Secure Your

Read about secure your, The latest news, videos, and discussion topics about secure your from alibabacloud.com

How to make your password more secure

Now we are in the network age, so often to log into various websites, forums, mailboxes, online banking and so on, and these visits will often require account + password identity authentication, so we continue to register users, so there are countless network accounts and passwords. Most people are accustomed to using only one commonly used network username, mailbox and password to facilitate memory, but this is very dangerous.   So, how should we set the password on the network to be relatively safe? On the whole, personal password security needs to follow the following simple ...

CSDN Online Training Security first lesson: Building Secure PAAs Cloud services

At the request of the vast number of users, csdn online training for the first time to bring security-related topics, September 16, 2014, Sohu Network Operations security Manager Wu Jianjiang will explain how to "build a secure PAAs cloud service." Application Address: http://huiyi.csdn.net/activity/product/goods_list?project_id=1361 Course Introduction: Building a secure PAAs cloud service reduces operational costs as users apply to rapid deployment The demand for elastic parallel expansion is getting higher ...

A Secure Data Access mechanism for Cloud tenants

A secure data access mechanism for Cloud tenants Chunming Rong hongbing Cheng at this monitors, we a a secure data access mecha Nism based on identity-based encryption and biometric ...

A secure cloud storage model based on HDFS

A security cloud storage model based on HDFs Lin Hu Huang Jiang Wensu Qin National for the HDFs based on the cloud storage platform for the absolute full control of metadata, proposed metadata autonomous organization model ASOM, through the analysis of Datanode and namenode interaction between the process, Asom designs and implements metadata sub service, interacts with metadata sub server directly by extracting Datanode metadata information in HDFs, and processes the mapping relationship between file and block, block and Datanode by metadata sub server. By HDFs ...

GNU by Layer Security Library 3.0.18 release Secure Communications Library

GnuTLS (GNU by Layer http://www.aliyun.com/zixun/aggregation/16952.html ">security Library") is a secure communications library, SSL and TLS protocols and related technologies are implemented. It provides a simple C language Application programming interface (API) to access the Secure communication protocol, as well as APIs to parse and write X.509, pkcs#12, Open ...

GNU by Layer Security Library 3.0.19 release Secure Communications Library

GnuTLS (GNU by Layer http://www.aliyun.com/zixun/aggregation/16952.html ">security Library") is a secure communications library, SSL and TLS protocols and related technologies are implemented. It provides a simple C language Application programming interface (API) to access the Secure communication protocol, as well as APIs to parse and write X.509, pkcs#12, Open ...

Windows Azure set of Secure, enterprise-class authentication and access management features

Today I am delighted to share with you some of the improvements that we have made in the http://www.aliyun.com/zixun/aggregation/32995.html > Windows Azure Identity Authentication and access management features. These improvements will be built on my previous blog (we are integrating Windows Azure AD fully into Windows Azure). Starting today, if you already have Windows Azure Ac ...

EMC extends acquisitions to secure and large data companies

"Tenkine Server channel May 14 News" Over the past few years, EMC, which dominates the enterprise storage industry, has been involved in areas such as virtualization, security, and large data through a series of acquisitions.   A few days ago, EMC and VMware, RSA Security and Pivotal formed a new alliance, which could then be acquired in the area of secure markets and data analysis. RSA is still focused on authentication and encryption technology, but not in the corporate infrastructure. Security analysis is a promising field and ...

66 Index fund passive protective disk green shoe mechanism to secure ABC not break

Agricultural Bank announced last night, its a-share inquiry interval of 2.52 yuan to 2.68 yuan, basically in line with market expectations. Previously, the market was widely expected to set the price of 2.7 yuan near. ABC's H-Share enquiry range was finalized late 23rd this month, with a specific HK $2.88 to HK $3.48.  After exchange rate conversion, the lower limit of the A-share inquiry interval and the lower bound of H-shares show that AgBank is sticking to the same bottom line for both domestic and overseas funds. 66 Index Fund Passive Protector ABC's IPO was approved by the SFC on 9th this month, and the listing process is advancing rapidly. A-share preliminary inquiry has been in 6 ...

Research and implementation of private cloud secure storage technology

The research and realization of private cloud secure storage technology The money in the Guangdong Polytechnic University in this paper, the security problems in private cloud storage are deeply discussed and studied, and the main research work includes: 1. The research status of private cloud storage technology is reviewed, and the security problems of private cloud storage are pointed out. 2. The data integrity verification technology in private cloud storage is studied, and a data integrity verification protocol for private cloud storage is proposed. The protocol is adaptable, and for smaller files, it is possible to check all blocks of data to ensure the effectiveness of the results, while for larger files ...

The public cloud and the private cloud, who is more secure?

