Since there exist plugin for Skype for Business that do much more than that.
How hard would that be to create similar plug-in for MS Team with only functionality would be taking the status from the Genesys and setting it up to the corresponding status in Ms Teams, so if someone is on the call everyone can see it on MS TEAMS and know he's not available.
Would someone with little experience in writing plug-ins could do it and where he could start? Maybe they already working on it? Any ideas?
Microsoft will always focus on customer’s feedback and experience, some new features would be added to the services based on customers' feedback in the future, we also recommend you to raise your UserVoice here:
A couple of days ago I sent an email to the contact address in the official OSMAND site, but have not received an answer yet. I'm now asking here in case someone affiliated with the project reads this. The company I work for needs a custom development on top of OSMAND, and it's willing to financially support the project in exchange for this.
Does anyone here know how to reach the right person for this?
Thanks
I suggest to wait 1-2 days longer. If you still don't get a reply then try https://github.com/osmandapp/Osmand. The developers are pretty active there.
First
No I am not asking you to teach me hacking, I am just curious about this file and its content.
My journey
When I dived into the new HTML5 Boilerplate I came accross the humans.txt. I googled for it and I came at this site http://humanstxt.org/.
Immediately my attention went to this picture:
Do I read this correctly? Hackers.txt?
So I resumed my journey in google and stopped at this articles
When I started reading this I had the feeling that its about the difference between Hackers and Crackers. Later I got the feeling that I'm might be wrong and that this place is that this hackers.txt file is a sort of guestbook for hackers?
Also other examples about hackers.txt files I found here
Some files contain code, others have just hurtfull information.
Now I'm realy confused, guestbook, hack tutorials or just history?
Question
What is the use of this hackers.txt file?
The way I see things:
robots.txt contains information and instructions for robots (so it should be read/used by web crawlers, spiders and other kind of bots)
humans.txt contains useful information to be consumed by humans, according to http://humanstxt.org/
hackers.txt should be targeted towards hackers, so it should contain any information the site owner might want to transmit to a hacker, as Ze'ev pointed out. I don't think this should be a place for hackers to write anything, but rather to get information from the site owner (perhaps on how to report vulnerabilities, as others suggested).
Commonly known as Eduardo Vela, Eduardo A. Vela Nava (or sirdarckcat on Github and Twitter) has been a Security Engineer at Google since 2010. (He currently has the role of Product Security Response Team Lead).
As other security experts before him, he pondered the issue of effectively communicating the details of a site's vulnerability reward program to white hat hackers/pen-testers.
One specific such person is Chema Alonso (also on Twitter).
He is well-known enough to warrant a Spanish Wikipedia entry
Between 2005 and 2011 Alonso was awarded the Microsoft Most Valuable Professional Award for Enterprise Security 6 years in a row. That should tell you something about his "skillz".
On February 3rd 2011 Alonso wrote about his frustrations regarding the topic of communication between the administrators and/or developers of a site and hackers.
He proposes a similar initiative as humans.txt but for hackers. As he mentions this hackers.txt initiative in his blog-post.
In April 2011 The humanstxt.org website got a new design which includes the image which mentions the hackers.txt file.
At this point, I must sadly submit to conjecture, but... consider:
The team behind humans.txt are all from Spain (mostly Barcelona)
At this point Alonso is already quite well known in the Spanish developer community
Would it be such a far stretch to imagine that they got to know of each other's efforts?
On May 14th 2014 Vela, already working at Google, commented on a blog-post by Alonso. It is most likely that they had further contact in a professional setting. Whether or not thay extively shared their idea's regarding anything related to hackers.txt is unknown.
On July 6th 2017 Vela posted a question to this extent on twitter:
How about we create a /hackers.txt that says whether something is in scope or not of a vulnerability reward program and where to report it?
Subsequently, an empty git repository was created for hackerstxt.org on github
and an email thread was opened at Google Groups to discuss this idea further.
