The code is very simple, here is no more nonsense, directly to the code
The code is as follows:
//header (' content-type:text/xml; Charset=utf-8 ');
include_once (DirName (dirname (__file__)). Directory_separator. ' Phpsec '.
apache|mysql| Security This article is written to friends who want to set up a secure web platform on the Win2K platform.
The required program:
Apache
http://www.apache.org/dist/httpd/binaries/win32/
We choose Apache_1.3.28-win32-x86-no_src.msi, or
' ### to Encrypt/decrypt include-code in your page
' ### strmyencryptedstring = encryptstring (strstring)
' ### strmydecryptedstring = decryptstring (strmyencryptedstring)
' ### you are the free to use this code as long as credits remain into place
'
Encrypting data encryption has become more and more important in our lives, especially considering the large amount of transactions and data transmissions that occur on the web. If you are interested in adopting security measures, you will also be
Encryption | data | Algorithm in the first section, we discuss how to generate a key, and here's how to use this key to encrypt and decrypt a string.
The following code is the function that can implement this function at the same time
crypt.asp file
1. MySQL Username and password
* MySQL uses user names for authentication purposes, regardless of UNIX user name (login name) or Windows user name. By default, most MySQL clients try to log on using the current UNIX username as the MySQL username,
Program | Verification Code ##### Copyright reprint please reserve thank you for your cooperation
##### part of the program is taken from the network
##### Author: Yang Zi
##### email:yangzinet@hotmail.com
##### qq:21112856
#####
"Summary" as long as a bit of the experience of using a non-Windows platform may be familiar to crypt (), this function is called one-way encryption function, it can encrypt some of the code, but can not in turn to convert the password to the
To add users to the system:
Use the Useradd command to create a locked user account:
Useradd
Use the passwd command to unlock an account by assigning password and password aging rules:
passwd
The Useradd command-line options are listed in
Encryption | Decryption This article is composed of two documents
Test.asp Test Demo file
Clsrsa.asp to implement RSA encryption and decryption of the VBS class file
Here's the code:
1. test.asp
REM Article title: Implementing RSA Encryption and
The following will illustrate the use of Apache+php3+postgresql as a web-based database platform for installation and configuration methods. More about Apache, PHP3, and PostgreSQL can be found in the software's accompanying documentation, Linux
Freebird
1. Overview
The early U N I x system kept the user's password in a plain text readable "password file," which could be intercepted and exposed without the attention of the system administrator. It may also be leaked in an accidental
Let's review the basic usage of the passwd command:
The Linux passwd command is used to change the user's password
Grammar
passwd [-K] [-l] [-u [-f]] [-d] [s] [username]
Necessary parameters:
-D Delete Password
-F Enforcement
-K updates can
/**
* this Java Class consists the server side for the Wondeful JavaScript library ' sha1.js '. I wrote it because I basically needed
* Some cheap client/server login authentication by the usual Key/data system. Besides, I got the creeps watching
The following are the referenced contents: Really boring, whim, want to put some of the PHP inside the package has been provided to reuse PHP implementation again, So there is the following code mainly implemented in PHP part of the string
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.