Transferred from: http://www.2cto.com/os/201110/108736.htmlIntroductionIn the previous content, we talked about the traditional permissions of only three identities (Owner,group,others) with three permissions (R,W,X) and three special permissions (Suid,sgid,sbit), with the development of the application, These combinations of permissions are no longer suitable for complex file system permission control requirements today.For example, the permissions of the directory data are: drwxr-x-, the owner
Linux access Control List (ACL) is mainly used to control the user's permissions, you can do different users have different permissions on the same file, then how to operate it? The following small compilation teaches you how to set access control lists (ACLs) under Linux to control user permissions.
Working with LIUNX with rights control is an easy task. It can define the permissions of any user,group and other. This is great when you're on a deskto
15.1 chmod: Changing the mode of files and directories
15.2 chown: Change the user owner and group owner of files and directories
15.3 chgrp: Changing the owning group of a file or directory
15.4 Umask: Show and set file and directory create default permission mask
15.5 Getfacl: Displaying ACLs for files or directories
15.6 Setfacl: Setting ACLs on files or directories
15.7 chacl: Ch
Setfacl (1) Access Control lists Setfacl (1) NAME setfacl-set file access control Lists Synopsis Setfacl [-bkndrlpvh] [{-m|-x} Acl_spec] [{-m|-x} Acl_file] file ... #注意参数的使用顺序Setfacl--restore=fileDESCRIPTIONThis utility sets Access Control Lists (ACLs) of files and directories. On the command line, a sequence of commands are followed by aSequence of files (which in turn can is followed by another sequence of commands, ...).The opt
validity period of the new certificate// The effective time of the new certificate starts from the time it was issued. Therefore, the new date () is used to obtain the certificate but the time is used.// The validity period of the certificate is 15 minutes.// An object of the certificatevalidity type has been created on the same date and passed as a parameter to the Set () method of the x509certinfo object in the previous step.Date begindate = new date ();Date enddate = new date (begindate. get
certificate to be issued
Byte [] encod2 = c2.getEncoded ();
X509CertImpl cimp2 = new X509CertImpl (encod2); Use this encoding to create an X509CertImpl object
X509CertInfo cinfo2 = (X509CertInfo) cimp2.get (X509CertImpl. NAME + "." + X509CertImpl. INFO); get the X509CertInfo object
(6) set the validity period of the new certificate
Date begindate = new Date (); get the current time
Date enddate = new Date (begindate. getTime () + 3000*24*60*60 * 1000L); valid for 3000 days
CertificateVal
I. Initialization instructions
During Gg implementation, Initialization is an important task, especially when there is a large amount of data to be initialized and the system is 7x24.
For static initialization, the business will be stopped and the data on the DB will not change. At this time, we can use expdp/impdp or dblink to synchronize the basic data, start the relevant Gg synchronization process.
However, if zero downtime is required, DB transactions will continue. You can use the followin
+ "." + x509certimpl. info); get the x509certinfo object(6) set the validity period of the new certificateDate begindate = new date (); get the current timeDate enddate = new date (begindate. gettime () + 3000*24*60*60 * 1000l); valid for 3000 daysCertificatevalidity CV = new certificatevalidity (begindate, enddate); create an objectCinfo2.set (x509certinfo. validity, CV); set the validity period(7) set the serial number of the new certificateInt Sn = (INT) (begindate. gettime ()/1000); with th
Java.io.outputstream. PrintStream : Print Flow1: Provides more features, such as printing methods. You can print any type of data directly.2: It has an automatic refresh mechanism that creates the object, specifies parameters, and can be automatically refreshed for the specified method.3: It uses the native default character encoding.4: The Print method of the stream does not throw IOException.The constructor for the object.PrintStream (File file): Creates a new print stream with the specified f
beginIndex ){Return substring (beginIndex, count );}Public String substring (int beginIndex, int endIndex ){......Return (beginIndex = 0) (endIndex = count ))? This:New String (offset + beginIndex, endIndex-beginIndex, value );}String (int offset, int count, char value []) {This. value = value;This. offset = offset;This. count = count;} Since we are discussing strings, what encoding is used by JVM by default? Through debugging, we can find that:Copy codeThe Code is as follows:Public static Cha
--> DataInputStreamDataInputStream in = new DataInputStream (new ByteArrayInputStream (str. getBytes (); FileInputStream --> BufferedInputStream --> DataInputStreamDataInputStream in = new DataInputStream (new BufferedInputStream (new FileInputStream ("Data.txt "))); fileWriter --> BufferedWriter --> PrintWriterPrintWriter pw = new PrintWriter (new BufferedWriter ("text. out "); System. out (PrintStream) --> PrintWriterPrintWriter pw = new PrintWriter (System. out, true); FileOutputStream --> B
In wireless communication, the nrf24l01 wireless transceiver module produced by Nordic is the choice of many players. It is GHz ~ The single-chip wireless transceiver chip in the GHz ISM band has the advantages of strong functions, convenient control, and low price. One piece of nrf24l01 can receive data sent from six channels at the same time, and change the communication channel to avoid wireless communication interference. The following briefly introduces the use of this chip.
