Environment: centos6.7Because of the need for HTTPS, to use the http_ssl_module module, but Http_ssl_module does not belong to the basic module nginx, so I recompile add1. First look at the kernel and system version number.[Email protected] ~]# uname-alinux zabbix.nnkj.com 2.6.32-573.el6.x86_64 #1 SMP Thu Jul 15:44:03 UTC x86_64 x86_ x86_64 Gnu/linux[[email protected] ~]# Cat/etc/issuecentos release 6.7 (Final) Kernel \ r on an \m2. Look at the compile and install Nginx, compile the installed mo
results:Original: AmigoxiexiexingxingAfter MD5: e9ac094091b96b84cca48098bc21b1d63, SHA Encryption 3.1 overviewSHA is a data encryption algorithm, which has been developed and improved by cryptographic experts for many years, and has now become one of the most secure hashing algorithms and is widely used. The idea of the algorithm is to receive a piece of plaintext, and then convert it into a paragraph (usually smaller) ciphertext in an irreversible way, or simply to take a string of input codes
algorithm, which has been developed and improved by cryptographic experts for many years, and has now become one of the most secure hashing algorithms and is widely used. The idea of the algorithm is to receive a piece of plaintext, and then convert it into a paragraph (usually smaller) ciphertext in an irreversible way, or simply to take a string of input codes (called Pre-mapping or information) and convert them to shorter lengths, A fixed number of bits of output sequence is the process of h
(); returnhex.encodehexstring (s); }SHASecure Hash algorithm is primarily intended for digital Signature algorithm DSA, which is defined in the digital Signature standard DSS. For messages that are less than 2^64 bits in length, SHA1 produces a 160-bit message digest. The algorithm has been developed and improved by cryptographic experts for many years and is widely used. The idea of the algorithm is to receive a piece of plaintext, and then convert it into a paragraph (usually smaller) ciphert
In a. NET application, MD5CryptoServiceProvider is instantiated, causing this implementation to be not a part of the Windows Platform FIPS validated cryptogr Aphic algorithms exception. That means md5cryptoserviceprovider. This cryptographic implementation class is not part of the cryptographic algorithm that is validated by the Federal Information Processing standard under the Windows platform.This problem was not encountered on most machines and was
Example 1: Adding modules dynamically for installed NginxTo install the rtmp vector module, for example:1) Download the third-party module to[[email protected] nginx-1.8.1]# git clone https://github.com/arut/nginx-rtmp-module.git2) View the modules installed at Nginx compilation installation[Email protected] nginx-1.8.1]# Nginx-vnginx version:nginx/1.8.1built by gcc 4.4.7 20120313 (Red Hat 4.4.7-18) (gcc) BU Ilt with OpenSSL 1.0.1e-fips each Feb 2013T
Use SSH to determine if the port is in a Linux environmentIn the Windows/linux environment, you can use Telnet to determine the port status, but sometimes there is no telnet in the Linux environment, so you can use SSH to determine the port status.First, SSH use method:Command: SSH-V-p port [email protected]Description:-v debug mode, which will enter log information-P Port numberSecond, install the httpd on the Server01First install the httpd under the Linux system and start port 80.Yum Install
OpenSSL Service: Open source implementation of SSL, official site www.openssl.orgCompositionLibcrypto: Universal Encryption LibraryImplementation Library of Libssl:tls/sslSession-based TLS/SSL library for identity authentication, data confidentiality, and session integrityOpenSSL: Multi-purpose Command toolYou can implement a private certification authorityOpenSSL Common subcommands:OpenSSLversion: viewing versions of OpenSSL[email protected] named]# OpenSSL versionopenssl 0.9.8e-
System:Centos6.6 Nginx: http://nginx.org/en/download.html Currently the latest version 1.9.4 i download 1.8.0Download module Dependency Nginx needs to rely on the following 3 packages1.gzip module requires zlib library (download: http://www.zlib.net/)2.rewrite module requires pcre library (download: http://www.pcre.org/)3.ssl function requires OpenSSL library (download: http://www.openssl.org/)The dependent package installation order is: OpenSSL, zlib, Pcre, and then install the Nginx packageIf
Recently, more friends feedback using y400/y500, pre-installed Windows 8 system, connect the home router AP, high probability of wireless restricted access to the situation, there is a problem after the need to reconnect WiFi, the lower right corner of the network exclamation point icon. The following figure:
After analysis, the user model configuration of the wireless card is Broadcam 4313. This issue can be resolved by changing the wireless network card properties, the compatibili
The wireless network is a type of network connection that currently uses the most breaking up, and compared to the Win7 64-bit flagship ISO, In the new win8.1 system, there are a lot of users in the use of the time more or less will encounter a variety of problems, the most is WiFi can not connect or frequent drop line, this is really a large extent affect the mood of the Internet. So win8.1 system wireless network old drop line what should do?
