With the development of network and computer technology, the security of data storage and data exchange has become more and more important, and encryption technology has been used in data saving and data exchange very early. In order to ensure the correctness of the identities of both sides of the network data exchange, the visa system has matured. GnuPG is a set of tools for encrypting data and making certificates, and it works like PGP. But PGP uses a number of proprietary algorithms, which are among the notorious U.S. export restrictions. GnuPG is the GPL software, and does not use any patented encryption algorithm, so that ...
The GNU gatekeeper abbreviation GNUGK is a free H.323 signal exchange and control tool based on the OpenH323 project. Ability to manage http://www.aliyun.com/zixun/aggregation/1638.html ">VOICE-OVER-IP networks and let terminals (for example, Web conferencing) through symbolic names. It also has an external interface for billing and other applications. Supports multiple UNIX versions (package ...)
【51CTO finishing】 The following is the United States well-known technology site "Inforworld" has commented 10 most valuable open source software: 1. Linux kernel Linux is the most popular free operating system kernel. It is a Unix-like operating system written in C and conforming to the POSIX standard. Linux was first developed by Finnish hacker Linus Torvalds in an attempt to provide a free, free Unix-like operating system on the Intel x86 architecture. The plan starts at 19 ...
Save space, straight to the point. First, use the virtual machine VirtualBox to configure a Debian 5.0. Debian is always the most pure Linux pedigree in open source Linux, easy to use, efficient to run, and a new look at the latest 5.0, and don't feel like the last one. Only need to download Debian-501-i386-cd-1.iso to install, the remaining based on the Debian Strong network features, can be very convenient for the package configuration. The concrete process is omitted here, can be in ...
R is a GNU open Source Tool, with S-language pedigree, skilled in statistical computing and statistical charting. An open source project launched by Revolution Analytics Rhadoop the R language with Hadoop, which is a good place to play R language expertise. The vast number of R language enthusiasts with powerful tools Rhadoop, can be in the field of large data, which is undoubtedly a good news for R language programmers. The author gave a detailed explanation of R language and Hadoop from a programmer's point of view. The following is the original: Preface wrote several ...
As global corporate and personal data explode, data itself is replacing software and hardware as the next big "oil field" driving the information technology industry and the global economy. Compared with the fault-type information technology revolution such as PC and Web, the biggest difference of large data is that it is a revolution driven by "open source software". From giants such as IBM and Oracle to big data start-ups, the combination of open source software and big data has produced astonishing industrial subversion, and even VMware's past reliance on proprietary software has embraced big Open-source data ...
Symmetricds is a data synchronization/replication software based on a web-independent database. It is an open-source software that supports replication of multiple primary databases, filtering synchronization, network crossover in heterogeneous environments, and a single direction or two-way asynchronous data replication provided by multiple users. It uses web and database technology to replicate between real-time http://www.aliyun.com/zixun/aggregation/22.html "> relational databases and tables." The software is designed to extend ...
Under Breezy, the dapper version already contains the Mysql5.0, and in the main source, if you choose to install the lamp system when installing Ubuntu, it will be automatically installed to download the MySQL 5.0 source code (needless to say) wget http:// Dev.mysql.com/get/downloads/mysql-5.0/mysql-5.0.16.tar.gz/from/http://mysql.localhos ...
Of the many methods that can be applied to http://www.aliyun.com/zixun/aggregation/13835.html ">ubuntu security", one is called File Integrity Monitoring (file integrity checking). The purpose of integrity monitoring and verification of critical system binaries and profiles is to ensure that these key files are not made unauthorized changes. Unauthorized changes to system-specific files are one of the manifestations of attack and endangerment activities on the system. File integrity monitoring is a kind of ...
The establishment of enterprise security building Open source SIEM platform, SIEM (security information and event management), as the name suggests is for security information and event management system for most businesses is not cheap security system, this article combined with the author's experience describes how to use open source software Analyze data offline and use algorithms to mine unknown attacks. Recalling the system architecture to WEB server log, for example, through logstash WEB server to collect query log, near reality ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.