Tag:public key

  • Git related configuration


    Configure user name and mailbox //Configure user name git config –global user.name “username” //Configure mailbox git config –global user.email “[email protected]” Generate SSH key ssh-keygen -t rsa -C “[email protected]” Ignore changes in file permissions or file owners #Current version Library git config core.filemode false #Global configuration git config –global core.fileMode false ssh Git public key This […]

  • C# Ras generates. Net public key and private key and converts. Net public key and private key to Java public key and private key classes


    When we use RSA encryption, we often need the public key and private key, but sometimes only the public key and private key of Java Base64; Friends in need can refer to it C # commonly used encryption algorithms, refer to the articleC # commonly used encryption algorithms encryptionhelper classes: MD5, Base64, SHA1, sha256, hmacsha256, […]

  • C # common encryption algorithms: MD5, Base64, SHA1, sha256, hmacsha256, DES, AES, RSA


    RSA generates c# the public and private keys in XML format and the base64 bit public and private keys of Java. Reference article:C# Ras generates. Net public key and private key and converts. Net public key and private key to Java public key and private key classes catalogue brief introduction Class to reference 1、 MD5 […]

  • SSH secure communication and port forwarding (I)


    Blog reference https://segmentfault.com/a/1190000010312601 summary The normal operation of all businesses is inseparable from a safe operation environment. System security is directly related to business stability, reliability and availability. This chapter introduces some topics related to system security. Basic concepts of encryption Safety objectives: Confidentiality: confidentiality Integrity: integrity Availability: availability Attack type: Attacks threatening confidentiality: eavesdropping, […]

  • HTTP and HTTPS protocols


    preface HTTP is the knowledge that front-end developers must know and will contact in daily request processing. However, if we want to form a knowledge system, we need to fill in a little knowledge. Today we will talk about HTTP and HTTPS protocols. What is the HTTP protocol HTTP protocol is the abbreviation of hypertext […]

  • PHP + laravel for deployment automation


    Mirror Address (Nuggets) PHP + laravel for deployment automationThe so-called automatic deployment, I understand, is a means to quickly and automatically deploy the code to the target server on the premise that the user guarantees the code quality Implementation principle Local push code – > code base – > webhook notification server – > automatically […]

  • Secure data transmission between front and rear terminals – pre research on “1” technology


    lead It’s not the first time I’ve written about this topic. Recently, a friend asked me about “ensuring password transmission security in web applications” five years ago: “why can’t the back end solve it step by step as you say?” encryption and decryption is a thousand miles away. I think most of it is that […]

  • Jsliang job series – 29 – http / HTTPS


    One directory What’s the difference between a non tossing front end and a salted fish catalogue One directory II. Preface III. development history of HTTP  3.1 HTTP/0.9  3.2 HTTP/1.0  3.3 HTTP/1.1  3.4 HTTP/2.0  3.5 HTTP/3.0 Four http  4.1 request method  4.2 advantages and disadvantages  4.3 difference between get and post   4.3.1 [error] the length of […]

  • Code implementation of ECC algorithm


    Code implementation of ECC algorithm What is ECC algorithm Elliptic curve cryptography, or ECC. Is a public key encryption algorithm based on elliptic curve mathematics. The use of elliptic curve in cryptography was independently proposed by Neal Koblitz and Victor Miller in 1985. Details link https://www.cnblogs.com/Kalafinaian/p/7392505.html 。 If you can insist on reading the above […]

  • Vernacular operation principle


    Series articles: What should I ask in a technical interview? How should candidates respond? Vernacular operation principle What is HTTPS? How does it work? HTTPS (full name: Hyper Text Transfer Protocol over secure socket layer) is an HTTP channel aiming at security. In short, it is the secure version of HTTP, that is, the SSL […]

  • Clickhouse cluster construction (I)


    The mountains and rivers are far away, and the falling flowers and wind and rain hurt the spring even more. ClickHousesummary What is?ClickHouse? ClickHouseIt’s RussianYandexOpen source column storage database in 2016(DBMS)It is mainly used for online analysis and query processing(OLAP), able to useSQLQuery and generate analysis data report in real time. What is columnar storage? […]

  • “Mac” installs homebrew to build git environment


    1 homebrew introduction Homebrew is a software package management tool for Mac platform. The official answer to what it can do is: “homebrew makes Mac OS more complete. Use gem to install gems and brew to install dependent packages.” 2 homebrew installation Enter the following command in the terminal usr/bin/ruby -e “$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)” Press […]