How to cryptographically hash a JSON object?

The problem is a common one when computing hashes for any data format where flexibility is allowed. To solve this, you need to canonicalize the representation. For example, the OAuth1.0a protocol, which is used by Twitter and other services for authentication, requires a secure hash of the request message. To compute the hash, OAuth1.0a says … Read more

What’s a “canonical path”?

The whole point of making anything “canonical” is so that you can compare two things. For example, both ../../here/bar/x and ./test/../../bar/x may refer to the same location, but you can’t do a textual comparison on the two paths. However, if you turn them into their canonical representation, they both become ../bar/x, and we see that … Read more

Hata!: SQLSTATE[HY000] [1045] Access denied for user 'divattrend_liink'@'localhost' (using password: YES)