I saw a blog post about secure login authentication a few days ago. However, the logon authentication algorithm mentioned in this article is a bit complicated and still has some security defects. I think we can use the HMAC algorithm to perform secure logon authentication for WEB applications.
The so-called security is actually mainly to solve the problem: hiding
HTTPS provides secure web traffic1. Principle part:1) Understand the encryption algorithm:Classification of cryptographic algorithms: symmetric and Asymmetric encryptionA. Symmetric encryption: Encryption and decryption using the same key, the advantage is fast, the disadvantage is that the key sharing difficulties. The typical symmetric encryption algorithm hasDes/aes/rc5/3des and so on.B. Asymmetric encry
When you use HTTPS to access a Web site, ie reminds you that the page must use a more secure Web browser to see that the resource you are accessing uses a 128-bit version of Secure Sockets Layer (SSL) security. To view this resource, you need to use an SSL browser that supports that version. such as: 650) this.width=65
Article Title: authorize a web server to access a secure database. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Allowing Web users to access the database is a very fine-grained t
Article Title: Build a secure Web server under FreeBSD. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Preface
When we run Web servers, everyone may agree that using Linux + Mysq
is the Linux system, accounting for more than 60%, and then came to the Windows system, accounted for more than 30%, and FreeBSD the proportion of the invasion is a few percent.
Any system can be very safe, also can be very insecure, the key is how the administrator to do, the world does not have the safest system, only a more secure system. The following article is
In the FreeBSD platform to build a more secur
Building a secure system is a very huge project. It includes setting network security, operating system security, and applications.
Program Security. This article describes how to build a secure web application system with the application. NET technology.
1. Security-related services
To build a web application s
With the application of WEB service more and more widely, how to ensure the security of access and transmission of services, has gradually aroused the attention of developers and users. Web Service Security can be considered in two ways: Access security and transport security. The former mainly means that only authorized users can access the application, while the latter focuses on how to ensure the privacy
the Linux system, accounting for more than 60%, and then came to the Windows system, accounted for more than 30%, and FreeBSD the proportion of the invasion is a few percent.
Any system can be very safe, also can be very insecure, the key is how the administrator to do, the world does not have the safest system, only a more secure system. The following article isIn the FreeBSD platform to build a more secure
Someone asked a question in the Forum about how to set up a secure web server. Here are some suggestions and suggestions.
The Apache server is there and unix/linux is there, which is enough to show the excellent performance and market share of Apache in the WEB
Security Configuration database, So what is the status of these services that are not listed? Here you can specify their running status, and we recommend that you select the "Do not change the Enable mode for this service" single option. Finally, the "Confirm Service Change" dialog box is finalized, and the Role-based service configuration is completed after the final confirmation of your configuration.
3. Configuring network security
The above completes the role-based service configuration.
login information is stored.
If you implement these authentication schemes with simple settings on the Web server, you do not need to add any code in your Web application.
An attacker's listening problem: If a visitor sends his user name and password in a simple text form, it is easy for an attacker to capture this information. Transfer
User information using
Use SRP to create secure LinuxFTP server-Linux Enterprise Application-Linux server application information. The following is a detailed description. In small and medium-sized heterogeneous networks, many users choose Linux as the network operating system and use its simple configuration and user-familiar graphical interfaces to provide Internet services. FTP is o
:
Authentication mode = "forms"Forms name = "yourauthcookie" loginurl = "login. aspx"Protection = "all" Path = "/"//AuthenticationAuthorizationDeny users = "? "//AuthorizationHowever, this may cause a problem, that is, if some information on my site is accessible to any user at will, such as the site introduction and instructions for use. If the above processing method does not make the user feel very troublesome, haha, not in a hurry, there will naturally be a corresponding solution in ASP. N
web| security to establish a secure connection, a Web browser needs to first request a digital certificate from a Web server, and a digital certificate provides proof of identity. When the browser requests its digital certificate to the
web|xml| Security
Previous article Address: Building Secure XML Web service Series A probe into the use of SOAP headers
To analyze the security of XML Web service, the first problem to solve is that we can understand and clear the format and content of the SOAP message, if we can not get soapmessage, analyze how to bui
writer:bysocket (mud and brick pulp carpenter)
Micro-Blog: Bysocket
Watercress: Bysocket
reprint it anywhere u want. Why to write about Web Security? A java file can hack your server. One JSP can download any file. How does this?1. Write a JSP and upload to the server.2. Use JSP to download any bugs by HttpClient. 3. Open the virus and ge
In order to establish a secure connection, the Web browser needs to first request a digital certificate from the Web server, which provides proof of identity. When the browser requests its digital certificate to the Web server, it
login information is stored.
If you implement these authentication schemes with simple settings on the Web server, you do not need to add any code in your Web application.
An attacker's listening problem: If a visitor sends his user name and password in a simple text form, it is easy for an attacker to capture this information. Transfer
User information using SS
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.