Understand and deploy symmetric encryption
1. Prepare the symmetric encryption software FatCryptoTool and office Password Recovery to crack the office Password.
2. symmetric encryption system:
Dedicated encryption, fast and efficient.
3. Data
Implement encryption protection for office build applications
Word:
A. By default, word uses the rc4 encryption algorithm.
B. Understand the risk of passwords.
1. Set the office password.
2. Crack the office password. Use Accent Office Password
Click to download OpenSSL
window and Linux to distinguish between the
Unzip the file
Double click:
Win32openssl-0_9_8l_95895.exe
After the installation is complete
\openssl\bin\openssl.exe
Enter a command to generate the private key
Genrsa-
Encryption and decryption authentication 1. symmetric encryption single-key encryption: advantages: 1. faster than asymmetric key encryption 2. A large number of digits is hard to crack. Disadvantages: 1. A security mechanism is required to
Understand and deploy symmetric encryption 1. Prepare the symmetric encryption software FatCryptoTool and office Password Recovery to crack the office Password. 2. symmetric encryption system: dedicated encryption, fast and efficient. 3. Data
Phase 1 Using Preshared Keys
IKE's main mode has six packages, and the six packages are divided into three stages:
1: These first two packets define the algorithms and hashes used to secure the IKE communications and are agreed upon in
The online revocation service is a new component introduced in Windows Server 2008. Is the Microsoft deployment of the OCSP protocol. This feature, coupled with the new OCSP answering service, is a big boost compared to CRL based revocation. The
The previous article introduced some basic questions about SSL two-way authentication and used nginx + PHP to build https-based WebService.
The previous method only implemented the mode. Yesterday, my colleagues continued to implement the N: 1 mode. Here I will record it again.
Because the ssl_client_certificate parameter of nginx can only specify one client public key, if a client is added for communication, a server is required.
The N: 1 mode is implemented through the CA cascade certificate m
the previous approach was just to implement the 1:1 pattern, and yesterday colleagues continued to implement the N:1 model, and here I'm going to sort it out. Since Nginx's ssl_client_certificate parameter can only specify a client public key, it is necessary to re-match a server if a client is added to communicate. The N:1 pattern is implemented through the CA's cascading certificate pattern, first generating a set of CA root-level certificates and then generating level two certificates as cl
This paper introduces some basic problems of SSL bidirectional authentication, and uses nginx+php to build HTTPS webservice based on it.The previous approach was just to implement the 1:1 pattern, and yesterday colleagues continued to implement the N:1 model, and here I'm going to sort it out.Since Nginx's ssl_client_certificate parameter can only specify a client public key, it is necessary to re-match a server if a client is added to communicate.The N:1 pattern is implemented through the CA's
"
Set_varEASYRSA_REQ_EMAIL "503579266@qq.com"Set_varEASYRSA_REQ_OU "MyOpenVPN"
4. Create a server certificate and key
(1) initialization
[Root @ vpneasyrsa3] # ls
Easyrsaopenssl-1.0.cnfvarsvars.examplex509-types
[Root @ vpneasyrsa3] #
[Root @ vpneasyrsa3] #./easyrsainit-pki
Note: using Easy-RSAconfiguration from:./vars
Init-pki complete; you may nowcreate a CA or requests.Your newly created
" to "easy-rsa ".
Mv easy-rsa-mater/easy-rsa/
Copy the easy-ras folder to the/etc/openvpn/directory.
Cp-R easy-rsa // etc/openvpn/
Step 2: edit the vars file and configure it according to your environment
A: first go to the/etc/openvpn/easy-rsa/easyrsa3 directory.
Cp/etc/openvpn/easy-rsa/easyrsa3/
B: Copy vars. example to vars.
Cp vars. example vars
C: Modify the following field. Run the command: vi vars, modify it, and finally save the wq.
Set_var EASYRSA_REQ_COUNTRY "CN" // chang
Http://www.h3c.com.cn/Products___Technology/Technology/Security_Encrypt/Other_technology/Representative_ Collocate_enchiridion/201010/697325_30003_0.htmHTTPS Web Configuration ExampleKeywords: HTTPS, SSL, PKI, CA, RASummary: HTTPS is an HTTP protocol that supports SSL. The user can safely log on to the device via the HTTPS protocol and control the device through a Web page. This article describes the configuration process for HTTPS.Abbreviations:
enter the following ' extra ' attributesTo is sent with your certificate requestA Challenge Password []: An optional company name []: #scp/ROOT/WEB.CSR S2:/root---CA Certification Body------> Sign the S1 signature request WEB.CSR issue generation WEB.CRTS2 is not a CA certification authority nowNeed to first deploy S2 as CA certification AuthorityDeploying CA certification bodies is cumbersome,We use the wrong way to build CA certification bodies,and issue a signature request# OpenSSL ca-in web
public key encryption is that a key pair replaces a large number of symmetric keys, thus reducing the workload of key management. Digital Certificates further enhance this advantage, which solves the issue of public key distribution and management. However, digital certificates cannot be managed by themselves. Due to the inherent widespread distribution of digital certificates, the distribution of digital certificates must be taken into account when designing management schemes for these certif
sameCheck the validity period of a certificateCheck if the certificate has been revokedThe PKI consists of the following and parts:CA: Visa authoritiesRA: Registration AuthorityCRL: Certificate revocation ListCertificate Access LibraryCA is the core of PKI, responsible for issuing, certification, management has issued certificates;The current Universal Certificate format standard is zero , which defines th
Intranet SecurityIn the face of threats, firewall, anti-virus software, IPS, and other products are often ineffective. These products have been widely deployed in the enterprise network, but these products are mainly for Internet security protection.CAIt is a third-party trust institution that uses the PKI public key infrastructure technology to provide network identity authentication services, is responsible for issuing and managing digital certifica
when creating a tar file to exclude the specified file or type. Suppose you want to exclude the. html file when you create a compressed tar file.
Copy Code code as follows:
[Root@linuxtechi ~]# tar-zcpvf myarchive.tgz/etc//opt/--exclude=*.html
Example Ten: List the contents of the. tar.gz or. tgz file
Use the-t option to view the contents of the. tar.gz or. tgz file. As follows:
[Root@linuxtechi ~]# TAR-TVF myarchive.tgz | more ... ..... ................. ...... ..
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.