Objective
The previous article recorded how to use HTTPS (SSL) in Kestrel, which is actually used in our current project.
Data security is often a part of the developer's easy to overlook, including myself. In the past two years there have been a
1 Find character position function:
Strpos ($str, Search,[int]): Find the first position of search in $str starting from int;
Stripos ($str, search,[int]): function returns the position where the string first appears in another string. This function
DEBUGLZQ on the Internet search related file encryption program, found that the basic is for "character creation", "text" encryption and decryption. For video files, pictures and other general files encryption and decryption procedures are few, so
Technology StackVue.js Main frame Vuex state management Vue-router Routing Management
General Process
In the general login process, a front-end scheme is: Check the status: When the page or route changes to check whether there is a login status
Block chain knowledge level Four examination, examination time 30 minutes, total score 100 points, please seriously answer, the topic person and Proctor Teacher: Gao Zhihao, please reprint note, thank you for your support.
One, single topic (5
addcslashes-to add a backslash escape character for some characters inside a string
Addslashes-the characters inside a string in a specified manner
bin2hex-converts binary data to hexadecimal representations
alias function for Chop-rtrim ()
This article includes the following:
1, cryptography Application Block of a simple introduction (refer to the English document with its own)
2, Configure Cryptography Application Block (this article to configure symmetric encryption Provider as an
Users, Groups, permissionsSecurity contextPermissionsR,w,xFile:R: Readable, you can view the contents of the file using commands like CatW: writable, can edit or delete this fileX: Executable, can be submitted to the kernel at the command prompt as
Permissions:r,w,xfiles:R, readable ,w can be edited or deleted , X, executable, run command to kernel at command promptdirectory:r can perform LS on this directory to list all directories. W, can create files in this directory , x available CD
Encryption method:Symmetric encryption: Encrypt and decrypt using the same passwordPublic Key cryptography: each password appears in pairs, one for the private key (secret key) and one for the public keyOne-way encryption, hash encryption:
I. User's permissions1. For documents:R: Readable, you can view the contents of the file using commands like CatW: writable, can edit or delete this fileX: Executable, exacutable, can be submitted to the kernel at the command prompt as a command to
Users, Groups, permissionsSecurity context (Secure):Permissions:R,w,xFile:R: Readable, you can use similar commands such as cat to view the contents of the file;W: writable, can edit or delete this file;X: Executable, exacutable, can be submitted to
7.1, User Configuration files7.2, user management related files7.3, user management commands7.4, user Group Management Command Delete user Userdel [[email protected]~]# Userdel [-r] User name//Be sure to add-R to delete home directoriesIn addition
One, user filesFiles:/etc/passwdThis file records the user's user name, user ID, owning group, home directory, Shell information:[[email protected] ~]# tail-n3/etc/passwdruanwenwu:x:1003:1003::/home/ruanwenwu:/bin/ bashapache:x:
Week Five Lesson NotesI. installation of the application software1. Know the software: |libmp3lame0|-3.99.3-23|. el7|. x86_64|. RpmSoftware name software version applicable system 64-bit Red hat applicable software2. How to install the
Week Five Lesson NotesI. installation of the application software1. Know the software: |libmp3lame0|-3.99.3-23|. el7|. x86_64|. RpmSoftware name software version applicable system 64-bit Red hat applicable software2. How to install the
I. The process of user login verification1. Find out if there is an account entered in/etc/passwd? If not then jump out, if any, then the account corresponding UID and GID (in/etc/group) read out, in addition, the account's home directory and shell
Learning resources from: www.magedu.comMistakes are unavoidable in the learning process, and if found, they are also pointed out by the great gods.Some of the sample operations are related to historical operations, and if the previous example
The more server security requirements of servers, the more need to establish a reasonable level of user rights and server operating norms. In Linux, user information is viewed and modified primarily through user profiles .1 User information file (1)
Seven field explanations in the/etc/passwd directory
Account user name is also called login name
Password encrypted user name is typically x true user encrypted password under/etc/shadow file
ID of UID User
Group ID of the GID
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.