' @ '192. 0.0.1 '; // create a 44 user
Query OK, 0 rows affected (0.00 sec)
Mysql> create user '33' @ 'localhost' identified by 'aaa'; // create a 33 user with the password aaaa
Query OK, 0 rows affected (0.00 sec)
Mysql> select * from mysql. user where user = '33' or user = '44' \ G; // check the user in mysql.
Although the create user can be used to create a user, it only creates a user and does not assign sub-configuration permissions to the user. Therefore, it is generally replaced by th
Original: C # design mode 14 command pattern "behavioral"First, IntroductionToday we begin to talk about the second pattern of the "behavioral" design pattern, which is the "command pattern", also known as action mode or trading (Transaction) mode, with the English name: command pattern. Or the old routine, first look at the name. "Command mode" the first time I saw the name, my understanding was that it might be an action or an action is a command. The word "command" is used most in the army, f
.
CERT_ISSUER
The issuer field in the user certificate.
CERT_KEYSIZE
Number of digits of the Secure Socket Layer connection keyword, such as 128.
CERT_SECRETKEYSIZE
The number of digits that the server verifies for a private keyword. For example, 1024.
CERT_SERIALNUMBER
The serial number field of the customer certificate.
CERT_SERVER_ISSUER
Issuer field of the server certificate
CERT_SERVER_SUBJECT
Th
Online issuance and subscription of new shares:
(1) purchase procedures for online bidding
The specific procedures for online bidding of new shares are as follows:
1. For new stock bidding, the primary dealer must submit an application to the stock exchange with the approval document of the China Securities Regulatory Commission (CSRC) and organize the application after review. The issuer shall, at least two to five working days prior to the implement
is returned. If the request comes from an insecure channel, off is returned.
Request. servervariables ("instance_id ")ID of the IIS instance
Request. servervariables ("instance_meta_path ")Metadatabase path of the IIS instance that responds to the request
Request. servervariables ("http_accept_encoding ")Returned content, such as gzip and deflate
Request. servervariables ("http_accept_language ")Returned content, for example, en-US
Request. servervariables ("http_connection ")Returned content:
changed between the publisher and the subscriber ). Conflicting data columns (these columns are the data columns that have been changed in both the publisher and subscriber) will be sent to the conflict solver. The resolver is a module used to resolve conflicting data in a merge write operation. You can set a worker that is suitable for you.3. All changes will be applied to the issuer.4. the Merge Agent uploads all change data from the
consistent hash. Dynamo uses the quorum mechanism to manage copies.
9. The lease mechanism is the most important distributed Protocol and is widely used in various distributed systems. 1) lease is generally defined as an agreement in which the issuer gives certain rights to the holder within a certain period of time. 2) Lease expresses the issuer's commitment within a certain period of time. As long as the issu
authentication method.
Auth_user
Unauthenticated User Name.
Cert_cookie
The unique ID verified by the client, which is returned as a string. It can be used as a signature for verification by the entire client.
Cert_flags
If a client is verified, bit0 is 1.If the authenticated by the client is invalid (not in the CA list recognized by the server), bit1 is set to 1.
Cert_issuer
The
machine name. In the IE certificate authentication system, a certificate is tested in three aspects:
Whether the certificate is trusted
Certificate Expired?
Whether the certificate issuer has the same name as the accessed host
If one of the three conditions does not match, the threat prompt is displayed in IE8. When browsing the Web page, you can click "continue access", and the address bar is red at random. However, in outlook, a
("instance_id ")ID of the IIS instance
Request. servervariables ("instance_meta_path ")Metadatabase path of the IIS instance that responds to the request
Request. servervariables ("http_accept_encoding ")Returned content, such as gzip and deflate
Request. servervariables ("http_accept_language ")Returned content, for example, en-US
Request. servervariables ("http_connection ")Returned content: keep-alive
Request. servervariables ("http_cookie ")
Request. servervariables ("http_user_agent ")Retu
root certificate. Illustrates this process:Sometimes a certificate authority may authorize another certificate authority to issue a certificate, so that a certificate chain appears.IE browser in the verification of the certificate is mainly from the following three aspects, as long as any one of the unsatisfied will give a warning
Whether the issuer of the certificate is in the list of root trusted certification authorities
Whether the c
It is mainly used for outputting certificate information , can also sign certificate request file, self-signed, convert certificate format , etc.The OpenSSL x509 tool does not use the settings in the OpenSSL configuration file, but is completely self-setting or uses the default value of the pseudo-command, which is like a complete small CA toolbox .[-caserial filename] [-text] [-MD2|-MD5|-SHA1|-MDC2] [-extfile filename] [-extensions section]There are many options, so the segmentation is explain
("https_server_issuer ")Issuer field of the server certificate
Request. servervariables ("https_server_subject ")Topic field of the server certificate
Request. servervariables ("auth_password ")The password entered in the Password dialog box when the Basic Authentication mode is used
Request. servervariables ("auth_type ")When a user accesses a protected script, the server is used to verify the user's authentication method.
Request. servervariables (
anything he does not want to sign.
Distribution Public Key
How can Bob distribute his public key in a trusted manner? Let's assume that the authentication protocol looks like this:
A --> B hello
B --> A Hi, I'm Bob, bobs-public-key
A --> B prove it
B --> A Alice, This Is bob {digest [Alice, This Is Bob]} bobs-private-key
If this protocol is used, anyone can be Bob. All you need is a public key and private key. You and Alice panic to call you Bob, and then you replace Bob's public key with your
. You and Alice panic to call you Bob, and then you replace Bob's public key with your own public key, then you can prove it by using your private key encryption, so that Alice cannot tell that you are not Bob.
To solve this problem, the Organization for Standardization invented a certificate, which contains the following content:
Name of the Certificate IssuerGroup to which the certificate is sentPublic Key of the topicTimestampThe certificate is signed by the private key of the Certificate
instance
Request. servervariables ("instance_meta_path ")Metadatabase path of the IIS instance that responds to the request
Request. servervariables ("http_accept_encoding ")Returned content, such as gzip and deflate
Request. servervariables ("http_accept_language ")Returned content, for example, en-US
Request. servervariables ("http_connection ")Returned content: keep-alive
Request. servervariables ("http_cookie ")
Request. servervariables ("http_user_agent ")Returned content: Mozil
I have heard of digital certificates for a long time ". Never touched. I checked it today. Summarize your understanding.
"Digital Certificate" is mysterious (for newcomers ). In this way, people can stay away from each other. In fact, there is a lack of understanding. A digital certificate is a certificate issued by an authoritative and impartial third-party organization (CA) center. It helps you create secure communication methods on insecure channels to provide data integrity and authenticati
. servervariables ("HTTPS ")If the request passes through the Secure Channel (SSL), on is returned. If the request comes from an insecure channel, off is returned.
Request. servervariables ("instance_id ")ID of the IIS instance
Request. servervariables ("instance_meta_path ")Metadatabase path of the IIS instance that responds to the request
Request. servervariables ("http_accept_encoding ")Returned content, such as gzip and deflate
Request. servervariables ("http_accept_language ")Returne
]Request. servervariables ["https_keysize"] Number of connections in the Secure Socket Layer, for example, 128Request. servervariables ["https_secretkeysize"] the server verifies the number of digits of private keywords, such as 1024.Request. servervariables ["https_server_issuer"] The issuer field of the server certificateRequest. servervariables ["https_server_subject"] Subject field of the server certificateRequest. servervariables ["auth_password"
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.