Summary: encryption and security

Objectives of information security protection Confidentiality Integrity Usability Controllability Non repudiationSafety protection link Physical security: environment of various equipment / hosts and machine rooms System security: the operating system of a host or device Application Security: various ne ...

Posted by Tokunbo on Thu, 11 Jun 2020 08:14:01 +0200

Script Installation Apache and Working Mode

1. Introduction First, you need to understand the MPM (Multi-Processing Modules) that Apache uses. MPM is the core of Apache, which manages network connections and dispatches requests.There are three types of MPM in Apache (perfork, worker, event). Apache Version 2.4 New features: 1. MPM supports loading at runtime; however, to tur ...

Posted by Pnop on Mon, 08 Jun 2020 18:19:59 +0200

Source configuration PHP7.4

1, php Installation Preparation Environment System: CentOS Linux release 7.7.1908 PHP: php-7.4.6 2, Install PHP dependency package yum install gcc libxml2 libxml2-devel openssl openssl-devel bzip2 bzip2-devel libcurl libcurl-devel libjpeg libjpeg-devel libpng libpng-devel freetype freetype-devel gmp gmp-devel libmcrypt libmcrypt-devel rea ...

Posted by Pyrite on Thu, 21 May 2020 17:55:26 +0200

Install Nginx under Centos

Our goal today is to set up a Nginx service on Centos to facilitate subsequent testing and learning.This is also the first step in learning about other Internet components.Next, I will describe the source code compilation process step by step, with some instructions. 1. Download the latest source code on the official website and unzip it The ...

Posted by bassguru on Sun, 17 May 2020 21:15:28 +0200

linux compiling and installing nginx and detailed explanation of the parameters of each step

1. Environment and installation of dependent packages [root@localhost ~]# systemctl stop firewalld && setenforce 0 #Turn off the firewall and selinux first [root@localhost ~]# yum -y install gcc gcc-c++ #Install build environment [root@localhost ~]# yum install -y pcre pcre-devel #Install pcre package (make nginx support http rewri ...

Posted by rupam_jaiswal on Mon, 06 Apr 2020 17:36:47 +0200

Python 3 standard library: hashlib password hash

1. hashlib password hash The hashlib module defines an API to access different cryptographic hashing algorithms. To use a specific hash algorithm, create a hash object with the appropriate constructor function or new(). No matter which specific algorithm is used, these objects use the same API. 1.1 hash algorithm Because hashlib has OpenSSL to ...

Posted by JustGotAQuestion on Sat, 28 Mar 2020 11:28:43 +0100

Fabric Block Chain Third Party CA Use Tutorial

Hyperledger Fabric (HF) provides fabric-ca tools for end users to use their own CAs.However, root CAs should be as secure as possible in production environments, such as offline root CAs, and certificate issuance agents in Hyperledger Fabric environments should be given to the middle CA.In this article, ...

Posted by de.monkeyz on Sun, 23 Feb 2020 03:39:47 +0100

Quick Start for the http Pressure Tool wrk

[TOC] Quick Start for the http Pressure Tool wrk Thank you, teacher cap1537 I've used a lot of manometry tools, but I haven't found the one I like.It feels good to try wrk recently. Write down this guide for yourself to remember, and if it helps you, it's also good. install Wrk supports most UNIX-like systems and does not support windows.Oper ...

Posted by AZDoc on Wed, 19 Feb 2020 18:33:23 +0100

Haproxy implements the configuration method of https for some domain names and http for other domain names

Requirement: 1. Haproxy must be at least 1.5 to support ssl certificates2. To use ssl module, openssl software must be installed, and the version should meet the requirements openssl installation tar zxf openssl-0.9.8zh.tar.gz cd openssl-0.9.8zh ./config enable-tlsext --prefix=/usr/local/openssl no-shared make && make install_sw #The ...

Posted by cigardude on Thu, 13 Feb 2020 17:28:35 +0100

RSA algorithm -- using private key signature and public key verification signature

1. Symmetric encryption and asymmetric encryption Encryption technology is the most common security means. The key of data encryption technology is encryption / decryption algorithm and key management. The basic process of data encryption is to process the original plaintext file or data according t ...

Posted by Mod-Jay on Sun, 02 Feb 2020 13:47:27 +0100