1, open the Wireless Network Connection Settings w
Under the WIN8 system, wireless network Limited can not connect to the wireless router signal, always show Wireless limited, connectionless situation, resulting in the inability to properly access the Internet. Small knitting has encountered similar problems before, but through simple settings, but also successfully resolved. After the problem, you need to reconnect WiFi, the network exclamation point icon appears in the lower right corner, as shown below:
Wireless network restricte
with your access SSL exactly match the domain name that was applied when the server servedEmail Address []:[email protected] e-mail address, no input, direct enter SkipPlease enter the following ' extra ' attributesTo is sent with your certificate requestA Challenge Password []: The following information does not have to be entered, enter skip until the command is completedAn optional company name []:The build type is X509 self-signed certificate. The validity period is set 3650 days, which is
Knowledge Point Analysis:
Recently, more friends feedback using y400/y500, pre-installed Windows 8 system, connect the home router AP, high probability of wireless restricted access to the situation, there is a problem after the need to reconnect WiFi, the lower right corner of the network exclamation point icon. The following figure:
After analysis, the user model configuration of the wireless card is Broadcam 4313. This issue can be resolved by changing the wireless network card
key.
Caesar's password is symmetric encryption, and his character offset is the secret key.
Common algorithms for symmetric encryption
AES, DES, 3DES, Tdea, Blowfish, RC2, RC4, RC5, Idea, skipjack and so on.
DES: All known as the data encryption Standard, the encryption standard, is a block algorithm using key cryptography, which was identified by the United States federal government's national standards office as a federal data Processing standard (FIP
("Article1_en.txt");
Encrypted file//int key = 3;
EncryptFile ("Article1.txt", "Article1_en.txt", key);
Read the encrypted file String artile = file2string ("Article1_en.txt");
Decrypt (generates multiple alternative files) decryptcaesarcode (artile, "article1_de.txt");
public static void Printcharcount (string path) throws ioexception{string data = file2string (path);
List
Symmetric encryption
Introduced
Both encryption and decryption use the same secret key, a cr
.
2. Use SSH to judge
SSH is the standard Linux configuration and the most common, can be used to determine the port?
Usage: ssh-v-P Port Username@ip
-V debug Mode (log is printed).
-P Specify port
Username is free to
1 connection does not exist port
[root@localhost ~]# ssh 10.0.250.3-p
ssh:connect to host 10.0.250.3 Port 80:connection refused
[Root@localho St ~]# ssh 10.0.250.3-p 80-v openssh_5.3p1 OpenSSL 1.0.1e-fips Feb
-2013 deb
L MD5 (Message Digest algorithm 5): a one-way hashing algorithm developed by RSA Data security Company.
L SHA (Secure Hash algorithm): A 160-bit value can be generated for any length of data operation;
SHA-1
In 1993, the Safe hashing algorithm (SHA) was presented by the National Institute of Standards and Technology (NIST) and published as a federal Information Processing standard (FIPS PUB 180), and a revised version of
), and reconnect to the wireless network;
(2) If the above scheme (1) is invalid, please continue to find the desktop computer icon right click Management---Device Manager---network adapter inside find their own wireless card right click Properties---Power management---Remove the "allow the computer to turn off this setting to save power" tick;
(3) If the above scheme (1) (2) is invalid, please click here to enter Lenovo official website, enter the notebook host number,
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.