The latest LinuxKernel3.0 kernel test version rc5 has been released today. The official Ubuntu kernel website only has rc4 for the oneiric kernel. The method for directly downloading source code on the internet is too troublesome and causes the entire system to crash. Therefore, we recommend that you download the debian package kernel of LinuxKernel3.0rc4 on the ubuntu official website. The new Linux kernel supports Intel, Alpha, PPC
The latest Linux
The SSL Algorithm Library contains three types of algorithms:
Symmetric encryption algorithms: Des, AES, and RC4;
Asymmetric encryption algorithms-RSA and DH;
Information Digest algorithm (one-way hash algorithm)-MD5 and Sha; in SSH, RSA is used to encrypt the Key Exchange Process of SSH V1; and DH is used to encrypt the Key Exchange Process of SSH v2, the DH algorithm is used to obtain the session key, and the DES algorithm is used to encrypt the SSH
Centos shadowsocks installation tutorial, centosshadowsocks
1. Run
Yum install python-setuptools easy_install pip
Pip install shadowsocks
Ii. simple configuration
(1) Run vim/etc/shadowsocks. json
Copy the following parameters to the vim Editor:
{
"Server": "my_server_ip ",
"Port_password ":{
"8381": "atgeretg1 ",
"8382": "atgeretg2"
},
"Local_address": "127.0.0.1 ",
"Local_port": 1080,
"Timeout": 300,
"Method": "aes-256-cfb"
}
The configuration is very simple. Remember to manually modify it. C
generate the key stream, and the user simply remembers how to start the generator.One problem with designing LFSR for generating random bits is that for a given LFSR, you can generate the longest number of non-repeating sequence bits.RC4:The size of the RC4 varies according to the value of the parameter n . RC4 can implement a "secret internal state", for n digits, there are n=2^n kinds of possible, usuall
/rcX. d/SYYapache2 or by using update-rc.d. the advantage of using update-rc.d is that it will take care of removing/adding any required links to/etc/init. d automatically. taking apache2 as an example, let's examine how/etc/rcX. d is looking like:
# Ls-l/etc/rc ?. D/* apache2Lrwxrwxrwx 1 root 17/etc/rc0.d/K91apache2-> ../init. d/apache2Lrwxrwxrwx 1 root 17/etc/rc1.d/K91apache2-> ../init. d/apache2Lrwxrwxrwx 1 root 17/etc/rc2.d/S91apache2-> ../init. d/apache2Lrwxrwxrwx 1 root 17/etc/rc3.d/S91apa
disable both of them to effectively prevent the impact of the poodle vulnerability on you.
Disable SSLv3 support:
Nginx:
Ssl_protocols tlsv1 tlsv1.1 tlsv1.2;
Ssl_prefer_server_ciphers on;
Ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256
Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE
RSA-AES128-SHA: RC4-SHA :! Anull :
BackgroundUnder the development of Ubuntu, virtual machines often open and close, important processes need to be random, non-important can be manually started. For example, Nginx needs to be self-starting, confluence is not so important.In order to control which programs to self-start, which programs do not self-start, Ubunt provides a set of API,UPDATE-RC.D. The following are examples of operations and simple instructions for the API.UPDATE-RC.D--help can see more usage.========================
WEP encryption
To achieve wireless network security light access control certainly not, data encryption is also essential, data encryption can guarantee that the launch of the data can only be expected to receive and understand the user, the current common methods of data encryption have WEP and so on.
WEP (wiredequivalentprivacy) encryption technology is derived from the RSA data encryption technology named RC4, which can meet the higher level of
operation of the system. For example, a Trojan horse may provide a backdoor in the system, allowing hackers to steal data or change configuration settings.
When talking about Trojan horse or Trojan activity, there are two frequently used terms. The identification methods and explanations are as follows:
#8226; remote access to Trojan. Some Trojans allow hackers or data collectors to remotely control the system. Such programs are called "remote access to Trojan" (
goroutine, the random number generator, and so on.
P Full name is processor, the processor, its main purpose is to perform goroutine, so it also maintains a goroutine queue, which stores all the goroutine that need it to execute, the role of P can be a bit confusing, At first it was easy to clash with M, and the following was the key to talking about their relationship.
G is the goroutine implementation of the core structure, g maintenance of the goroutine required stack, program counte
Today, one of my own machine suddenly send a large number of packets to the outside, can be more than 1G per second, although I use the strategy to prohibit the UDP packet is not sent out but the cup, so think of the end still find a way to solve.
First look at the source
The code is as follows
Copy Code
Set_time_limit (999999);$host = $_get[' host '];$port = $_get[' Port '];$exec _time = $_get[' time ');$Sendlen = 65535;$packets = 0;Ignore_user_abort (True);if
We have many bottles of colorless liquid, one of which is poison and the others are distilled water. After the experiment, the mouse will die five minutes later, the mice that drink distilled water are all normal. There are five mice now. How many bottles of liquid can we use these five mice for detection in five minutes?
Analysis: For convenience of analysis, we take three mice as an example to export the general formula.
First, we give each bottle from 1 ~ N number, from 0 ~ K is numbered (He
When it comes to the access control character protected, even beginners will feel confident that they have no problem understanding in this regard. Well, let's take a look at the question .....
See the code at both ends below. Both cats and rats in Package B inherit the animal class.Copy codeThe Code is as follows:// Code 1: There is an animal in PackagePackage testa;Public class Animal {Protected void crowl (String c ){System. out. println (c );}}// Code 2: There are two classes in Package B:
CREATE TABLE User (UserID STRING,Sex STRING,Age INT,Career INT,Code STRING)ROW FORMAT DelimitedFields TERMINATED by ': ';LOAD DATA LOCAL inpath '/home/hadoop03/rating/users.dat ' overwrite into table user;CREATE TABLE Rating (UserID STRING,MovieID STRING,Rate INT,Tmpe TIMESTAMP)ROW FORMAT DelimitedFields TERMINATED by ': ';LOAD DATA LOCAL inpath '/home/hadoop03/rating/ratings.dat ' overwrite into table rating;CREATE TABLE Movie (MovieID STRING,Moviename STRING,Movietype array)ROW FORMAT Delimite
such as the small Object memory cache (Mcache), the currently executing goroutine, the random number generator, and so on.
P Full name is processor, the processor, its main purpose is to perform goroutine, so it also maintains a goroutine queue, which stores all the goroutine that need it to execute, the role of P can be a bit confusing, At first it was easy to clash with M, and the following was the key to talking about their relationship.
G is the goroutine implementation of the core st
such as the small Object memory cache (Mcache), the currently executing goroutine, the random number generator, and so on.
P Full name is processor, the processor, its main purpose is to perform goroutine, so it also maintains a goroutine queue, which stores all the goroutine that need it to execute, the role of P can be a bit confusing, At first it was easy to clash with M, and the following was the key to talking about their relationship.
G is the goroutine implementation of the core st
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.