connecting clients
Authenticate using a username andPassword. By default, passwords for both protocols are passed over
Network unencrypted.To configure SSL on Dovecot:? Edit the Dovecot configuration file/etc/pki/Dovecot-
OpenSSL. conf as you prefer.However in a typical installation, this file does not require
Modification.
Rename, move or delete the files/etc/pki/Dovecot/certs/Dovecot. pem
And/etc/
, ' tree 1-1-1-1 ');
--------------------------------------------------------------------------------
Field description
ID, ID number of the record
ParentID, the record's parent record ID (0 is the root record)
Topic, the display title of the record
Show programs
Sequential tree:
PHP Code:--------------------------------------------------------------------------------
/* Database connection */
Mysql_connect ();
mysql_select_db (' tree ');
/* Recursive function for tree display */
functio
Less than 200 rows are used in this forum
Code And the execution speed is quite fast. Run the example in: http://www.hnpts.ha.cn/forum
MySQL database: yxforum
+ ------- + -------------- + ------ + ----- + --------- + ---------------- +
| FIELD | type | null | key | default | extra |
+ ------- + -------------- + ------ + ----- + --------- + ---------------- +
| ID | int (11) | pri | 0 | auto_increment |
| DT | datetime | Yes | null |
| TP | varchar (255) | Yes | null |
| CT | text | Yes | null |
$ \ Bex F (\ sigma) U (\ sigma) P (\ sigma) \ alpha = U (\ sigma) m (\ sigma) \ alpha = 0 \ rA U (\ sigma) P (\ sigma) \ Alpha \ In \ Ker F (\ sigma), \ EEx $ \ Bex g (\ sigma) V (\ sigma) q (\ sigma) \ alpha = V (\ sigma) m (\ sigma) \ alpha = 0 \ rA V (\ sigma) q (\ sigma) \ Alpha \ In \ Ker g (\ sigma ). \ EEx $
2. set $ A $ to an integer $ N $ level square matrix. proof: If the integer $ K $ is a feat
Certificate. on the screen, you will be prompted to enter the required personal information (such as Country, province, city, company, etc.) according to the prompts ).
Ii. Client
1. Generate the client private key (key file );
Openssl genrsa-des3-out client. key 1024 2. Generate the client certificate signature request file (csr file );
Openssl req-new-key client. key-out client. csr
Cd/tmp/create_key/ca
3. Generate the CA certificate file
# The server. csr and client. csr files must have a
How to configure a secure http service to make the service more secure. You can also learn how ca works. 650) this. width = 650; "src =" http://www.bkjia.com/uploads/allimg/131228/055P4N91-0.gif "alt =" j_0003.gif "/>
HTTP + SSL = HTTPS
Configure the CA Server
========================================================== ======================
1. Configure CA 172.16.1.2 to generate the CA's own public key and private key CA to self-sign the certificate (generated by script)
CA Server Configura
Add fedora yum source in China ~ All ~ Accelerate your download speed-general Linux technology-Linux technology and application information. For more information, see the following. Foreign yum sources are very slow, and there are good sources in China, so it is best to set up the source in China, the best in China are beiyou, Tsinghua, and Shanghai Jiaotong University.
The procedure is as follows:
First, install the yum-fastestmirror plug-in and select the fastest source automatically.
# Yum in
Experimental environment:
Virtual machine: Vmware®workstation ProHost A:ip to 10.1.255.55/16, create CA and provide CA service to other hostsHost B: For httpd server, IP for 10.1.249.115/161, view the OpenSSL profile/etc/pki/tls/openssl.cnf
[Root@localhost ~]# cat/etc/pki/tls/openssl.cnf (View the contents of the CA portion of the configuration file)
......
[CA]Default_ca = ca_default # The default CA s
/secret-t 127.0.0.1:6082 # Login Admin command lineVcl.list # List all the configurationsVcl.load TEST1/ETC/VARNISH/DEFAULT.VCL # Load compiled new configuration, test1 is the configuration name, TEST.VCL is the configuration fileVcl.use Test1 # Use configuration, specify the configuration name, the current configuration to use the last vcl.use to prevailVcl.show test1 # Show configuration content, specify configuration name##############################4. Configure Nginx SSL AccessConfiguring C
will prompt you to enter the required personal information in step-by-steps (for example: country,province , City,company, etc.).Two. Client1. Generate The client private key (key file); OpenSSL genrsa-des3-out client.key 1024x7682. Generate Client certificate signing request file (CSR file);OpenSSL req-new-key client.key-out CLIENT.CSR CD /tmp/create_key/ca three. Generate the CA certificate file#server. CSR and CLIENT.CSR files must be signed by a CA to form a certificate.1. First generate th
copy of the past on the line)
The following steps do not have to
The code is as follows
Copy Code
[Root@station23 ca]# mkdir./newcerts[Root@station23 ca]# touch./{serial,index.txt}[Root@station23 ca]# echo "> serial
If you forget the above operation, the CA will have the following error on the visa, as follows:
The code is as follows
Copy Code
[root@station23 test]# OpenSSL ca-in my.csr-out ldap.crtUsing Configuration From/etc
1. Fedora 14 Yum source Shanghai Jiaotong University
First, enter the terminal to open and enter the Su, password, and administrator permission;
Input VI/etc/yum. Repos. d/fedora-sjtu.repo, press ENTER
Copy the following content to the opened fedora-sjtu.repo again:
Fedora-ftp.sjtu.edu.cnName = fedora 14-i386Base url = http://ftp.sjtu.edu.cn/fedora/linux/releases/14/Fedora/i386/ OS/Enabled = 1Gpgcheck = 0Gpgkey = file: // etc/pki/rpm-GPG-key-FedoraEve
1. Issuance of documents
1) The user enters the information for registration (or the user is registered by the business operator of RA ).
2) User Information is transmitted to Ra.
3) approved by RA
4) The user requests to issue a certificate
5) approved by RA
6) The user issues a certificate request.
7)
equivalent to one-1, and two-1 is equivalent to one. (You can just draw a picture to understand this)
Three values 1 or-1 can be equivalent to 0 (self-drawing verification)
1 and-1 can be equivalent to 0 (self-drawing verification)
Therefore, M % 3 can represent the relationship between the node and the root node. M % 3 = 0 is equivalent to 0, M % 3 = 2 is equivalent to-1, M % 3 = 1 is equivalent to 1
In the merge operation of the query set, we need to merge a and B. Assume that
why password of any type should not be used on Windows networks) )).
Is PKI used?
One of the most common misunderstandings about EFS is that EFS uses a public key infrastructure (PKI. Although EFS can be easily integrated and used with PKI (your company should already have PKI), this is absolutely not necessary. That
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.