According to Bernard Golden, chief executive of Hyperstratus Consulting, a survey of one after another shows that security is the most worrying issue for potential users of public cloud computing. For example, a April 2010 survey noted that more than 45% of respondents felt the risk of cloud computing outweighed the benefits. A similar concern was found in a survey conducted by CAS and Ponemon Cato. However, they also found that despite these concerns, cloud applications are still being deployed ...

BlackBerry announces the launch of a secure tablet computer SecuTABLET with Samsung and IBM

Absrtact: March 14, BlackBerry announced and Samsung, IBM cooperation, the launch of a secure tablet computer secutablet. March 15, Yahoo at the SXSW conference, the first public demonstration of the new encrypted mail service. Let's see what the SecuTABLET is: based on the Galaxy Tab S 10.5, built in BlackBerry March 14, BlackBerry announced a partnership with Samsung and IBM to launch a secure Tablet PC--secutablet. March 15, Yahoo at the SXSW conference, the first public demonstration of the new encrypted mail ...

How to set a secure log server

More and more hacker appear in the Internet, more and more experts appear in the case. How do you make sure that you can save a full log? A little bit of conceptual hacker know that the first thing to do when you get into the system is to clean up the log, and the easiest and most straightforward way to find the intrusion is to look at the system records file.   Now let's talk about how to set up a secure log server. Think about how you can change your log if intruders can't connect to your log server? Now let's learn ...

Can the old method secure the next generation of data centers?

A new survey was recently conducted by the Gabriel Consulting Group, and McAfee released its findings.   The results show that we are using the same tools to secure both physical and virtual servers! During the third quarter of 2010, more than 140 data center practitioners from SMEs to mega-http://www.aliyun.com/zixun/aggregation/12039.html "> Multinationals surveyed; From existing security tools ...

Steps to secure the use of Azure blob storage in Windows store applications

In the previous article, we demonstrated the steps to secure the use of Azure blob storage in Windows Store applications. The steps on Windows phone are similar to this, but there are some differences in client code and settings. But to make it easier for readers to read, I'll write a separate one for how to use Azure blob storage securely in Windows Phone apps. This will suffice for Windows Phone developers to read this article. We have been in this article ...

Is the information in symmetric encryption more secure than the information in PGP?

Q: Suppose two people use symmetric encryption to exchange information, and each time they communicate, the session key is generated, encrypting information using protocols such as SSL that process the session key. In addition, they can exchange information using PGP, a mail encryption software based on the RSA public key encryption system. Which encryption method do you think is more secure in this case, PGP or symmetric encryption? A: It depends on the degree of trust you have in your local environment. Symmetric encryption encrypts all packets between mail servers by using a shared encryption key to ensure that information between systems is not compromised. PG ...

A secure cloud access method based on SDN

A secure cloud access method based on SDN Xu Yao Guo Zhigang Shouguo This paper combines SDN (Software tabbed Networking) technology to propose a new security cloud access model from the point of Access security. In this model, the cloud service provider (CSP) is concerned only with data processing and storage, and the third server provides the corresponding access security service according to the needs of the cloud users. In a SDN network, a third service can adopt a network management policy based on service name addressing, which makes the service easy to extend or recover. ...

Research on secure data storage structure based on cloud computing

Research on the security data storage structure based on cloud computing Zhao Yin-chen Ma Guohua Ma Chunlong Wang Juan analyzes the characteristics and architecture of cloud storage, deeply analyzes the existing problems of cloud data security, such as data privacy security, data isolation security, cloud computing platform security hidden danger, cloud computing provider's reliance degree is too high, Cloud security management of user data, the paper puts forward the security solution of cloud data, including data encryption, data isolation, access control, risk assessment, unified threat management and the establishment of security cloud. Security data based on cloud computing ...

The public cloud and the private cloud, who is more secure?

In this article: according to Bernard Golden, chief executive of Hyperstratus Consulting, a survey of one after another shows that security is the most worrying issue for potential users of public cloud computing. For example, a April 2010 survey noted that more than 45% of respondents felt the risk of cloud computing outweighed the benefits. Bernard Golden, chief executive of Hyperstratus Consulting, wrote that ...

To stand out and be more secure--five key words to help shop sellers build stations

"51cto.com Comprehensive News" in many similar shop, how to strengthen the buyer's memory of the store, bring "repeat customers", to build their own brand from many online shop in the fore? A simple and practical way is to have an independent "house number" on the Internet and register a Web site with a. com domain name. As one of the leading global top-level domain names,. com and. NET has become the preferred domain name for 93.5 million of the world's internet users, with a global high degree of cognitive advantage. However, there are still many network sellers to the. com domain name registration methods and procedures to know ...

Total Pages: 15 1 .... 3 4 5 6 7 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.