Two single-chip
); ///////////////////////////////////////////////////////////////////////////End Mode IISets the validity period of the new certificate, which is valid for the current backward N-year, the new certificate'sThe due date cannot exceed the valid date of the CA certificateDate begindate = new Date ();Calendar cal = Calendar.getinstance ();Cal.settime (begindate);Cal.add (Cal. YEAR,N);Date endDate = Cal.gettime ();certificatevalidity CV = new certificatevalidity (begindate,enddate);Cinfo_second.set
PrintWriter is a print output stream of character types, inherited from writer, used to print the formatted representation of an object to the text output stream.
Main functions of PrintWriter:
PrintWriter (OutputStream out) PrintWriter (OutputStream out, Boolean AutoFlush) PrintWriter (Writer wr) PrintWriter ( Writer wr, Boolean AutoFlush) printwriter (file file) printwriter (file file, string CSN) PrintWriter (string fileName) Print Writer (String
); Create a X509certimpl type object with this encodingX509certinfo cinfo1= (X509certinfo) cimp1.get (x509certimpl.name+ ".") +x509certimpl.info); Get X509certinfo ObjectX500name issuer= (x500name) cinfo1.get (x509certinfo.subject+ ".") +certificateissuername.dn_name); Get the issuer information for the X509name type(4) Obtain the certificate to be issuedCertificatefactory cf=certificatefactory.getinstance ("X.509");FileInputStream in2=new FileInputStream ("USER.CSR");Java.security.cert.Certific
There are two configuration levels for changing the tracking configuration, one for the database configuration level and the other for the table configuration level. 1) database configuration level. You can use the SQL command ALTER dtabase to modify the change tracking configuration, the database default is to start the tracking configuration, we can execute the following command to start the trace: ALTER DATABASE heavi_case1 SET change_tracking = on; Description: After executing thi
will be N more information about IPSec applications ..) (the game blade is on the edge of the Technical Ghost God to create a server security myth! Pioneer in the Internet revolution! Server Security discussion area [S.S. D. A] http://www.31896.net)
⑤ Delete, move, rename, or use the Access Control table column Access Control Lists (ACLs) to Control key system files, commands, and folders:
The hacker often comes to the shellside, and uses all the fea
the GE ports (slot #/1, slot #/2) in the preceding switch.You can configure GE3 and GE4 as port Channels like MSM, and configure subinterfaces (ISL or 802.1q encapsulated) on them)Interface GigabitEthernet3Channel-group 1Interface GigabitEthernet4Channel-group 1! --- Both port gig 3 and gig 4 are part of the channel group 1.Interface Port-channel1.2Encapsulation dot1Q 2Ip address 2.2.2.2 255.255.255.0Interface Port-channel1.3Encapsulation dot1Q 3Ip address 1.1.1.2 255.255.255.0Switch configurat
Access Control List (ACL) is a List of router interface commands used to Control inbound and outbound data packets. ACL applies to all routing protocols, such as IP, IPX, and AppleTalk.
The ACL is also defined based on each protocol. If the router interface is configured to support three Protocol IP addresses, AppleTalk, and IPX, you must define three ACLs to control the data packets of these three protocols.
The role of ACL
ACL can limit network tra
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.