Tags: ssh password-free login path SSH username. com machine private key IDT hostFirst, configure YumSecond, what is SSH
The administrator can manage the multiple hosts scattered across the network by remote login.
Administrators can do the following for remote hosts:
Remote Login
remote command execution
Remote File transfer
The sad thing is: these operations are unsafe!
Use plaintext passwords and send them in clear text
Information
Recently, for the system to use AppScan scan out of the vulnerability "Enable unsafe HTTP method, found a lot of repair methods can not achieve the effect."Loopholes:Vulnerability Description:
Hazard level
In danger
Impact page
The entire Web page.
Short description
An administrator's negligence in server security configuration has led to an unsecured HTTP method being enabl
/M01/7F/3B/wKiom1cXNjCQbC1gAAArRE8N8KE046.jpg "title=" 3.jpg " alt= "Wkiom1cxnjcqbc1gaaarre8n8ke046.jpg"/>Other function annotations (without modification):Sslengine on #开启SSL功能SSLProtocol all-sslv2 #支持SSL所有协议, but Sslv2sslciphersuite high:medium:!anull:! is not supported md5:! seed:! Idea #支持的SSL加密方式,! indicates no support~]# httpd-t (test syntax)~]# Service httpd Restart (change listening port)because it points to the default path, it supports both HTTP and HTTPS, and if only HTTPS is allowed,
-internals/#http2. Note the version to be new, posture should be handsome!Configure AdvancedWe all know that last year's painstaking efforts to push SSL to the cusp, so only support the H2, we still need to do some security optimization of SSL!Configuring the Herman keyOpenSSL dhparam-out Dhparam.pem 2048//runs in SSH, OpenSSL generates a 2048-bit key instead of writing the nginx.conf file as a parameter. SSL_DHPARAM/PATH/TO/DHPARAM.PEM; Configuring in. confprohibit
1399970254y8iq.jpg "" 580 "height=" 237 "/>5. Configuring the PasswordChangeFlags Property1, run the command prompt as administrator, switch to the C:\Inetpub\Adminscripts directory, enter the following command, and then return to; { 650) this.width=650; "title=" clip_image010 "style=" border-top:0px; border-right:0px; Background-image:none; border-bottom:0px; padding-top:0px; padding-left:0px; margin:0px; border-left:0px; padding-right:0px "border=" 0 "alt=" clip_image010 "src=" http://img1.51
the trend of the community, for the next version of the parameter configuration policy: 1. Turn off unsecured ports, all traffic over secure ports, 2. Dynamically create bootstrpping Auth token, bootstrpping TLS Cert, auto approve certificate, certificate rotation, etc. 3. Configure the Kublet, kube-proxy parameters in the configuration file, rather than the command line, to prepare for subsequent dynamic modification of the component configuration;
the employee to indicate that they have completed and that once they have completed the assignment to their job can leave immediately.
Cost/Benefit
A buffered channel buffer greater than 1 provides an unsecured signal that is sent to be received. It is good to leave a guarantee that communication between the two goroutine can be reduced or there is no delay. In the fan out scenario, there is a buffer space for storing the reports that the employee wi
Prevents PHP programs from MySQL injection or HTML form abuse. The intention of MySQL injection is to take over the website database and steal information. Common open-source databases, such as MySQL, have been used by many website developers to store important information, such as passwords and personal information. the intention of MySQL injection is to take over the website database and steal information. Common open-source databases, such as MySQL, have been used by many website developers t
random memory installed on the server. It reads and writes the requirements for virtual iSCSI disks.Create an ultra-high-speed iSCSI RAM disk drive for temporary data storage and network stacking adjustments.There is no limit to the individual disk capacity, the total number of hard disk installs, the number of CPUs or CPU cores, the number of Ethernet ports or RAM.Support IPV4 and IPV6.Secure IPSec encryption of private data, skipping unsecured WAN
It is reported that, if the form is not guaranteed, malicious code injection in the form of MySQL will attack the website. The following HTML form is used to pull menus. The search box and check box are easy entry points for this type of intrusion. This article explains the attack and how to prevent it. Known security issues and background. The intention of MySQL injection is to take over the website database and steal information. Common open-source databases, such as MySQL, have been used by m
/accounts/12345 Alias No-version to the latest version (latest release)/api/accounts/12345 The creator of the API needs to carefully maintain the API usage rules, and any changes need to be carefully reviewed and communicated with the user to prevent the user from angering. SslSecurity is a key factor. Use HTTPS to provide a secure API access environment through encryption and authentication to ensure the integrity of communication between users and servers, and to prevent man-in-the-middle atta
"Article Summary" Chrome's security team is working on a plan to explicitly notify users that HTTP connections are very insecure. Many netizens believe that the browser will not report an error is safe, but Google Security team pointed out that "the Web browser is the only non-warning situation, it is not safe, is the use of the HTTP transport protocol." ”Chrome's security team is working on a plan to explicitly notify users that HTTP connections are very insecure, or that Google will mark HTTP
you are in conflict with Imerge.
