First, download Tomcat
1, enter the official website http://tomcat.apache.org/, select Download, download the required version of Tomcat.
Here we choose to download the latest version of Tomcat 9.
Note There are zip and exe two formats, ZIP (64-bit Windows zip (PGP,MD5,SHA1)) is free to install version, EXE (32-bit/64-bit Windows Service Installer (PGP,MD5, SHA1)) is the installation version. Also observe
-based system, such as opensuse,sles,centos,red hat and Oracle Enterprise. Import Elastic PGP Key
We use the Elastic signature key (PGP key D88E42B4, which can be signed from https://pgp.mit.edu) for all packages, fingerprint:
RPM--import Https://artifacts.elastic.co/GPG-KEY-elasticsearch
Create a Kibana source
Echo ' [kibana-5.x]
Name=kibana repository for 5.x packages
BASEURL=HTTPS://ARTIFACTS.ELASTIC.CO
Readers who have a long memory and a history of online trading may also vaguely recall that the creator of the famous PGP (Pretty Good Privacy) software, security expert Phil Zimmermann, launched a "Pgpfone" in 1996. of Internet telephony products. About three years later, broadband networks really started to grow. This is the early stage of the network telephony development cycle. Pgpfone a little too far ahead, not to arouse people's attention. But
for business-grade needs. The following is an introduction to some of the absolute security encryption methods.
The Forth is to use software to encrypt, can find many on the net. And this encryption method is absolutely safe. And this encryption method due to the different manufacturers and the principle of encryption is different below a brief introduction of several
With WinRAR, you can securely encrypt your data. Everyone mentions WinRAR, always think of its powerful compression function,
This document describes how to install MongoDB under CentOS 6 or 7 x64.1. Configuration package Management System (YUM)Take the MongoDB 3.6 version as an exampleCreate a/etc/yum.repos.d/mongodb-org-3.6.repo file to install MongoDB directly using Yum;The Enterprise Edition is/etc/yum.repos.d/mongodb-enterprise.repo.The contents of the file are as follows:A. Community version[mongodb-org-3.6== https://11= HTTPS:// WWW.MONGODB.ORG/STATIC/PGP/SERVER-3.6.
Tags: pack art sap resolves HTTP star base using shellUse aggregation to throw exceptions in spring data MongoDB MongoDB version 3.6 Org.springframework.dao.InvalidDataAccessApiUsageException:Command execution failed: for Spring Data MongoDB version Upgrading Mongodb-driver to 3.6 does not solve the problem Downgrade the MongoDB version to 3.4 It's a yum source. MongoDB 3.4 3.4
1. vi/etc/yum.repos.d/mongodb-3.4. Repo
[MongoDB-org-3.4]
name=MongoDB Repository
baseurl=https://repo.mongodb.org
Label:MongoDB only offers a 64-bit lts (long-term support) version of Ubuntu packages. For example, 12.04 lts,14.04 lts,16.04 LTS and so on.1. Import the public key used by the package management systemUbuntu Package management Tools (for example: dpkg and apt) require resellers to use GPG keys to sign packages to ensure the consistency and authenticity of the scenario. Use the following command to import the MongoDB public GPG key. sudo apt-key adv--keyserver HKP://keyserver.ubuntu.com:80--recv
system and log on again. You can see encryption and signing in the shortcut menu described above (1 ).
To encrypt or sign a file, you must first create a key for the corresponding user. The created key is a pair of public and private keys. The Public Key is usually published and encrypted by other users. After receiving an encrypted file from another user, use the private key to decrypt it.
Step 1. Create a local user key in Host1
Click "Application> attachment> password and encryption key" in
several absolute security encryption methods.
4. Use WinRAR to securely encrypt your data. When we mention WinRAR, we always think of its powerful compression function. In fact, WinRAR's encryption function is also very powerful. WinRAR adopts one-way encryption, which cannot be cracked. Therefore, if we need to protect privacy, we only need to compress these private files into a package and add the password, which is absolutely safe. No hacker or computer expert can steal your privacy.
Althoug
Linux: GPG encryption and decryption (1)
With the development of network and computer technology, the security of data storage and data exchange has become more and more important. encryption technology has been used for data storage and data exchange for a long time. In order to ensure the correctness of the identity of both parties during network data exchange, the visa system is also mature. GPG is a set of tools used to encrypt data and create certificates. It is a completely free software
Comments: GPG and PGP are two types of encryption software. You can use the public key to securely spread your own files on the Internet. I used GPG a few days ago, which was very convenient and encountered some problems. Therefore, I wrote my usage in order to avoid detours for the first time using GPG. Let's talk about how to obtain GPG. GPG is an open source software and is completely free of charge. You can use GPG and
sanitised.
