openGauss database source code analysis series articles -- data security technology
Described in the previous article "9.5 audit and tracking" In this chapter, we introduce the wonderful contents related to "9.6 data security technology" in Chapter 9 security management source code analysis. openGauss uses a variety of encryption and decryption technologies to improve the security of data in all links.
9 ...
Posted by asmon on Mon, 06 Dec 2021 18:31:37 -0800
Linux Installation Configuration nginx (successful)
Linux Installation and configuration of nginx
1, What is nginx
2, nginx installation
2.1 download from official website
2.2 download using wget command
2.3 unzip the installation package
2.4 configuration of nginx
2.4.1 use default configuration (recommended)
2.4.2 custom configuration (not recomme ...
Posted by ginginca on Mon, 29 Jun 2020 18:53:50 -0700
Using nginx as front-end server for front-end developers
Using nginx as front-end server
introduce
Nginx is a lightweight and high-performance Web server / reverse proxy server and email (IMAP/POP3) proxy server, characterized by less memory and strong concurrency
install
Because the dependency libraries of g + +, gcc, OpenSSL devel, PCRE devel and zli ...
Posted by Anxious on Mon, 22 Jun 2020 00:44:20 -0700
I heard that your resources have been stolen. Do you know how the Nginx anti-theft chain works?
As mentioned in the last article Variables and operation principle in Nginx , here is a module that mainly provides variables and modifies the values of variables, that is, the anti-theft chain module we want to talk about: the referer module.
Simple and effective means of anti-theft chain
scene
If you ...
Posted by nats on Sun, 14 Jun 2020 02:39:02 -0700
Record an ijkplayer compilation trip
Preface
With the rise of the media and audio-video industry, as well as the product demand for cross-platform mobile business, there has been an increase in the workload of developers and the difficulty of the work. For example, audio-video playback needs to support 95% of audio-video formats on the m ...
Posted by chriskiely on Sun, 07 Jun 2020 18:17:49 -0700
[build back-end microservice architecture from scratch] - 02 - system entry
Every system needs an entrance for users to enter, which is generally used to connect the public network and the internal network. It is the total entrance of system traffic and the front guard of the system. This paper mainly introduces the design from user initiated request to load balancing layer. ...
Posted by webaddict on Sun, 07 Jun 2020 03:42:30 -0700
Let's Encrypt configure universal domain name certificate
Recently, more than 10 secondary domain names of individuals need to issue certificates. Let's Encrypt provides free SSL certificates with a term of three months. When they expire, they need renew. The official also provides certbot, a tool for automatic renew. Here, we record the general certificate that uses Let's Encrypt to generate t ...
Posted by iRock on Fri, 29 May 2020 00:36:59 -0700
SSH Upgrade Version--8.2p1
preparation in advance
Execute yum update openssh to upgrade first.
The official upgrade is okay anyway.If you have previously manually compiled an upgrade of openssh, test yourself for changes to the default profile path.)
(Unified openssh version 7.4p1 is prepared here before Unified Compile Installation is upgraded to openssh 8.2p1)
[root@n ...
Posted by CleoK on Fri, 22 May 2020 21:10:07 -0700
nginx forward proxy http/https and proxy mail service
nginx forward proxy http/https and proxy mail service
Demand background:
In the company's Intranet environment, you cannot directly connect to the external network. The intranet service is required to access the Internet through the forward proxy.
Installation environment preparation:
Nginx itself does not support https protocol request forwa ...
Posted by nats on Thu, 21 May 2020 07:53:45 -0700
PHP encryption extension library openssl
PHP encryption extension library Mcrypt extension library
Summary:
php upgrade from 7.0 to 7.1 discards an extension, that is, the mcrypt extension. Although the extension can be used normally on the installation, a warning will be given to tell us that the mcrypt related methods have been discarded and have been removed by 7.2. Therefore, it i ...
Posted by sloshire1 on Mon, 18 May 2020 08:15:14 -0700