On August 13 2017, Edwin Foudil (or EdOverflow on Github and Twitter) created a git repository for security.txt on Github and responded to the mailing list:
I have published a similar project to the one being discussed in this group (https://github.com/EdOverflow/security-txt) and would love to get some of your feedback and ideas.
The project is the equivalent of robots.txt, but for defining a security policy. Companies can add a security.txt to their website and define clear guidelines of what security researchers must do when they discover a security issue. security.txt also allows bug bounty programs to add their scope there. security.txt uses a similar syntax to robots.txt, which should make it easier for machines to parse.
He was, in part, inspired by an open-source project he was working on at the time called GratiPay. GratiPay had a SECURITY.txt file since 2013.
His inspiration also drew from the SECURITY.md files that more and more open-source projects were adding to their repositories.
On September 10th 2017, Foudil submitted a first draft for security.txt to the Internet Engineering Task Force.
On September 14th 2017 Alonso wrote a blog post with the title (translated from Spanish) "Security.TXT an IETF draft for my Hackers.TXT".
Beyond the title, Alonso does not allude to the fact that his 2011 idea was the origin of the draft but he does state his approval of the effort.
On February 3rd 2018, the mail group was informed to concede to security.txt and Vela tweeted that Google had already implemented one.
Further information
Details and a nifty tool to generate your own security.txt can be found at
https://securitytxt.org/
Adoptation
Even though the RFC is still in draft, the standard is already being adopted quite well by major players on the web.
Besides the security.txt at Google, there is also one on the website of:
1password
BBC
bit.ly - http://bit.ly/security.txt (can't be linked because StackOverflow blacklist the use of common link shorteners in posts)
CERT NZ
DailyMotion
Dropbox
Facebook
Github
haveibeenpwned
NodeJs
NPM
Open SSL
Shopify
(Feel free to add more from well-known sites, if you find 'm)
As with humans.txt, there also seems to be a hackers.txt site at http://www.hackerstxt.org/. I'm not sure if someone has set the site up as a joke or not, but it links to a blog post on someone's Blogger site.
The post rambles on a bit (I put it through Google Translate) about the poster's history as a 'hacker'. Anyway, towards the end the writer says:
therefore believe we should promote an initiative type hackers.txt , in which managers leave us a message to potential "aliens who are good" that makes it clear they will do managers receive a report of a vulnerability in your site. I've been circling this , the truth is that it is difficult to finish shaping, because perhaps some "alien who is not so good" , type Brainiac , take a free hand to brush a site, or the "good board administrator" , decide to change your mind and Liem, but I think we should be able to do something, I dunno, maybe having Jon Jonz , or perhaps thinking about how to write that file hackers.txt . How do you see it? Greetings Evil!
So I assume that the poster wants to start a sort of hackers.txt standard in the vein of humans.txt, but hasn't finished it off, or hasn't gotten it into the English speaking world.
Digging around, the Blogger site seems to be owned by a guy called Chema Alonso, who must be fairly reputable in the world of Spanish programmers as he has about 35k Twitter followers (https://twitter.com/chemaalonso). He seems to work for a company called ElevenPaths (http://elevenpaths.com/), which says that it's driving "radical innovation in security product development". A quick Whois check shows that the hackerstxt.org domain is registered by someone in Madrid, so I would assume it's Alonso.
The .txt file over at http://www.textfiles.com/news/hackers.txt, which has been refered to by some of the other answers in this thread, doesn't seem to have anything to do with the hackers.txt reference over at http://humanstxt.org/, and neither do most other search results for 'hackers.txt'.
It's possibly a joke, but If humans.txt is for humans to read then maybe hackers.txt is a warning for hackers.
Like the notice you get when you SSH into some more public terminals. "You are being watched... we will get you if you do anything bad..." That sort of thing.
If a hacker did compromise the site, the might notice the file, read it, realise you mean business and be scared away!
Interesting idea.
As this question is somewhat open, I think you are also expecting some assumptions, I write here (not in a comment) my opinion, but if it should be there, I'm sorry.
