Skip to main content

Questions tagged [integrity]

The aspect of an object which describes it as unaltered since a reference time at which a description of its state was recorded, or a description of the continued functioning of a property of the object. An example of this is checking whether the MD5 hash of this file is the same as the MD5 hash that was calculated yesterday, to ensure the file was unaltered.

integrity
Filter by
Sorted by
Tagged with
31 votes
5 answers
35k views

Why choose SHA512 over SHA384?

SHA384 is a truncated version of SHA512. But why would anyone use it? And corollary: if SHA384 is just as good as SHA512, is there any rationale in using the 512 bit version? I am planning to use one ...
jst's user avatar
  • 596
31 votes
2 answers
12k views

Google PlayIntegrity API: a Nightmare

I need some help guys!! I am a self-taught, newbie in encryption, and after reading, testing, and error for more than two weeks on how to solve this, and finding very little crowd knowledge and almost ...
pvalle's user avatar
  • 1,405
27 votes
3 answers
26k views

Does encryption guarantee integrity?

To build a secure system, can we assume that encryption guarantees integrity is true before starting a secure programming? Both in symmetric and public-key encryption, is my question well-proofed ? ...
berkay's user avatar
  • 3,957
21 votes
7 answers
18k views

Wordpress script with integrity and crossorigin

I'm trying to use the wp_register_script and wp_enqueue_script FUNCTION on WordPress to enqueue a script, which has two attributes: "integrity" and "crossorigin". Normally I use PHP and my code looks ...
user avatar
18 votes
5 answers
9k views

How to find the offending attribute with a sqlalchemy IntegrityError

I have a very simple SqlAlchemy model class User(Base): """ The SQLAlchemy declarative model class for a User object. """ __tablename__ = 'users' id = Column(Integer, primary_key=True) ...
Peter Smit's user avatar
  • 28.4k
17 votes
2 answers
13k views

Redis and Data Integrity

I have some questions for REDIS DB: How to ensure data integrity? Are there methods ensure the integrity? Does Redis primary key? or alternatives Foreign key? Referential Integrity? How are the ACID ...
viv1d's user avatar
  • 339
15 votes
4 answers
4k views

Check Android Assets Integrity

In my folder assets/data, there are a lot of XML files containing static data for my app. It's really easy for someone to retrieve an APK, modify a part of it and install on a device. I would like ...
Hartok's user avatar
  • 2,137
14 votes
6 answers
27k views

Is there an elegant way to check file integrity with md5 in ansible using md5 files fetched from server?

I have several files on a server that I need to download from an ansible playbook, but because the connection has good chances of interruption I would like to check their integrity after download. I'...
Vlad Manuel Mureșan's user avatar
14 votes
2 answers
3k views

On using Terracotta as a persistence solution

Would it be a good idea to use Terracotta as a persistence solution (replacing a database)? I'm specifically wondering about data integrity issues and support for transactional systems.
Loki's user avatar
  • 30.6k
14 votes
2 answers
10k views

HTTPS and Data Integrity

I haven't done lot of research on HTTPS yet so I have a question about it. Is data integrity preserved using HTTPS or only confidentiality? For example on file upload, does HTTPS guarantee that no ...
Nebojsa Veron's user avatar
12 votes
3 answers
5k views

Message Integrity Check with HTTP headers since Content-MD5 was deprecated?

Making a REST web server mainly based on large files uploads / downloads, I want to be able to check the file integrity. I believed that the proper way to do it was using Content-MD5 HTTP header [0] ...
user687718's user avatar
11 votes
2 answers
6k views

Is CRC32 really so bad for file integrity check?

Of course that MD5 is better then CRC32, SHA1 is better then MD5 and so on... But also they are also much slower then CRC32. Right know, I am thinking about how to check consistency of being ...
Matt Warrick's user avatar
  • 1,478
10 votes
2 answers
4k views

Enable integrity checking with sqlite in django

In my django project, I use mysql db for production, and sqlite for tests. Problem is, some of my code rely on model integrity checking. It works well with mysql, but integrity errors are not thrown ...
Thibault J's user avatar
  • 4,416
10 votes
1 answer
3k views

Play Integrity local verification

I am trying to integrate the play integrity check in my app to make sure that my app is not installed on a rooted Android device. I can successfully obtain the integrity token response as guided in ...
Prabakaran's user avatar
10 votes
2 answers
4k views

Bootstrap failing to load from maxcdn ERR_CONNECTION_RESET

I'm using Bootstrap in my application from MAXCDN but sometimes it fails to load and gives me two reasons which I can't figure out why. (failed) net::ERR_CONNECTION_RESET // min.css (failed) net::...
Karl Taylor's user avatar
  • 5,169
9 votes
4 answers
6k views

about MD5 checksum for Http big file downloading

MD5 checksum is widely used for integrity checking for Http downloading big files. My question is, since TCP itself provides reliable mechanism (i.e. checksum for each TCP package to ensure its ...
George2's user avatar
  • 45.4k
9 votes
2 answers
6k views

