.
The zone "0.16.172.in-addr. arpa" section in the file directs to the file mapped to the IP address 172.16.0. * to the host name. It is used to load data in the domain from the/var/named/named.172.16.0 file.
Create or modify/var/named. local
@ In soa ns.test.com. root.ns.test.com .(
2000051500; Serial
28800; Refresh
14400; Retry
3600000; Expire
86400); Minimum
In ns ns.test.com.
1 in ptr localhost.
Note: When modifying the named. * file, you must add the Serial
support of the NSA, in 1981 as an ANSI standard release. For years, Des has been considered safe enough, but since the small key is only 56 bits, it has become less secure since the 90 's. By the year 1998, Electronic Frontier Foundation will only take about 23 hours to decode DES. As a result, DES began to become insecure and gradually replaced by triple DES (Triple-des) and AES. In short, these are all other encryption standards, but due to the pow
mandatory access control on it, typical of which include SElinux, RSBAC, MAC, etc, the policies used are also different.
The SELinux security architecture launched by NSA is called Flask. In this structure, the logic of security policies and general interfaces are encapsulated in components independent of the operating system, this independent component is called a security server. SELinux's security server defines a hybrid security policy consisting
企业内部员工之间的**文件共享**,是企业内部文件交换的重要手段。传统的文件共享是通过Windows的目录共享来实现的,而**目录共享**功能因其可能存在安全隐患使得很多企业分发放弃了这个文件共享模式。 如去年勒索病毒“永恒之蓝”席卷全球,让大伙感受到了黑客的破坏力。病毒利用被盗的美国国家安全局(NSA)自主设计的Windows系统黑客工具“永恒之蓝”,稍加修改后让它开始在全球蔓延肆意勒索。该病毒利用Windows的445端口传播,该端口在Windows主要是提供局域网中文件或打印机共享服务。也就是说445端口关闭掉,XP、Win10文件共享是不能再进行了Safe and efficient file sharing methods:1) We need to build our own set of file servers, bypassing the Win10 file sharing function2) The new file sharing process should be co
, so that you can install them in time once there are useful updates and releases. Do not suspend Security Updates. There must be a reason for its release.
6. Installing the virus protection software is very useful.
Believe it or not, virus protection plays a very important role in Linux. Of course, the possibility of damage caused by viruses to your Linux system is very small, but the emails you forward may cause damage to other windows users. There is a good virus protection tool, such as Clam
To crack the passwords of terrorist organizations and defeat their conspiracy, the National Security Agency (NSA) has invested heavily in building a machine capable of cracking all passwords: a universal decryption machine. This is a fictional plot of Dan Brown in his book digital Castle. Building such an indestructible "artifact" with the power of today's science and technology is just a distant dream, but how to protect your personal privacy in the
How to get Meterpreter bounce by attacking Eternalblue on windows2016: by backlion0x00 PrefaceWhen Microsoft released the patch for the ms17-010 vulnerability, the vulnerability was affected from Windows 7 to the Windows Server 2016 system version. However, the shadowbrokers released by the eternal Blue attack is very unstable and may affect Windows Server 2012 and later operating system versions, causing 99% of the machines to be attacked by Eternal blue. To understand and be better used, the
not long-term reliable, and once they feel no business interest, they can shut down any application or any product on the shelf at any time. In addition, the "Prism Door" event is also a big driver of the Cook's Arkos project, if the NSA can arbitrarily crawl data from Google, Microsoft, Facebook, AOL (US online), Twitter, users are tantamount to "naked" online, and who can believe. Apparently, Cook chose to believe in himself.However, Arkos has pote
interval [2,42], and if it is prime, its corresponding sa[j]=1 /** * The definition of the found function, according to the author is the whole arrangement of the adaptation of * **/ voidFoundintNintCurintA[],intFlag[]) {//incoming n is an element in an array of in[], that is, an input value, a cur initial value of 1 is the subscript used to control a[], a[] is a a[0]=1 for storing the array that satisfies the number; //flag[] is an array of initial values that are all set to 0, which is used t
plist file, or the protocol header may have been incorrectly written! "); }else { if ([Viewcontroller iskindofclass:[ Uinavigationcontroller class]) { [dcurlnavgation Setrootvie Wcontroller:viewcontroller]; }//If the navigation controller is set directly to the root controller els e { uinavigationcontroller *navigationcontroll ER = [dcurlnavgation shareddcurlnavgation].currentnavigationviewcontroller; if (Navigationcontroller) {//Navigation controller pre
