Tag:secret key
-
Time:2021-3-4
1、 Passphase encryption 1.1 summary 1) For emergency data encryption without certificate and key, the data can be encrypted and decrypted directly based on the password provided by the user. 2) A pass phrase is a password that allows spaces. This passphase will not be stored in the database, which means that it will not […]
-
Time:2021-3-4
Configuration steps Servera server: [[email protected] ~]# su – usera [[email protected] ~]$ pwd /home/usera #Generating key pairs using RSA [[email protected] ~]$ ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/home/usera/.ssh/id_rsa): Created directory ‘/home/usera/.ssh’. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved […]
-
Time:2021-3-3
# Redis configuration file example. # Note that in order to read the configuration file, Redis must be # started with the file path as first argument: #In order to read the configuration file, redis must start with the file path as the first parameter. # ./redis-server /path/to/redis.conf # Note on units: when memory size […]
-
Time:2021-2-24
SSL (secure socket layer) is a protocol encryption layer based on HTTPS. It was initially developed by Netscape, and then standardized by IETF (the Internet Engineering Task Force) and written into RFC (request for comments). RFC contains a lot of Internet technology specifications! At first, because HTTP uses plaintext when transmitting data (although the data […]
-
Time:2021-2-22
1. HTTP status code name classification give an example 1XX Message status 100 continue 2XX Request successful 200 request successful202 the request succeeded, but no resource entity was returned 3XX redirect 301 permanent redirection302 temporary redirection 4XX Client error There is a syntax error in the 400 request403 request rejected by server404 the server could […]
-
Time:2021-2-19
github.com/little -Bit shy / docker Hadoop (project address) Docker dependency building Install docker If you have installed it, skip this stepbash docker.install Install shyaml If you have installed it, skip this stepbash compose.install Start docker systemctl start docker Zookeeper cluster construction Environmental dependence Three servers are preferred for zookeeper1, zookeeper2 and zookeeper3 Modify configuration file […]
-
Time:2021-2-18
For the security of the database, in addition to the use of users, permissions and roles to control, it can also be achieved through data encryption or data mask. For transparent data encryption, individual table columns or the entire table space can be encrypted. When a user inserts data into an encrypted column, transparent data […]
-
Time:2021-2-6
It is imperative for the whole network to implement HTTPS HTTPS (full name: Hypertext Transfer Protocol over secure socket layer) is to ensure the security of data transmission between client and server. In the past two years, Internet giants such as Google, Baidu and Facebook have started to vigorously promote HTTPS. Many large Internet companies […]
-
Time:2021-2-5
People who work with computers all know the office software. Now it has become a household name. Two days ago, a small partner who used office 2007 asked Xiaobian about the serial number of office 2007 and how to install Office 2007 for free. Today Xiaobian will answer them one by one and give you […]
-
Time:2021-2-4
Recently, because the project is about to go online, the server has been transferred from the test environment to the production environment, and the login method has been replaced by the key authentication from the original password authentication. The purpose of this is to prevent the server password from being brutally cracked. What is SSH? […]
-
Time:2021-2-2
What is AWS? Amazon Web services (AWS) is the most comprehensive and widely used cloud platform in the world provided by Amazon. The concept of cloud was first heard from Alibaba cloud and Tencent cloud in China. Later, with more contact with servers, we gradually learned about some foreign clouds, such as Amazon cloud and […]
-
Time:2021-2-1
Recently, we are calling the third-party interface, which requires AES encryption and the secret key is 16 bits in length. Please record here. First, reference the namespace: using System.IO; using System.Text; using System.Security.Cryptography; /// ///AES encryption (vector free) /// ///Encrypted plaintext ///Key ///Ciphertext public string AESEncrypt(string Data, string Key) { MemoryStream mStream = new MemoryStream(); […]