Summary: encryption and security
Objectives of information security protection
Confidentiality
Integrity
Usability
Controllability
Non repudiationSafety protection link
Physical security: environment of various equipment / hosts and machine rooms
System security: the operating system of a host or device
Application Security: various ne ...
Posted by Tokunbo on Thu, 11 Jun 2020 08:14:01 +0200
Script Installation Apache and Working Mode
1. Introduction
First, you need to understand the MPM (Multi-Processing Modules) that Apache uses. MPM is the core of Apache, which manages network connections and dispatches requests.There are three types of MPM in Apache (perfork, worker, event).
Apache Version 2.4
New features:
1. MPM supports loading at runtime; however, to tur ...
Posted by Pnop on Mon, 08 Jun 2020 18:19:59 +0200
Source configuration PHP7.4
1, php Installation Preparation Environment
System: CentOS Linux release 7.7.1908
PHP: php-7.4.6
2, Install PHP dependency package
yum install gcc libxml2 libxml2-devel openssl openssl-devel bzip2 bzip2-devel libcurl libcurl-devel libjpeg libjpeg-devel libpng libpng-devel freetype freetype-devel gmp gmp-devel libmcrypt libmcrypt-devel rea ...
Posted by Pyrite on Thu, 21 May 2020 17:55:26 +0200
Install Nginx under Centos
Our goal today is to set up a Nginx service on Centos to facilitate subsequent testing and learning.This is also the first step in learning about other Internet components.Next, I will describe the source code compilation process step by step, with some instructions.
1. Download the latest source code on the official website and unzip it
The ...
Posted by bassguru on Sun, 17 May 2020 21:15:28 +0200
linux compiling and installing nginx and detailed explanation of the parameters of each step
1. Environment and installation of dependent packages
[root@localhost ~]# systemctl stop firewalld && setenforce 0 #Turn off the firewall and selinux first
[root@localhost ~]# yum -y install gcc gcc-c++ #Install build environment
[root@localhost ~]# yum install -y pcre pcre-devel #Install pcre package (make nginx support http rewri ...
Posted by rupam_jaiswal on Mon, 06 Apr 2020 17:36:47 +0200
Python 3 standard library: hashlib password hash
1. hashlib password hash
The hashlib module defines an API to access different cryptographic hashing algorithms. To use a specific hash algorithm, create a hash object with the appropriate constructor function or new(). No matter which specific algorithm is used, these objects use the same API.
1.1 hash algorithm
Because hashlib has OpenSSL to ...
Posted by JustGotAQuestion on Sat, 28 Mar 2020 11:28:43 +0100
Fabric Block Chain Third Party CA Use Tutorial
Hyperledger Fabric (HF) provides fabric-ca tools for end users to use their own CAs.However, root CAs should be as secure as possible in production environments, such as offline root CAs, and certificate issuance agents in Hyperledger Fabric environments should be given to the middle
CA.In this article, ...
Posted by de.monkeyz on Sun, 23 Feb 2020 03:39:47 +0100
Quick Start for the http Pressure Tool wrk
[TOC]
Quick Start for the http Pressure Tool wrk
Thank you, teacher cap1537
I've used a lot of manometry tools, but I haven't found the one I like.It feels good to try wrk recently. Write down this guide for yourself to remember, and if it helps you, it's also good.
install
Wrk supports most UNIX-like systems and does not support windows.Oper ...
Posted by AZDoc on Wed, 19 Feb 2020 18:33:23 +0100
Haproxy implements the configuration method of https for some domain names and http for other domain names
Requirement:
1. Haproxy must be at least 1.5 to support ssl certificates2. To use ssl module, openssl software must be installed, and the version should meet the requirements
openssl installation
tar zxf openssl-0.9.8zh.tar.gz
cd openssl-0.9.8zh
./config enable-tlsext --prefix=/usr/local/openssl no-shared
make && make install_sw
#The ...
Posted by cigardude on Thu, 13 Feb 2020 17:28:35 +0100
RSA algorithm -- using private key signature and public key verification signature
1. Symmetric encryption and asymmetric encryption
Encryption technology is the most common security means. The key of data encryption technology is encryption / decryption algorithm and key management. The basic process of data encryption is to process the original plaintext file or data according t ...
Posted by Mod-Jay on Sun, 02 Feb 2020 13:47:27 +0100