Web page Scale-free
The IE browser kernel supports the display of 5 text sizes, but it does not take effect on CSS-style page text, and it only changes the text size, the Web page does not scale proportionally, and the 360 security browsers support the scale of the Web page without scaling.
While browsing the page, press CTRL and then scroll the mouse wheel to zoom the Web page, or you can select a specific zoom percentage in the Tools menu.
On the status bar at the bo
Use SRP to create secure LinuxFTP server-Linux Enterprise Application-Linux server application information. The following is a detailed description. In small and medium-sized heterogeneous networks, many users choose Linux as the network operating system and use its simple configuration and user-familiar graphical interfaces to provide Internet services. FTP is one of the services it provides. FTP (file transfer protocol) plays an important role in ma
Article Title: Build a secure Web server under FreeBSD. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Preface
When we run Web servers, everyone may agree that using Linux + Mysql + Apache + PHP as the entire open-source system is a good choice, but I personally think this is unreasonable, first, you must consid
Article Title: Use SRP to establish a secure LinuxFTP server (figure ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In small and medium-sized heterogeneous networks, many users choose Linux as the network operating system and use its simple configuration and user-familiar graphical interfaces to provide Interne
Article Title: Twelve rules for Building a Secure Linux system. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The core of a computer system is an operating system. Therefore, the security of an operating system directly determines whether information is secure. Is it a
I. Introduction to Secure Socket Layer SSL
The Secure Sockets Layer Protocol is an encryption system used on the server to ensure that the data transmitted between the client and the server is secure and encrypted. If the server and client use SSL for secure communication, the server must have:
1. The Key pair contains
Establish one-way Https verification for Tomcat, and implement secure communication with mainstream browsers and Android/iOS clients.
As we all know, iOS9 has begun to force the use of Https to replace the original Http request in terms of networking. Although Http and Https have their own advantages, in general, it is now in this secure information age, developers can no longer leave Https.
There are a lot
Article Title: Linux: Use vsftpd to build a secure FTP service (figure ). Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
The security risks of the FTP protocol cannot be the reason for the rejection of FTP. This article introduces a method to build a secure FTP service.
No vro is absolutely secure
Recently, we have noticed that the intelligent routing market is becoming increasingly popular, but the public still has some concerns about intelligent routing and is very insecure about its security. In addition, CCTV has revealed that there are backdoors for Cisco, network, youxun, and tengda routes. This increases users' concerns about smart routing security.
No vro is absolutely s
SSL introduction SSL or Secure Socket Layer is a technology that allows web browsers and web servers to communicate through a secure connection. This means that the sent data is translated into a password at one end, sent out, unlocked at the other end, and then processed. This is a two-way process, that is, both the browser and the server need to encrypt the data before sending it. Another important aspect
HTTPS provides secure web traffic1. Principle part:1) Understand the encryption algorithm:Classification of cryptographic algorithms: symmetric and Asymmetric encryptionA. Symmetric encryption: Encryption and decryption using the same key, the advantage is fast, the disadvantage is that the key sharing difficulties. The typical symmetric encryption algorithm hasDes/aes/rc5/3des and so on.B. Asymmetric encryption: Generate a secret pair (public and pri
What does it mean to generate secure random data? Why generate secure random data? In some previous literature this was not a good indication of how to generate "safe" random numbers. So, here's how to safely generate random numbers in the programming language below. C + + Java . NET node. js PHP Python RubyGeneral conditions that need to be includedAll scenarios for this article must b
Tags: vsftpd + SSL
Vsftpd + SSL/TLS for secure communication
As mentioned in previous articles, FTP is transmitted in plain text, so it is easy for people to get their accounts and passwords. To implement secure FTP transmission, we need to use SSL/TLS to implement secure communication. Of course, there are two secure
Enable HTTPS secure access to prepare raw materials within a LAN
Server resin (can be tomcat, of course, resin for example)
Installing the JDK
Domain name (just write a line, because it is intranet use, will not be verified)
Generate certificate
First step: Generate a certificate for the server
keytool -genkey -alias resin -keypass 123456 -keyalg RSA -keysize 1024 -validity 365 -keystore D:/keys
Many users in the installation of win8.1 system, the default selection of the UEFI boot mode, after the system installation is completed, into the system desktop will appear in the lower right corner of a secure boot incorrectly configured watermark, for this problem is due to the user opened the UEFI mode, and did not open secure Boot settings caused by the following small series for you to provide a detai
web|xml| Security
First of all introduce SSL, the English full name of SSL is "secure Sockets Layer", the Chinese name is "Secure Sockets Layer protocol layer", it is Netscape (Netscape) the security protocol based on WEB application. The SSL protocol can be divided into two tiers: the SSL record Protocol (SSL records PROTOCOL): It is built on a reliable transport protocol (such as TCP), providing support f
Web|web Service |web Server | security
Update! A system that is not updated with the latest security patches will soon be called the attacker's target.
After you have completed all the work required to configure your security system, remember that CGI scripts will be the biggest security risk. Most successful attacks are implemented through these scripts. The simple advice is to use CGI scripts that are publicly available and have been used by different websites for a while, and if administrato
The SSL (Security Socket Layer) protocol, designed and developed by Netscape, is used primarily to provide authentication to users and servers, to encrypt and hide transmitted data, to ensure that data is not altered in transit (i.e., data integrity) and is now a global standard in this field.
Stunnel is a network data can encrypt the TCP connection tool, can work on UNIX, Linux and Windows platform, using Client/server mode, the ciient end of the network data using SSL encryption,
Last time we talked about the principles of HTTP data transmission. To improve the security of HTTP data transmission, Netscape developed the SSL protocol to ensure secure data transmission over the network. In addition, we have explained how to use the SSL protocol to implement the encrypted HTTP protocol transmission protocol-HTTPS, so that we can continue to complete the subsequent work.
Access the Web Server1. Install (import) certificates for We
Secure Shell protocol (SSH) is a protocol that provides secure remote logon and other security network services on insecure networks. Secure Shell can be recorded as s h. It was originally a program on the u n I X system and then quickly expanded to other operating platforms. S h is a good application. When used correctly, it can make up for vulnerabilities in th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.