Ten, mail and chat
Mailbox:mailbox is a humanized reproduction of the IMAP of Python. Based on the attitude of simplicity and beauty, the author gives a simple and well-understood form to the IMAP interface.
Deadchat:deadchat is designed to provide a secure, single room group Chat service as well as clients in an unsecured network environment.
Mailpile:mailpile is a mail-based index and search
installation directory)
; C:\Program Files (x86) \git\bin;
The CMD is then restarted to take effect.
3. Set –insecure-registry option
Starting with Docker 1.3.1, connecting an unsecured private image is not allowed by default. Now we are going to download our own private image, which needs to be set up in the following ways:
boot2docker sshsudo vi /var/lib/boot2docker/profile
Add a row
EXTRA_ARGS="--insecure-registry local.registry.com:5000"
Save and
It is reported that, if the form is not guaranteed, malicious code injection in the form of MySQL will attack the website. The following HTML form is used to pull menus. The search box and check box are easy entry points for this type of intrusion. This article explains the attack and how to prevent it. Known security issues and background. The intention of MySQL injection is to take over the website database and steal information. Common open-source databases, such as MySQL, have been used by m
"collections" (collection) of the same record, so nouns in the API should also use complex numbers. For example, there is an API that provides information about zoos, as well as information about various animals and employees, and its path should be designed as follows.https://api.example.com/v1/Zooshttps://api.example.com/v1/Animalshttps://api.example.com/v1/employees5.http methodGET (SELECT): Remove resources (one or more items) from the server, secure and idempotent. POST (Create): Create a
Controller method is not an operation method.[OutputCache (...)]
To mark an action method whose output will be cached.
To mark its output, it will be a cache operation method.[Remote (…)]
It is used to invoke the server-based validation from client side.
It is used to call server-based verification from the client.[RequireHttps]
It forces an unsecured HTTP request to be re-sent over HTTPS.
It forces an insecure HTTP request to be sent over HTTPS agai
The intention of MySQL injection is to take over the website database and steal information. Common open-source databases, such as MySQL, have been used by many website developers to store important information, such as passwords, personal information and management information.
MySQL is popular because it is used with the most popular server-side scripting language PHP. Moreover, PHP is the main language of the Internet-dominated Linux-Apache server. Therefore, this means that hackers can easil
app was not allowed to the query for scheme xxxx"(here because my App integrates the functions of sharing to QQ, Weibo, xxxx Part I saw Mqq, WeChat, Sinaweibosso and many other information)Info.plistGo to info.plist inside to create a called Lsapplicationqueriesschemes Array, the XXXX part of the words you see in one fill in, until the console does not have any relevant output.③ about other console error messages raised through WebView access to HTTP URLsSetting ATS in Info.plistkey>nsapptransp
refer to the combination of 1. SQL injection file writes with 3. Cross-site request forgery resolution;5. Decrypted Login RequestWorkaround:1. The password entered by the user is MD5 encrypted on the page and fed back to the password input box.2. Manually generate SSL secure access certificate; This does not introduce, related methods can be found online;3. Change the product HTTP access mode to SSL secure access, and add the following code to Server.xml under the Conf folder of the APACHE-TOMC
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.