I think that the idea lying behind humans.txt (which I heard of before) is to make a new habit, new style or something like that. In fact, you can put a contact page, where all these data from humans.txt can be put. I think that hackers.txt could be also something like new style.
I suppose that hackers.txt was much earlier, maybe for 20 years, when www servers and popular web knowledge was poor, when using localhost Apache+PHP+MySQL was making you "a hacker", and if someone could access the file other than index.html (and linked pages from this), reading hackers.txt was some kind of prize, or maybe some kind of filter to show some information to "those who behold" (like this one perhaps).
I think hackers.txt should contain notes on how the site owner would like for data to be used... E.g. "I don't mind if you scrape the movie listings, but please don't hot link out images in your app"
I am trying to budget my time wisely but have not had a lot of details on the Security Review that Intuit performs on applications before publication. I found an article on their blog that talks about pre-paring for it.
The "Security Review": What to Expect
and then there is their Complete the Security Review section on their website. However I have not been able to find anything on the expected timeline to complete. One person mentioned on their v3 webinar that his took 3 months to complete, but is this the norm?
Thanks for any help in this.
It does not take months to complete, normally it takes 1-2 weeks assuming you follow the guidelines and prepare for the reviews accordingly. Obviously if there are security vulnerabilities found in your app it could take time to resolve so 1-2 weeks is an average and assuming you are able to resolve issues as soon as possible.
Also, if you follow the info here it will speed up the process
https://ipp.developer.intuit.com/0010_Intuit_Partner_Platform/0025_Intuit_Anywhere/0040_Publishing_Your_App
regards,
Jarred
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
We don’t allow questions seeking recommendations for books, tools, software libraries, and more. You can edit the question so it can be answered with facts and citations.
Closed 8 years ago.
Improve this question
Anyone here develops on DAY CQ? Can advise what is the forum or community to seek for help?
I tried to sign up to their google groups but am not able to do so
Day CQ is a Web Content Management platform based on Java and the JCR specification. Contrary to BoltClock, I would still recommend searching for Day CQ as Adobe does not seem to have really re-branded the Day products.
First I would try searching Day's Documentation at http://docs.day.com. Dacare is Day's hub for all of their support and such at http://www.day.com/content/daycare.html, you can find links to support groups, documentation, downloads and etcetera from there.
Google Groups is the right forum: https://groups.google.com/group/day-communique
Day developer web site: http://dev.day.com/content/ddc.html
Actually there is a forum to the one you can go to, it's located under:
http://forums.adobe.com/community/digital_marketing_suite/cq5
So take a look around a see if this helps.
I think the google groups is the most useful, the yahoo one constantly has spam..
Google Groups - day-communique
Yahoo Groups - day-communique
Other useful stuff...
Current Widgets API -(dev.day.com/docs/en/cq/current/widgets-api/index.html)
- used when adding widgets to your dialogs (I don't have enough rep to post as link)
The forums for developers working with CQ5 are rather scattered about. I have bookmarked this one: http://tech.groups.yahoo.com/group/jcr-crx/, which has seen 22 postings since the first of the year.
There is also a much more forum for users of the open source Apache Jackrabbit, which underlies CQ5's repository: http://blog.gmane.org/gmane.comp.apache.jackrabbit.user.
As Atigar says the Adobe CQ5 users forum is at http://forums.adobe.com/community/digital_marketing_suite/cq5
CQ5 is based on three Apache Software Foundation projects:
http://felix.apache.org/ - the Apache Felix OSGi framework. In general, you don't need to know much about it to develop with CQ5.
http://jackrabbit.apache.org/ - the Apache Jackrabbit JCR content repository, the CRX content repository that CQ5 runs on uses the same core code, with some extensions.
http://sling.apache.org/ - the Apache Sling web framework which CQ5 uses to process HTTP requests, including mapping them to scripts or servlets. Understanding the Sling way of doing things helps a lot in understanding CQ.
These 3 projects all have user mailing lists as well.
There is a LinkedIn group for enterprise users of CQ/AEM as well. See the link:
LinkedIn Adobe CQ Enterprise Users Group