How can i resolve warning message 'BUG IN CLIENT OF libsqlite3.dylib: database integrity compromised by API violation' in Sqlite.swift?

i'm using Sqlite.swift when i restart app in simulator, i want to remove existing database and make new database. (because of initializing database... i change the database column a lot.) but there ...
doori's user avatar
  • 105
9 votes
0 answers
4k views

removing an explicit mandatory label using icacls

I was doing some experimentation with integrity levels and icacls on Windows 7. I set mandatory integrity levels, so that I get something that looks like this: C:\Debug>icacls test.exe test.exe ...
chut7's user avatar
  • 103
8 votes
2 answers
21k views

To check if two image files are same..Checksum or Hash?

I am doing some image processing code where in I download some images(as BufferedImage) from URLs and pass it on to a image processor. I want to avoid passing of the same image more than once to the ...
Abhishek's user avatar
  • 6,870
8 votes
1 answer
3k views

Authenticity and Integrity of HTTP Requests

I have an API endpoint where external websites can submit a POST request. What would be the best method to make sure the requests are authentic and also are not tampered with, so they respect the ...
Claudiu S's user avatar
  • 1,627
7 votes
1 answer
4k views

Does Google Cloud Storage client in Python check CRC (or MD5) automatically?

I have tried to find out if GCS Python client, and more specifically, blob.upload_from_file() and blob.download_to_file() check integrity of the uploaded or downloaded file automatically. If not, how ...
Kevin's user avatar
  • 73
7 votes
2 answers
3k views

Is there a tool to check database integrity in Django?

The MySQL database powering our Django site has developed some integrity problems; e.g. foreign keys that refer to nonexistent rows. I won't go into how we got into this mess, but I'm now looking at ...
Thomas's user avatar
  • 180k
7 votes
1 answer
892 views

Remeasuring files with Linux IMA

I am trying to set up Linux IMA in RHEL with the help of this guide http://linux-ima.sourceforge.net/linux-ima-content.html-20110907 . I would like to set up the system such that sensitive files of ...
DaTaBomB's user avatar
  • 623
7 votes
1 answer
790 views

Track a Rails project on private repo on GitHub with Redmine and Integrity deployed on Heroku

Scenario Project A is a Rails application: Code hosted on GitHub on a private repo. Deployed on Heroku (which has a readonly file system). Project R that is an instance of Redmine, used to manage ...
Andrea Salicetti's user avatar
6 votes
2 answers
2k views

Websockets message integrity

When using a WebSocket full-duplex data connection between a client and a server, am I guaranteed, when sending two messages from the server, that I will receive those two exact same messages on the ...
Magix's user avatar
  • 5,229
6 votes
1 answer
3k views

Android shared library integrity protection

Is there a way to somehow 'protect' a native shared library (.so) for the Android platform against binary changing? E.g. someone could overwrite a JMP instruction with a NOP after reverse engineering ...
AndroidSec's user avatar
6 votes
2 answers
3k views

How does Tomcat maintain session integrity?

HttpServletRequest's getSession(boolean) method mentions session integrity. How does Tomcat maintains session integrity? What rules does it use? What method? What is happening under the hood precisely?...
Jérôme Verstrynge's user avatar
6 votes
1 answer
2k views

Better SQLite corruption detection

At first, some background: My Android app has DB table with a lot of four-column rows. It sends requests to the server and server responds only when all of these four values are "valid". A few of ...
user1234567's user avatar
  • 1,832
6 votes
0 answers
449 views

How to have Artifactory provide the same artifact checksums as registry.npmjs.org?

When switching to Artifactory the npm install produces the package-lock.json file with only SHA1 digests for artifacts checksums. Without Artifactory (i.e. using registry.npmjs.org) npm combines SHA1 ...
Alexey Shmelkin's user avatar
5 votes
1 answer
7k views

Checking code integrity in iOS

How could I guarantee the integrity of the code of an iOS app? I've been taking a look to Apple's Security Overview document, would code signing be enough? Is there any other recommended mechanism to ...
AppsDev's user avatar
  • 12.4k
5 votes
3 answers
2k views

Can file based SVN repository support simultaneous multi-user situation?

If multiple users accesses file based SVN repository to commit many things simultaneously, can SVN guarantee data integrity? If it is, how? Or if it isn't what serving method should I use for multi-...
eonil's user avatar
  • 85.2k
5 votes
3 answers
5k views

Java + MySQL integrity violation handling

I write Java program using JDBC (mysql database). When I violate mysql integrity (f.e. I try to insert same primary key value) I catch SQL exception. Should I write it in way it may never happen (f.e. ...
Michal's user avatar
  • 53
5 votes
2 answers
3k views

Windows 8 named pipe creation

How I can create named pipe in the Windows 8 with AppContainer integrity level?
bajlepa's user avatar
  • 51
5 votes
2 answers
2k views

Hacking DropDownList value

I've got a DropDownList and I'm trying to prevent it from being used as an attack vector. Can I assume that the user is unable to actually change the values of the DDL and postback to the server? At ...
XSL's user avatar
  • 3,025
5 votes
1 answer
2k views

When does git actually verify the integrity of the commit chain?

