test and remove it as soon as possible.6.3. Delete history filesThe MySQL server has a history file that can help you find the problem when the installation is wrong. A history file contains sensitive information, such as a password, if the information is obtained by an attacker, it will giveYour database poses a huge security risk. After the installation is successful, the history files are no use, so you can use Cat/dev/null >~/.mysql_history instructions to delete the contents of the file.Se
Tags: ror erro man data-copyright strong 1.2 pre starWhen you landed em, you gave me this mistake. Code d ' Erreur:ssl_error_weak_server_cert_key Just need to turn off EM SSL. [Email protected] ~]$ Emctl unsecure dbconsoleOracle Enterprise Manager 11g Database Control Release 11.2.0.1.0Copyright (c) 1996, Oracle Corporation. All rights reserved.Https://ace:1158/em/console/aboutApplicationConfiguring Dbconsole for HTTP ... Done.Dbconsole successfully stopped ... Done.Agent is already stopped .
connect using SSL.
Using non-encrypted access to the database, you first need to set the whitelist as shown in # #, and then use the following code for unsecured connections:
Package Com.azurelabs.china.sqlserver;Import java.sql.*;Import com.microsoft.sqlserver.jdbc. *; Public class connectsql { Public static void main (string[] args) { // TODO auto-generated method stub String connectionString = "jdbc:sqlserver://yourserver. data
belong to MySQL group #Chownmysql:mysql-rf/usr/local/MySQL set the MySQL directory user and user group attribution. # chmod+x-rf/usr/local/MySQL Grant executable permission #CP/USR/LOCAL/MYSQL/SUPPORT-FILES/MY-MEDIUM.CNF/ETC/MY.CNF Copy the default MySQL configuration file to/etc Directory # CD/usr/local/MySQL #/usr/local/mysql/scripts/mysql_install_db--user=MySQL Initialize database #CP/usr/local/mysql/support-files/mysql.server/etc/init.d/MySQL copy mysql service program to system directory #
can only find the first m most eligible nodes in each depth, and M is a fixed number-the width of the cluster.3, Binarysearch--The algorithm that finds a specific value in a linear array, each step removes half of the data that does not meet the requirements.4. Branch definition algorithm (Branch and Bound)--The algorithm for finding a specific optimization solution in a variety of optimization problems, especially for discrete, combinatorial optimization.5. Buchberger algorithm , a mathematica
other sources.The Window.name property can be used to temporarily store data that can be accessed across domains.Cookies use different source definition methods. A page can set a cookie for this domain and any parent domain, as long as the parent domain is not public suffix. Firefox and Chrome Use the public Suffix list to determine whether a domain is a common Suffix. Regardless of which protocol (HTTP/HTTPS) or port number is used, the browser allows the given domain and any of its subdomains
stored in the browser, such as localstorage and IndexedDB, is segmented with the source. Each source has its own separate storage space, and JavaScript scripts in one source cannot read and write to data belonging to other sources.The window.name property can be used to temporarily store data that can be accessed across domains.Cookies use different source definition methods. A page can set a cookie for this domain and any parent domain, as long as the parent domain is not public suffix. Firefo
resources can cause a large number of waiting processes in the system, causing the application to respond slowly.A large increase in the process can result in increased system memory resourcesPhysical memory is exhausted, the system uses virtual memory, and the use of virtual memory causes increased disk IO and increasesThe overhead of the CPU.The process of solving the problem follows:View system system hardware, network devices, operating system configuration, application architecture, and pr
@ComponentScan@EnableAutoConfiguration@EnableEurekaClient@RestControllerpublic class Application { @RequestMapping("/") public String home() { return "Hello world"; } public static void main(String[] args) { new SpringApplicationBuilder(Application.class).web(true).run(args); }}(That is, the fully normal spring boot application). In this example, we explicitly use @enableeurekaclient, but only Eureka is available, and you can use @enablediscoveryclient. Configuration
the IMAP interface.
Deadchat:deadchat is designed to provide a secure, single room group Chat service as well as clients in an unsecured network environment.
