Tag:Private key
-
Vue CLI 2. X enable HTTPS locally and proxy the backend HTTPS interface
1. Locally generated certificate #Enter the project and create a new cert directory under build cd ./your-projuct/build && mkdir cert #Enter cert directory cd cert #Generate private key using OpenSSL openssl genrsa -out private.key 1024 #Use the private key generated above to generate a certificate. Enter the common name into the host of the back-end […]
-
Instant messaging security (IX): why use HTTPS? In simple terms, explore the security of short connections
This article is shared by the elab technical team. The original title “exploring HTTPS” has been revised and changed. 1. Introduction For im developers, the most commonly used communication technologies in IM are socket long connection and HTTP short connection (usually a mainstream im will be the combination of these two communication means). From the […]
-
Windows login to Ubuntu via SSH
Generate windows public key Execute in CMD of windows: SSH keygen -t RSA, and enter directly during the execution. After execution, it will be displayed in c:\users\xxx\ The following three files are generated in the SSH folder: id_ RSA is the local private key id_ rsa. Pub is a public key known_ Hosts is a […]
-
4、 Public and private keys, encryption and digital signatures
catalogue 1、 Explanation of terms 1. What are public and private keys 2. What is encryption and digital signature2、 Explanation of Alipay SDK payment process 1. Some keywords 2. Alipay payment process 3. Simple demonstration of the server‘s signing of the order information and the payment result verification The content of Alipay SDK involved in […]
-
Python- call run system command
os. The Popen method can get the returned content HeadText = os.popen(‘sed -n 1p \”{}\”‘.format(DirFile)).read() os. The system method executes the run command Command=”sh /home/TradeInfo/new/trade_plan/py/CopyTradeplan.sh” os.system(Command) Python calls SSH command #!/usr/bin/python3 import os Keyfile = “/root/.ssh/id\u RSA” \u the private key of the client. No matter which end generates the private key and public key, […]
-
OpenSSL uses a mixed encryption method to encrypt and decrypt large files
Using OpenSSL background RSA and AES are classicAsymmetric encryption algorithmandSymmetric encryption algorithm。 howeverAsymmetric encryption algorithmIt is not suitable for processing large files, so we generally useHybrid encryptionMeans, i.e.: generateSymmetric encryption algorithmRequiredSymmetric cipher useSymmetric encryption algorithmEncrypt large files useAsymmetric encryption algorithmencryptionSymmetric cipher method encryption Required to create AESkeyandiv, stored in a text file Use thiskeyandivencryptionLarge file […]
-
Http: talk about HTTPS
1、 What is HTTPS HTTPS is an upgrade of HTTP. Because HTTP is transmitted in clear text, it is very insecure. HTTPS encrypts data on the basis of HTTP. 2、 HTTPS encryption 1. symmetric encryption The server sends a key to the client. The client encrypts the data with the key, transmits it to […]
-
Github/gitlab configuring SSH key and getting started with RSA
preface The team’s project has recently changed to gitlab hosting, and the authentication method has changed from https+ssh to pure SSH. Therefore, it is necessary to configure the SSH key. SSH encryption uses RSA algorithm. A simple demonstration of encryption and decryption will be given at the end of the article. 1、 Generate public and […]
-
Hengyuan cloud_ Teach you how to log in to the terminal instance
The following is divided into two parts:1、 Windows login instance2、 Macos/linux login instance Windows login instance How to get login information? Login information inMy examplesFor example, the login instruction is:ssh -p 60001 [email protected] To extract the login host name, port number and user, you need to fill in the SSH client: host name port user […]
-
How to verify the login signature of quick game
Requirements description After the quick game developer successfully invokes the account login interface, it will receive the gameauthsign field, which represents the login signature returned by the Huawei server. It is recommended that the developer call the “verify login signature interface” to verify the returned signature, so as to ensure the accuracy of the login […]
-
Teach you to quickly upgrade the website to HTTPS for free
Preparation First, you have to have your own domain name. For example, the domain name I want to apply for is cors Happyjava Cn Application for certificate Open freesl Cn website, fill in the domain name and click “create a free SSL certificate”. Then you will be prompted to enter mailbox, select certificate type, authentication […]
-
IOS reverse 06: RSA encryption (Part 1):
IOS underlying principles + reverse article summary This paper mainly introduces the mathematical principle of RSA and the code demonstration of RSA Introduction cryptography It refers to the technical science of information encryption and password cracking. The earliest date can be traced back to 2000 years ago. Today’s cryptography is based on mathematics. History of […]