I have read multiple times about the integrity mechanism in git based on SHA-1 hashes and links to parent commits, which ensures that no changes are made to the committed data in the git repository. ...
Jeff S.'s user avatar
  • 978
5 votes
1 answer
2k views

On Postgres databases, does relationship constraints degrade performance?

This is my first post here and I've tried to do my homework. I need to have a better way to develop Data Warehouse databases for Postgres than using Power*Architect. Here is the complete sad history:...
Fábio de Salles's user avatar
5 votes
3 answers
4k views

NodeJS hash files recursively in a directory

I am able to achieve recursive file traversal in a directory (i.e to explore all the subdirectories and files in a directory). For that I have used an answer from a respective post on stack overflow. ...
v01d's user avatar
  • 327
5 votes
2 answers
196 views

How to enforce a 1 to n relationship

I'm working on an online muiltiplayer board game & have a SQL server question. Lets assume the game allows two players. When the game is created, the creator is added as the first user. At ...
Buurin's user avatar
  • 129
5 votes
1 answer
4k views

Runtime integrity check of executed files

I just finished writing a linux security module which verifies the integrity of executable files at the start of their execution (using digital signatures). Now I want to dig a little bit deeper and ...
Chris's user avatar
  • 2,060
5 votes
0 answers
345 views

Verify authenticity of Java Card applet codebase without trusting the applet itself

We are developing a JavaCard-based security sensitive application. Our goal is to allow client code communicating with a GlobaPlatform 2.2+ based JavaCard applet to convince itself that it's actually ...
Alex Kravets's user avatar
5 votes
0 answers
1k views

gpg signing seems to "remove" integrity

The Google is not answering this question because The Google results are flooded with a question similar to mine in form but quite different in meaning. I'm mentioning this because I already know that ...
hft's user avatar
  • 1,245
4 votes
2 answers
21k views

how to create user defined Type in Sql

i don't know how to create a domain with optional constrains? i tried CREATE DOMAIN idx INT CHECK (VALUE > 100 AND VALUE < 999); but faced the below err Unknown object type 'DOMAIN' used in a ...
r bhd's user avatar
  • 61
4 votes
3 answers
1k views

How to ensure contiguity of a tally table?

In SQL For Smarties, Joe Celko provides an ANSI SQL definition of a Series table (elsewhere called Tally or Numbers). His definition ensures the values in the column are unique, positive and ...
Iain Samuel McLean Elder's user avatar
4 votes
3 answers
7k views

Magento Order saving error: Integrity constraint violation

I am getting the following error when I make an order with a credit/debit card in Magento: Order saving error: SQLSTATE[23000]: Integrity constraint violation: 1062 Duplicate entry '282-189' for key ...
GManz's user avatar
  • 1,649
4 votes
5 answers
4k views

Prevent two users from editing the same data

I have seen a feature in different web applications including Wordpress (not sure?) that warns a user if he/she opens an article/post/page/whatever from the database, while someone else is editing the ...
Industrial's user avatar
  • 42.4k
4 votes
3 answers
2k views

How to design a media table with references to multiple (at least 4) tables?

I am designing a database for my cookbooks. I have created multiple tables in my design: books, authors, recipes, ingredients and for all these items I want to link media (images or video) to items in ...
Matthijs's user avatar
4 votes
3 answers
10k views

GreenHills - small data area overflow

I'm hoping maybe someone has a quick answer for this but essentially when I turn on optimizations, I get the following error: [elxr] (error) small data area overflow: 0xfff9f6fc (signed) didn't ...
Gary's user avatar
  • 1,525
4 votes
1 answer
1k views

Is the integrity of file uploads/downloads guaranteed by TCP/HTTPS?

Assume I want to upload a file to a web server. Maybe even a rather big file (e.g. 30 MB). It's done with a typical file upload form (see minimal example below). Now networks are not perfect. I see ...
Martin Thoma's user avatar
4 votes
1 answer
2k views

Incrementing the slug by avoiding Integrity error in django models save method

I have a model with two fields as below models.py class Publisher(models.Model): name = models.CharField(max_length=200) slug = models.SlugField(max_length=150, unique=True) def ...
Shiva Krishna Bavandla's user avatar
4 votes
7 answers
4k views

Opening Hours Database Design

We are currently developing an application in which multiple entities have associated opening hours. Opening hours may span multiple days, or may be contained within a single day. Ex. Opens Monday at ...
DEHAAS's user avatar
  • 1,294

1
2 3 4 5
7