the Organ Procurement & Transplantation Community. That’s an over tenfold enhance in three years.

Final yr, Lenny Bernstein, a reporter on the Washington Put up who’s been watching this scandal intently, talked to pancreatic researchers who all reported there was no sudden surge in want for pancreases in analysis tasks. Certainly, for those who have a look at the small handful of medical facilities that use analysis pancreata for islet cell transplants, you discover that there have been solely 24 transplants performed in all of 2023: 22 on the College of Chicago Medical Middle, and one every at Metropolis of Hope Medical Middle exterior Los Angeles, and on the Hospital of the College of Pennsylvania.

That’s 3,238 pancreata recovered for islet cell transplant analysis in 2023, and solely 24 precise transplants performed that yr. The place did the opposite 3,214 pancreata go? The place did the practically 7,000 pancreata taken from useless Individuals’ our bodies over the previous three years and never used for transplants go?

The ready checklist for individuals needing simply pancreata is barely 800 individuals. That quantity might be zero if these organs had been higher allotted. The place are they?

I requested the Affiliation of Organ Procurement Organizations (AOPO), a type of commerce group for the organ procurers, for a proof. “CMS developed and applied the present rule governing the usage of pancreata for analysis in 2021. As is required, OPOs have been complying with the rule since that point,” AOPO’s president Dorrie Dils advised Vox in an announcement. “OPOs have at all times adopted CMS steerage and can proceed to take action.”

That’s one interpretation. One other is that we might be seeing an try by OPOs to get round laws, and keep away from being decertified as a result of they don’t facilitate sufficient donations. That’s definitely how the Senate Finance Committee, the place a bipartisan group of senators has been investigating the matter, sees it. In a letter to OPOs despatched final yr, the committee quoted from a listserv of OPO workers. In a thread discussing the brand new guidelines, an OPO worker wrote, “If in case you have a donor with solely a pancreas for analysis, that’s an organ donor for the Donor Fee. In any other case, a donor is any donor with at the least 1 organ transplanted. Savvy (or cynical?) OPOs ought to begin a pancreas for analysis program instantly.”

Savvy (or cynical?) certainly! In a reply to the committee, AOPO protested that “OPOs have been working in response to the rule” and that the analysis donations imply “the organ doesn’t go to waste.” Have they not gone to waste? The committee requested OPOs to report again which particular analysis research they gave the pancreata to; I do know of no OPO that has put out information formally tying every pancreas to a particular research.

This previous January, CMS despatched a letter to OPOs reminding them that they might solely rely pancreases that had been truly used for analysis. However it ought to go a step additional and do what the Senate committee is urging: make clear that solely pancreata donated to analysis permitted by the FDA counts below the rule. That’s, OPOs can not make themselves look higher and keep away from decertification simply by recovering pancreata after which sticking them in a freezer. They’ve to truly get the pancreata into the palms of scientists.

It’s a quite simple change, however it might imply the distinction between guidelines that result in 1000’s extra organs going to individuals who want them, and guidelines that allow the present system of unaccountable OPOs proceed unabated.

A model of this story initially appeared within the Future Good e-newsletter. Enroll right here!

Mountaineering maps and path maps, now free in Apple Maps on iPhone

0


You may get wealthy topographical mountaineering maps of native trails and U.S. nationwide parks in your iPhone, proper in Apple Maps. New in iOS 18, you possibly can construct customized routes connecting strolling paths and save them to your system for offline entry.

You should utilize this characteristic to plan a hike as a day journey. Planning your route upfront might prevent the effort of getting misplaced with out a sign — or hold you from beginning a very bold hike.

In accordance with Apple, the replace comes with information for “all 63 U.S. nationwide parks.” In my testing, Apple Maps confirmed an intensive information of the paths in northeastern and Appalachian Ohio, too. It might comprise detailed path information about your native park as properly.

Right here’s take advantage of out of the brand new mountaineering maps in iOS 18.

Easy methods to get mountaineering instructions in Apple Maps

Word: These mountaineering options are new to iOS 18 — out there now in a public beta. Apple will launch iOS 18 this September, and the replace will work with any system presently working iOS 17.

Desk of contents: Easy methods to get mountaineering instructions in Apple Maps

  1. Discover mountaineering maps and trails
  2. Get particulars on trails and hikes
  3. Construct customized paths in Apple Maps

Discover mountaineering maps and trails

Find hiking maps
Seek for trails and discover hikes at your favourite parks.
Screenshot: D. Griffin Jones/Cult of Mac

After you replace to iOS 18, yow will discover mountaineering trails in a number of other ways in Apple Maps. Simply search “mountaineering” to carry up ends in your space and present them on the map. You possibly can filter for size, elevation and extra. You can also faucet on a park and discover a listing of hikes by scrolling all the way down to the “Hikes” part on the web page.

Apple Maps shows mountaineering trails as white dotted traces. Small circles on the map designate intersections. Whenever you zoom into an space whereas a park, path or path, you’ll see contour traces drawn on the map indicating the topography.

