#注释掉
Selinux=disabled #增加
: wq! #保存退出
Setenforce 0 #使配置立即生效
Second, the installation of the Editing Tool kit
1, the use of CentOS default yum source installation
Yum install wget gcc make
Yum Install Pam-devel Libpng-devel
2, configure Repoforge third party yum source installation mercurial package
CentOS each version, please select the correct version
CentOS 5.x
and the server computed the same-one password is the same. If the server verifies the same, the login succeeds.Tips:1. This "algorithm" is public, so the server side also has a lot of open-source implementations, such as the PHP version:https://github.com/phpgangsta/googleauthenticator 。 Search for Google Authenticator on GitHub to find more language versions of Google Authenticator.2. So, you can easily
Two-Step verificationShould everyone be familiar with two-step verification? If Apple has its own two-step verification strategy to prevent user account password theft and lock the phone to blackmail, this is not uncommon, so Apple recommends that you open two-step verification.Google's authenticator is also typically used for two-step verification of login, and Apple's two-step verification is the same. Only Google's authentication is used more broad
Before listening to others said, with the XX home cloud, install a mobile app, each login needs to verify the dynamic password, and then enter the password, security greatly improved, the realization of the legendary two-factor landing, at that time feel good foreign flavor.Because before the angle of attention is different, I more is from the landing statistics and alarm to observe, after all, let you directly landed fortress machine or board machine not much, is I too out, heard that the doubl
By default, SSH has used secure data communication between remote machines. However, if you want to add another security layer for your SSH connection, you can add Google Authenticator) the two-factor authentication module allows you to enter a random one-time password (TOTP) Verification code when connecting to the SSH server. When you connect, you have to enter the verification code from your smartphone or PC.
Google
Use Google-Authenticator to enhance server SSH LoginFor people who need special encryption, I will provide a method for Google-based encryption.
The procedure is as follows:
Preparation:First, prepare the client on your mobile phone (Baidu download by yourself)Run the following command:Date: view system timeDate-s 03/04/2013 (set the system date to January 1, March 04, 2013)Date-s (set the system time to am)After modification, execute clock-w to forc
Two-Step verification
Should everyone be familiar with two-step verification? If Apple has its own two-step verification strategy to prevent user account password theft and lock the phone to blackmail, this is not uncommon, so Apple recommends that you open two-step verification.
Google's authenticator is also typically used for two-step verification of login, and Apple's two-step verification is the same. Only Google's authentication is used more br
Linux uses Google Authenticator to implement two-factor authentication for ssh Login, authenticatorssh
1. Introduction
Two-factor authentication: two-factor authentication is an identity authentication system that combines all the two elements you know and what you have to make a difference. Two-factor authentication is a system that uses time synchronization technology. It uses a one-time password generated based on the time, event, and key three cha
Function Description:
1. Background check: The default value is assigned if the value is null when validating.
2. Foreground check: Check when the mouse loses focus, if there is a non-null (required) check, non-null authentication is performed first, and if null authentication is empty, the default value is automatically populated after the mouse loses focus.
How to use:
In the rules () function call $rules[] = model::addrule (' cat_sort ', ' Default ', [' value ' = ' 255 ']);
Parameter de
System: centos6.6Download the Google authentication package Google-authenticator-master (actually just a. zip file, unzip it under Windwos, and then pass it to Linux)#cd/data/google-authenticator-master/libpam#yum Install Libtool–y (this must be installed, or the following installation will be error)#cp makefile.am makefile.in (this file is required when compiling the installation below)#./bootstrap.sh#./co
Get ready:A Google two-step verification app, I'm using iOS identity treasureInformation:1.Google Authenticator principle and Java implementation//main reference76947962#2. What is the principle of Google verification (Google Authenticator)?https://www.zhihu.com/question/204626963. Google verification, also known as two-step verification,Https://www.360shouzhuan.com/android/news/youxi/1632.htmThis is Google
) this.getfieldvalue (FieldName, object);//bytes Final int bytes = Fieldvalue.getbytes (). length;//number of characters final int chars = Fieldvalue.length (), if (Mode.equals ("some")) {if (chars== bytes| | Chars*2==bytes) {This.addfielderror (FieldName, object);}}}declaring a custom validatorCreate a validators.xml under SRCPS:STRUTS2 2.0. Before the 8 version, once the custom validators.xml file is used, the system will no longer invoke the Struts2 predefined validator, so the struts2 defaul
To improve the security of Android, Google has introduced Google's verification app (Google Authenticator) to secure its account in Android. Google verified the use of the application is: Users install mobile clients, generate temporary authentication code, submitted to the server authentication, similar verification system and authy. Robbie published its own version of the go language on its GitHub page and wrote a blog post to explain how it works.
Public Account third-party platform development and creation of public account third-party platform, third-party publicRegister
Registered address: https://open.weixin.qq.com/
Fill in the information, submit the information, and pay 300 yuan for the certification fee, and wait for the authentication to pass.1. Create a third-
(This article is synchronously published on javaeye.com. Repeat the source for reprinting)
In http://www.cnblogs.com/jackyrong/archive/2006/11/08/554694.html,
I briefly talked about how to deal with Party A's leadership. This is about how to deal with Party A's information project owner. This is also a very important part.How to deal with the relationship with Party
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.