Mailpile:mailpile is a mail-based index and search engine.
11. Audio and video
PMS: The poor Spotify, search and collect music streams!
Dejavu: In pondering the Shazam principle? The Python implementation of the audio fingerprint recognition algorithm is here! Shazam: It's a m
SSH General purposeProvide shell to resolve Telnet unsecured transfer1. Modify the default SSH default portVi/etc/ssh/sshd_configRestart after modification>systemctl Restart sshdSSH security and configuration best practices1, configuration root cannot shh login> Vi/etc/ssh/sshd_configAfter the configuration is complete, restart the SSH serviceThe connection does not take effect, prompting to reject the password2. SSH access control (restricted network
After you install the server certificate on the We-B server, you must make it use the S/S L protocol. Leveraging the Internet Information
S e R v E R, which can be enabled on each resource (H T M L or a P page) or virtual directory to enable S S L. In order to do this, you must
The following actions are performed in Internet Service Manager:
(1) Right-click on the resource on which you want to enable SSL, and select P r o p e r T in the pop-up menu.
(2) On the Directory Security tab, click the e
protect your laptop, such as when no one is physically locked out to ensure security.
The mobile security policy should also include network connection information. For example, employees should know when and where to use Bluetooth or the point-to-point network, and whether these features have been disabled. It should explain to employees the dangers of unencrypted wireless networks and external devices that can secure network connectivity, such as a travel router that protects Ethernet access
or FTP), but more often, people are using unsecured versions of these protocols. Some protocols, such as the mSQL database service, provide virtually no validation mechanism.
It's a good idea for Web administrators to from outside the company and test and simulate attacks on their own websites to see what happens. Some services have been started in the default configuration after machine installation, or some services have been started due to inst
not allow employees to arbitrarily insert access point AP to enhance and extend the signal. For internal IT departments, it is best to include the definition of acceptable device patterns and configurations.
④ rules for connecting to a home network using Wi-Fi hotspots or company devices: Because the data on a device or laptop can be compromised, and you need to monitor Internet activity on an unsecured wireless network, you may want to limit Wi-Fi
when using secure connections. For unsecured pages, "Pragma:no-cache" is considered the same as "Expires:-1", at which point the browser still caches the page, but marks the page as immediately expired. In IE 4 or 5, the "Cache-control" META http-equiv tag is ignored and does not work.
In practical applications we can add all of this code. However, since this method does not apply to all browsers, it is not recommended for use. But if it is in an int
/bubbling). IE also seems to support the.Events object: Event (Load/focus/blur/select/submit)/uievent (domactivate)/mouseevnet (click/mousedown/up), etc.Event Properties: Type/target/currenttarget/eventphase/timestamp/bubbles/cancelable, View/detail, Button/key/xy.Event propagation: The propagation (capture) phase from the parent control to the child control, and the opposite (bubbling) stage; Event.stoppropagation () stops propagating.Event forwarding: document.createevent ("events");/e.initeve
add CA certificate to the browser, This will not show unsecured connections when you visit the site. The methods of adding individual browsing are not covered in this article.
2. Partial-page SSL
A site is not all information is very confidential, such as online shopping malls, general merchandise browsing can not be through HTTPS, while users log in and pay the time to force through HTTPS transmission, so that the user access speed and security ar
cookies cause network privacy leaks is:! Business interests Drive. With the rise of E-commerce and the emergence of great business opportunities on the Internet, some websites and organizations abuse cookies, without the permission of visitors, using search engine technology, data mining technology and even network deception technology to collect other people's personal data, to build user databases, send ads and other profit purposes, Causing the user's personal privacy leakage. "The openness
Linux GUI environment of documents confused: The application on the Linux host is called the client, and the user terminal computer is called the server, it seems that the reverse. In fact, X is described from the perspective of the program structure rather than the user or hardware environment, and X server working on the user terminal serves the application, so it is considered a server, and the application on the Linux host receives the service, so it is considered a client.X server and clie
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.