Get particulars on trails and hikes

Details on a trail and trailhead
Get particulars on close by trails, find trailheads and see trails that cross paths.
Screenshot: D. Griffin Jones/Cult of Mac

You possibly can faucet on a path in Apple Maps to see particulars like its size, highest and lowest elevations, and the varied trailheads (entrances and exits) alongside the trail. If the path falls exterior of typical cell protection, faucet Obtain to be sure to can navigate round in your hike always.

Scroll down and you might even see predesigned hikes alongside the path. You’ll see within the preview card a top level view of the trail, the general distance and the change in elevation. Faucet to see particulars with an elevation map and strolling time estimate. Tapping Add to Library will allow you to obtain the map and enter a customized title and outline of the hike to your library. Tapping Instructions will navigate to the beginning of the hike out of your present location.

Construct customized paths in Apple maps

Creating a custom route in Apple Maps
Create a customized path on a path by including nodes on the trail.
Screenshot: D. Griffin Jones/Cult of Mac

If a trailhead is a part of a community of paths, you’ll see an choice to Create a Customized Route. Faucet on completely different elements of the path to attract out the trail you wish to stroll. When you make a mistake, faucet the Undo button to the left.

Slide up on the sheet on the backside of the mountaineering map for more information and choices. After you begin drawing a path, you possibly can faucet Out & Again if you wish to flip round and return the best way you got here, or Shut Loop if you wish to take the shortest route again to the trailhead. The graph under the path map will present your elevation and estimated strolling time.

Hitting Save will allow you to give the route a customized title and outline, and mean you can obtain the trail. Instructions will begin navigating to the trailhead. Faucet the × to delete the route or begin over.

Extra iOS 18 options

Now that you understand how to create customized mountaineering maps in Apple Maps, try a few of the different nice new options in iOS 18:



Pig-butchering scammer targets BBC journalist


BBC Information cybersecurity journalist Joe Tidy has discovered himself within the uncommon place of being focused by a scammer calling herself “Jessica”, he revealed in a report this week.

In response to Tidy, somebody posing as a lovely, 36-year-old lady claiming to be primarily based in Chicago contacted him by way of Instagram.

For weeks, “Jessica” would contact Tidy day-after-day at round 4pm, oblivious to the truth that he was a cybersecurity correspondent with a historical past of researching scammers.

“Jessica” did her greatest to flatter Tidy, describing him as “stunning”.  In response to the journalist, she was “very flirty.”

After 4 weeks, “Jessica” revealed her huge secret. She had turn into wealthy by means of investing in cryptocurrency and would share her secrets and techniques if Tidy had been ready to comply with her directions.

“Jessica” advised Tidy that he must handle her as “Miss Queen” and ”do precisely as she mentioned”, which included promising to go to Chicago to purchase her “a romantic reward or meal” with a number of the income she assured him he would make.

Nevertheless, Tidy had been enjoying together with the scammer’s scheme.  He did a reverse-image search on a number of the glamorous photographs that “Jessica” had shared and found that they really belonged to a German social media influencer.

Tidy knowledgeable the influencer that her photographs had been being exploited for pig-butchering scams after making contact with the German lady whose photos the scammer was utilizing.

As now we have described earlier than, pig-butchering scams are huge enterprise. The FBI estimates that billions of {dollars} have been misplaced by victims.

Pig-butchering scams are so-called as a result of their targets are likened to pigs being fattened up for slaughter. Victims will usually be contacted on social media or relationship websites and made to really feel that they’ve made a romantic reference to the scammer over an prolonged time frame.

The besotted sufferer is then tricked out of their financial savings, realising far too late that they’ve been scammed. Usually, the cash might be taken slowly (maybe by means of an unsound “cryptocurrency funding”) over a time frame, till funds have been exhausted.

In Tidy’s case, “Jessica” requested for an preliminary funding after which made him undergo a collection of faux cryptocurrency investments the place he was proven that his “income” had been “growing.”

Ultimately, Tidy revealed that he was really a cybersecurity journalist. Figuring out that it’s not unusual for folks working in pig-butchering name centres to be working towards their will for prison gangs, he requested for extra info.

“Jessica” claimed to be primarily based in a name centre in Dubai and advised Tidy that she was beneath risk of sexual violence if she didn’t handle to lift $500 that evening.

After a while, “Jessica” stopped responding and blocked him on social media.

It is necessary to know what to do if you end up in an analogous place and consider you may need been contacted by a scammer.

At all times be cautious when somebody contacts you. Think about using the video chat operate on relationship websites (though this can be abused by scammers). Deal with anybody asking you to ship them cash or make investments funds as an enormous purple flag.

A wholesome dose of scepticism towards on-line interplay is important.

Additionally, do not be afraid to report back to the authorities if in case you have been scammed – it could assist another person keep away from an analogous destiny.