Nginx configuration https protocol super detailed!!!

This article is based on Linux operating system demonstration. Preparations: server with public IP (CentOS7), apply for a domain name, apply for SSL certificate for the domain name, and bind the server's public IP with the domain name. 1, Download and install Nginx Nginx download website: http://nginx.org/en/download.html Baidu online di ...

Posted by snowrhythm on Fri, 14 Jan 2022 10:01:22 +0100

Getting started with basics - packet expansion

HTTP&HTTPS HTTP: HTTP->TCPHTTPS: http - > SSL / TLS (encryption / decryption) - > TCP 1.HTTP HyperText Transfer Protocol is an application layer protocol for distributed, cooperative and hypermedia information systems. Simply put, it is a method of publishing and receiving HTML pages, which is used to transfer information betwee ...

Posted by delxy on Thu, 13 Jan 2022 15:36:33 +0100

Nginx Container Proxy HTTPS

Preface 😘 This article explains how to install the Docker container Nginx on a Linux system and use Nginx to proxy HTTPS encryption requests. If you don't want such a complex configuration, you can use it pagoda For one-click deployment, automatic acquisition of SSL certificates, etc., this article is purely manual configuration of SSL certif ...

Posted by rbragg on Wed, 12 Jan 2022 18:23:23 +0100

Column | Obtain https certificate expiration time using the zabbix-agent2 custom plug-in

WeChat Public Number: Operations and Maintenance Development Story, Author: wanger demand For those who regularly maintain their website, they often have to deal with https certificates. Typically, an https certificate is valid for one year. Once the certificate expires, the company will lose a lot. Last year NetEase mailbox was a typical c ...

Posted by korngold on Wed, 12 Jan 2022 18:12:52 +0100

PHP uses asymmetric encryption algorithm (RSA)

Type of encryption: In daily design and development, in order to ensure the security of data transmission and data storage, data plaintext can be encrypted into complex ciphertext through specific algorithms. At present, the mainstream encryption methods can be roughly divided into one-way encryption and two-way encryption. Unidirection ...

Posted by nwoottonn on Tue, 11 Jan 2022 12:42:48 +0100

Using blackbox_exporter for black box monitoring

WeChat official account: operation and development story: Author: Joker summary In the monitoring system, we usually think that monitoring is divided into white box monitoring and black box monitoring. Black box monitoring: the phenomena mainly concerned are generally things that are happening. For example, if an alarm occurs and the ser ...

Posted by ashishag67 on Mon, 10 Jan 2022 17:17:46 +0100

HTTPS configuration for personal websites

I brief introduction In fact, I didn't want to write this, but after the domain name was filed yesterday, I configured https for a long time. It's really urgent. There are so many cheating tutorials on csdn. I've taken a lot of detours. While I still remember now, I'll record it. It may also be used later. After writing this article, I'll be r ...

Posted by trippyd on Mon, 03 Jan 2022 23:52:59 +0100

Use acme SH generate permanent free certificates for websites

In the HTTP 2.0 era, almost all websites are accessed through https. To achieve https access, the security certificate is a barrier that cannot be bypassed. Domain name service providers generally provide free certificate registration, and many can be searched on the Internet. The common issuing institutions of free certificates are Asia integ ...

Posted by leegreaves on Sun, 02 Jan 2022 02:14:30 +0100

Build encrypted web service https httpd+mod_ssl

Build encrypted web service https httpd+mod_ssl install To implement encryption authentication, this security module is called mod_ssl yum install mod_ssl -y After installation, an SSL is generated under the sub configuration module Conf file Go to view the configuration items in the file vim /etc/httpd/conf.d/ssl.conf Listen 443 ht ...

Posted by cash09 on Fri, 31 Dec 2021 01:39:04 +0100

Analysis of shell app Authorization parameters

Well, 2021 is coming to an end. I've been busy studying for a year. At the end of the year, write some articles and summarize the learning results! The app we want to analyze today is the shell version number: v2 66.0, small partners can go to major applications and agree to download by themselves. It is also a good case of reverse analysis. ...

Posted by algarve4me on Sat, 25 Dec 2021 09:00:06 +0100