Moore's law holds that the number of transistors on an integrated circuit doubles every 18 months, performance doubles, and the price drops by half; or the computer performance that every dollar can buy will be doubled every 18 months.
This
Except for the last. htacess file, do just move the site, the program has not moved.
Just found out a bunch of problems today.
; Magic quotes for incoming Get/post/cookie data.
MAGIC_QUOTES_GPC = Off
; Magic quotes for runtime-generated data,
A few days ago, I heard that the memory size of 210 MB has dropped to 256, which is a bit exciting. However, my machine uses Intel's motherboard, and there are only two memory slots, and the two are full.
Very depressing.
Yesterday, I heard that
Louis Vuitton outlet store 2 Nigerian networking systems chosen seeing that enemy organizationshave an array of missions, from Homeland airport security on to weekend watercraft precautions, labriola extends ented. vessel gives us better ability to
If you 've ever wanted to get the same kind of photo retouching love that the stars get when they're pictured on magazine covers, now's your chance. tucia.com is a new online service which offers professional re-touching of any photo by a team of
Some time ago
Access We
ServiceTool It was very slow, so I pulled the fiber of telecom. Now both the lines of China Telecom and China Netcom have IP addresses and gateways respectively, but I don't want others to use two addresses.
Access Such as
Software installed in Linux has never been paid before (except for commercial Linux operating systems and large databases ). Today, I installed helix, so I couldn't help sweating. I didn't expect the software under Linux to be as expensive and scary.
With the rapid development of network technology and data storage, more and more home users and small and medium-sized Enterprises, SOHO Office users feel the pressure on the hard disk space, and many users want to download and provide network
the following command: 123456)Example: OpenSSL x509-req-days 10000-shal-extensions v3_ca-signkey private/ca.key.pem-in private/ca.csr-out certs/ca.cerX509 issuing the certificate of the Order-req Certificate Input Request-days Certificate Valid days, here is 10,000 days-shal Certificate Digest algorithm, here is the SHA1 algorithm-extensions adding extensions by the OpenSSL profile V3_ca item-signkey self-signed key, here is Private/ca.key.pem (Root
(Connect to the Sendmail network, and ensure security (on) 5. Configure STARTTLS1. generate an authority[Root @ mail ~] # Cd/etc/pki/[Root @ mail pki] # vim tls/openssl. cnf[Root @ mail CA] # pwd/Etc/pki/CA[Root @ mail CA] # mkdir crl certs newcerts[Root @ mail CA] # touch index.txt serial[Root @ mail CA] # echo "01"> serial[Root @ mail CA] # openssl genrsa 1024> private/cakey. pemGenerating RSA private key, 1024 bit long modulus......................
Let's Encrypt to website plus HTTPS full guide 2016A period of time in the Beijing Unicom 3G Mobile network, found that their site was unicom hijacked injected into the disgusting charge of the phone, decided to let my website forced use of HTTPS, avoid ISP hijacking.Some doubts before using HTTPSIt's 2016, and using HTTPS is not as expensive as it was a few years ago. Of course, I also understand a circle to eliminate their own doubts, mainly:
My site (a simple blog) may not be necessa
Service, manually turn on registryUpload again[email protected] docker]# Docker push 192.168.122.1:5000/nginxClose and deletesecond, generate self-signed certificateGenerate a self-signed certificate on the server host, create a folder to hold the certificate[Email protected] docker]# pwd/tmp/docker[Email protected] docker]#mkdir certs[Email protected] docker]#OpenSSL req-newkey rsa:4096-nodes-sha256-keyout certs
the introductions on the Internet are incomplete and not fully operable.I currently know about the following types of certificates:1. keytoolCannot create CA certificate2. createcert.exe from Sybase ASAIt seems that you cannot create a PKCS12 Certificate3. OpenSSLThe most powerful function.Therefore, only OpenSSL is introduced here.After installing the OpenSSL-Win32 to d: \ tools, modify the configuration file d: \ tools \ OpenSSL-Win32 \ bin \ openssl. cfgFind:[CA_default]Dir = $ ENV: OPENSSL_
certificate is/etc/pki/CA, store the certificate-related information of the intermediate CA in your own directory. To reflect the transfer logic of the trust chain, you can create a directory under/etc/pki/CA, assume that the certificate directory of the intermediate CA is/etc/pki/CA/intermediate /.
The process of initializing the certificate directory is no different from that when the Root CA is created:
# mkdir /etc/pki/CA/intermediate # cd /etc/pki/CA/intermediate # mkdir
/ { root /home/workspace/; index index.asp index.aspx; }}
After configuration, restart nginx and Use https to open the website. the browser will prompt a certificate error and click Continue browsing.
2. Server-client two-way Verification
Create a ca folder in the nginx directory and enter ca.
#Mkdir newcerts private conf server.
The newcerts subdirectory stores the digital certificates (certificate Backup Directory) signed (issued) by the CA ). The private directory is used to stor
:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP; ssl_prefer_server_ciphers on; location / { root /usr/share/nginx/html; index index.html index.htm; } }
The above is a simple configuration, and the following is the work of issuing certificates.
Issue certificate
Create the configuration file/etc/nginx/CA/CONF/OpenSSL. conf
[ ca ]default_ca = foo # The default ca section [ foo ]dir = /etc/nginx/ca # top dirda
Enable uploading of images to the native repository via SSL on the warehouse host nativelyServer side:1. Generate a Certificate[Email protected]:~$ sudo openssl req-x509-nodes-days 365-subj '/cn= ' test.registry.com '-newkey rsa:4096-keyout cer Ts/domain.key-out certs/domain.crt #把证书生成到certs目录下, generate a test.registry.com domain name certificate2. Start the container[Email protected]:~$ Docker run-d-P 500
Docker starts the listening port, uses HTTP, and can remotely manage the Docker host.Such a scenario has drawbacks, the API level is not provide user authentication, Token, such as authentication, anyone can use the address plus port to control Docker host, in order to avoid such a situation, Docker official support HTTPS, but we need to generate certificates ourselves.
The OpenSSL command is used to generate CA certificates, server private keys, client certificates, signatures, and OpenSSL com
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.