hostname:port)ssl options: --ssl connect to a mongod or mongos that has ssl enabled --sslCAFile= the .pem file containing the root certificate chain from the certificate authority --sslPEMKeyFile= the .pem file containing the certificate and key --sslPEMKeyPassword= the password to decrypt the sslPEMKeyFile, if necessary --sslCRLFile=
Yesterday accidentally deleted the Xamarin development environment of virtual device network equipment. The name is: vEthernet (internal Ethernet Port Windows Phone Emulator). The code that causes the original to run correctly cannot be edited, prompting for 12 errors, and it is not possible to navigate to a specific error. The relevant method cannot be found in the data. Later, when looking at the error, there was a cryptographic algorithm called FIPS
support for this SSL/TLS protocol from the current tomcat channel:In addition to the above 1, 22 points, for FIPS 140-2,Chinese Name: U.S. Federal Information processing standards. Foreign name: Federal Information Processing Standard. according to FIPS 140-2, the cryptographic module is a collection of "hardware (Hardware), software (software), and/or firmware (Firmware) that implements approved security
.
Functionality descriptionSecurity descriptive Security Options user interface the security options control panel in Windows XP SP3 now has more descriptive text to explain settings and prevent incorrect settings configuration. Figure 1 shows an example of this new functionality.Figure 1. Security Options explanatory textEnhanced security for administrator and service policy entries in system center essenessenfor Windows XP SP3, administrator and service entries will be present by default on a
Some students in the use of WINDOWS8 or Windows8.1 system when the connection is limited or unable to connect to the wireless network problem, small series for you to provide the following method to try, it is possible to solve the problem can not be networked.
In the first step, in the Wireless Network Connection Settings window, locate the currently connected wireless network WLAN status, and right-click to view status.
In the second step, locate wireless properties in the WLAN status
Operating system is Windows 10, after a system upgrade, found that local debugging can not connect to the database server, while the other network is normal, including the plsql can connect, but the program is always not connected, always reported ORA-01017 user password is incorrect, After repeated troubleshooting has not been resolved, a chance, I was on the computer remote an XP computer, found that there is a hint of FIPS security level is too hig
Algorithm
How to implement theData encryption Standard (DES)
A Step by Step tutorialVersion 1.2
The Data encryption Standard (DES) algorithm, adopted by the U.S.Government in 1977, are a block cipher that transforms 64-bit data blocksUnder a 56-bit secret key, by means of permutation and substitution. Itis officially described in FIPS PUB 46. The DES algorithm is used forMany applications within the Government and in the private sector.
This is a t
1. Download Nginx, link address: http://nginx.org/download/ nginx-1.12.2.tar.gz, select the Linux version (. tar.gz) (Nginx version is 1.12.2) 2. Download Nginx Dependency Package: 1.gzip module requires zlib library (http://zlib.net) (zlib-1.2.11.tar.gz) 2.rewrite module requires the Pcre Library (https://ftp.pcre.org/pub/pcre/pcre-8.41.tar.gz) 3.ssl function requires the OpenSSL library (https ://www.openssl.org/source/openssl-fips-2.0.16.tar.gz)Do
--sslcrlfile= the. Pem file containing the Certificate Rev Ocation List--sslallowinvalidcertificates bypass the validation for server certificates--sslallowinvalid Hostnames bypass the validation for server name--sslfipsmode use FIPS mode of the INS talled OpenSSL libraryauthentication options:-U,--username= username for authentication-p,-- password= Password for authentication--authenticationdatabase= database that holds The user ' s credentials--au
Transferred from: http://blog.sina.com.cn/s/blog_78e3ae430100pxba.htmlAndroid offers a new type: Parcel. This class is used as a container for encapsulating data, and the encapsulated data can be passed through intent or IPC. Except for the base type, only classes that implement the Parcelable interface can be placed in parcel. parcelable implementation essentials: Need to implement three things 1) Writetop
formatCapitalizefirstletter (String str) Capitalize first letterSource visible Stringutils.java, more methods and more detailed parameters of the StringUtils Api Guide can be seen.10, ParcelutilsThe Android Parcel tool class, which can be used to read or write special types of data from parcel such as:Readboolean (Parcel in) Read Boolean type data from PacelRead
IPC transmits complex objects through aidl
1. Define data transmission objects
Person. aidl file:
In the person. Java file:
(1) Implement the parcelable Interface
(2) provide a static final attribute named creator
Package com. liujun. aidl;
Import Android. OS. parcel;
Import Android. OS. parcelable;
Public class person implements parcelable {
Private string name;
Private int sex;
Public Person (){
}
Public Person (
in two ways: Serializable interface or Parcelable interface.
The implementation of the Serializable interface is supported by JavaSE, and Parcelable is a feature specific to Android, which is more efficient than the implementation of the Serializable interface,
It can also be used in inter-process communication (IPC. The implementation of the Serializable interface is very simple. Just declare it.
The implementation of the Parcelable interface is a little more complex, but more efficient. We re
ServiceConnection object. OnServiceConnected and onServiceDisconnected
Binding Activity to service is mainly completed through the Binder object. Serivic creates a Binder and obtains the binder method in the Activity.
Parcel object
Serialization:Convert the object into binary data and save it.
Transact and onTransact
To call onTransact (int code, Parcel data, Parcel
excess part is the profit ." He explained that when parcels reach a certain number, a break-even point will be formed. After the number of parcels increases, the more profitable the company will be. Just like "The efficiency gap between 10 thousand and 100,000 pieces of a car is obvious ".
Chen Wei revealed that the current average net profit of express delivery companies is about 20%, and the profit of kangaroo mail per order is less than 10%, which is a meager profit. This is to "give the ben
Three cluster nodes
192.168.1.170 CDH-Master
Cdh-slave-1 192.168.1.171
Cdh-slave-2 192.168.1.171
1. Install centos6.5 (64-bit) and set up the basic environment, including:
(1) Add sudo Permissions
(2) modify the host name, gateway, static IP address, and DNS
(3) Disable SELinux and Firewall
Refer to the article
(4) modify the system time zone and configure the NTP service (select the host machine to configure the NTP server, refer to the article)
2. Clone the three hosts and modify static IP add
execution of this sentence is deleted firstMysql>flush privileges; Refresh PermissionsQuit MySQL and execute the following commandCd/opt/cloudera-manager/cm-5.4.3/share/cmf/schema./scm_prepare_database.sh mysql-h myhost1.sf.cloudera.com-utemp-ptemp--scm-host myhost2.sf.cloudera.com SCM SCM SCMFor example:./scm_prepare_database.sh mysql-h node1-utemp-ptemp--scm-host node1 SCM SCM SCM(Corresponds to: Database type, database server, user name, password, cmserver node ...)mysql> drop user ' temp '
installation package1)wget http://archive.cloudera.com/cm5/installer/latest/cloudera-manager-installer.bin2)chmod u+x cloudera-manager-installer.bin3)./cloudera-manager-installer.bin4)根据安装向导一路next。注意,如果之前master上没有手动安装rpm包此时就会联网下载,下载速度一般都较慢,太费时间。5)安装结束以后会提示登录7180端口。V. CDH Service installation 1. Making a local parcel1)下载CDH软件包,:http://archive.cloudera.com/cdh5/parcels/5.6/下载对应版本的CDH:下载图中标红的三个资源(el6代表centos6)之前完成CM安装之后master节点会在/opt目录下生成cloudera文件夹,将刚才下载的三个文件移动到
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.