functional improvements, but also completely abandoned the old version, complete the history of the most stable Tor network version of the perfect blueprint.top-notch HTML5 supportAs a browser based on the Firefox 45-ESR version, the Tor6.0 version comes with top-of-the-HTML5 support, which makes it easier to turn off flash plugins for users in most users ' websites.Users who want to borrow Tor for anonymous searches, rather than converting IP addresses, must be away from the Flash plugin becau
recently contacted with Nmap. Discovering Namp is a powerful tool. It is said that the NSA is using this tool to imagine how powerful his function is. If you see the movie "The Matrix" you will also find Nmap figure, the following stills:On the left, the computer screen shows Nmap's computer operating interface.=============================================================================================================== ==============================
implements a common subset of standard C libraries, including functions for string and memory manipulation (strlen, mmcpy, and other similar functions), as well as series functions for sprintf and atoi. Unlike the code under Arch/lib, the library code is written in C and can be used directly in the new ported version of the kernel.(ten) mm.Contains the memory management code for the architecture-independent section, which is located in the arch/*/mm directory.(one) net.Network-related code, the
last century 70 kurt Friedrich G?del 1906-1978 ) once said: " there is good reasons to believe this nonstandard analysis, in some version or others,will be the anal Ysis of the Future " You know, non-standard analysis ( nsa ) introduced the Super real number system (hyoerreals) The American Curiosity Survey shows that in ancient times, Mars ( mars ) surface has the basic conditions of life existence. The Martian
the boss, in addition to mobile operating system Android is open source, and in the past six months open source security tools Santa, firing Range and Nogotofail.At the same time, Microsoft announced the full open source of the. NET server stack, and in October last year, Facebook released osquery--allowing managers to use SQL to query computer status and operating system features. In 2013, Facebook also released an open-source PHP virtual machine called HipHop Vsan. Not only are commercial com
change the operating mode at any time to enhance the system functions.
Why SELinux? The best reason for using SELinux is that it can enhance access control to limit the minimum access permissions of user programs.
Other good improvements are:
Access control over kernel objects and Services Access Control over process initialization, inheritance, and program execution access control over ports, information, and network interfaces for file systems, directories, files, and open file de
a very powerful DNS server with the DNS Cache function, djbdns is safer and better performing than the bind dns server. It can be obtained directly by downloading http://cr.yp.to/or using the software package provided by red Hat.
7. Use AES256 to enhance the security of gpg file encryption
To improve the security of backup files or sensitive information, many Linux system administrators use gpg for encryption. When using gpg, it is best to specify the gpg to use the AES256 encryption algorithm
is more complex than md4, and the speed is a little slower, but it is safer and better in terms of anti-analysis and anti-difference performance.
(3) SHA-1 and others
Sha1 is designed to be used together with DSA by nist nsa. It generates a hash value with a length of less than 264 for an input with a length of bits. Therefore, sha1 is resistant to brute force attacks) better performance. SHA-1 is designed based on the same principle as md4 and im
This article is all copied from the Internet.
1. SHA-1 and MD5Md4 (rfc1320) is the ronaldl of MIT. designed in 1990 by Rivest, MD is the abbreviation of messagedigest; MD5 (rfc1321) is an improved version of md4 by Rivest in 1991, and hash any long plaintext into a 128-bit hash value.Sha1 is designed to be used together with DSA by nist nsa, and Sha is short for secure hash algorithm. It produces a hash value with a length of less than 2 ^ 64 and a le
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.