Timeline
======================
2010-07-16, vulnerability identified
2010-07-17, vendor contacted and asked for pgp key
2010-07-19, vendor sent his pgp key
2010-07-20, vulnerability sent to vendor
2011-01-18, advisory published after 6 month
Use of terms
======================
Unaltered electronic reproduction of this advisory is permitted. For all
Other reproduction or publication, in printin
Celebrate
Http://www.djangoproject.com/weblog/2008/sep/03/1/
Django 1.0 released!
No, you're not hallucinating, It's really here.
Around three years ago, Adrian, Simon, Wilson and I released some code to the world. Our plan was to hack quietly on it for a bit, release a solid 1.0 Release, and thenReallyGet the ball rolling.
Well.
What happened, of course, was that an amazing community sprung up literally overnight-our IRC channel had over a hundred people in it the day after release, and it's
annotated tags that represent releases.$ GPG -- Import
Copy and paste the key (s) below, then enter EOF (CTRL-d) to end the input and process the keys.----- Begin PGP Public Key Block -----
Version: GnuPG v1.4.2.2 (GNU/Linux)
Mqgibennwd4rbact9/h4v9xnngdou13y3dvox6/t43lppixej8ex9wb + 8 llurosvLfhphawsvacflmi7f7jdsrf + ovtzl9shpkdlfwbjmnku66/tzmpews4m782ndtw7BytesU4pvgchaajztyj1eg + uybiueajmfearb0qran7deoff0fexseaua6u90seovks0zWnj96sa8bl + a1ooeuufpm
.-- Nobulid does not execute any completion stage.-- Nodeps does not verify the association of the suite files.-- Nofiles does not verify the attributes of the file.-- Nogpg skips all GPG signature authentication.-- Nomd5 does not use MD5 encoding to verify the file size and correctness.-- Nopgp: the signature authentication of all PGP is skipped.-- Noorder does not re-orchestrate the installation sequence of the suite to meet their correlations.-- No
names.Verifying git tags
Load the following public key into your GnuPG key database. The key is used to sign annotated tags that represent releases.$ GPG -- ImportCopy and paste the key (s) below, then enter EOF (CTRL-d) to end the input and process the keys.----- Begin PGP Public Key Block -----Version: GnuPG v1.4.2.2 (GNU/Linux)
Mqgibennwd4rbact9/h4v9xnngdou13y3dvox6/t43lppixej8ex9wb + 8 llurosvLfhphawsvacflmi7f7jdsrf + ovtzl9shpkdlfwbjmnku66/tzmpe
. download and install the epel RPM package
32-bit System
[Root @ centos ~] # Rpm-IVH http://download.fedora.redhat.com/pub/epel/5/i386/epel-release-5-4.noarch.rpm
64-bit System
[Root @ centos ~] # Rpm-IVH http://download.fedora.redhat.com/pub/epel/5/x86_64/epel-release-5-4.noarch.rpm
If you do not know your system kernel, run the uname-a command to view your kernel information.
2. Import the PGP key of the Dag.
[Root @ centos ~] # Rpm-import/et
1. download the Tomcat software package from the official website. Extract (pgp, md5) compressed package
1. download the Tomcat software package from the official website.
Http://tomcat.apache.org/
Click a version of download on the left. I chose tomcat6.x. you can choose to install it based on your actual situation. click the hyper-connection and select the tar.gz (pgp, md5) compressed package under Binary
andto pass that drive around between users or between machines.Verifying Git Tags
Load the following public key into your GnuPG key database. The key is used to sign annotated tags that represent releases.
$ gpg --import
Copy and paste the key (s) below, then enter EOF (Ctrl-D) to end the input and process the keys.
-----BEGIN PGP PUBLIC KEY BLOCK-----Version: GnuPG v1.4.2.2 (GNU/Linux)mQGiBEnnWD4RBACt9/h4v9xnnGDou13y3dvOx6/t43LPPIxeJ8eX9WB+8LLuROSVl
-CentOS-6
Display All imported public keys in gpg format:
Command: rpm-qa gpg-pubkey *
Display the key details:
Command: rpm-qi/media/cdrom/RPM-GPG-KEY-CentOS-6
Note: After the public key is imported, the package prototype and validity check will be executed during the installation of the software package.
2. Manual check
For example, check the package zsh:
[Root @ localhost ~] # Rpm-K/media/cdrom/Packages/zsh-4.3.10-7.el6.x86_64.rpm
/Media/cdrom/Packages/zsh-4.3.10-7.el6.x86_64.rpm: rsa sha1 (m
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.