Come from:http://blog.csdn.net/lonelyroamer/article/details/7630594
I. Overview
The MAC algorithm combines the advantages of the MD5 and Sha algorithms and joins the key support, which is a more secure message digest algorithm.
MAC (Message
Encryption and decryption in Java is mainly to protect the security of the data, divided into symmetric and asymmetric, symmetric means that the encryption key and decryption key is the same key, it is often referred to as the secret key or the
1 sha Encryption:
Secure Hash algorithm is mainly applicable to digital signature algorithms (Digital Signature algorithm DSA) defined in the digital signature standard (Digital Signature Standard DSS). For messages that are less than 2^64 bits in
Message Digest also known as data fingerprint, mainly used for data integrity check, such as when you download a jar package in Apache, in addition to the download list will provide a download link, but also provide the MD5 summary value, when you
password by adding salt, you can increase the complexity of the password, even if the simplest password, after adding salt, can also become a complex string, which greatly improve the difficulty of password cracking. However, if the salt is hard
Previously wrote an article that briefly describes a node. JS-based static file server. It was only personal interest at that time. Recently there are new requirements on the server, I would like to take some time to do a good study. So take the
MAC (Message authentication code, messaging authentication Code algorithm) is a key hash function algorithm that is compatible with the features of the MD and SHA algorithms, and the key is added on this basis. Therefore, the Mac is also called an
1. SSL version Problems
The credit for HTTPS encrypted transmission is TLS. SSL is the predecessor of TLS. The final version of SSL is 3.0, and the latest version of TLS is 1.3.
The encryption function of TLS depends on the public/private key
It is important to understand the following for encryption and decryption:The two sides want to communicate, the middle connection may be bugged or even tampered with. The solution is to encrypt the contents of the transmission, using ciphertext to
Below v $ lock. type is 10.1, but most of them should be applicable to versions earlier than 10.1, especially 9.2. Record it for later use.
The following table shows the 138 lock types that are reported by V $ LOCK_TYPE in Oracle 10.1:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.