Described in the previous article "9.5 audit and tracking" In this chapter, we introduce the wonderful contents related to "9.6 data security technology" in Chapter 9 security management source code analysis. openGauss uses a variety of encryption and decryption technologies to improve the security of data in all links.
Posted by asmon on Mon, 06 Dec 2021 18:31:37 -0800
Linux Installation and configuration of nginx
1, What is nginx
2, nginx installation
2.1 download from official website
2.2 download using wget command
2.3 unzip the installation package
2.4 configuration of nginx
2.4.1 use default configuration (recommended)
2.4.2 custom configuration (not recomme ...
Posted by ginginca on Mon, 29 Jun 2020 18:53:50 -0700
Using nginx as front-end server
Nginx is a lightweight and high-performance Web server / reverse proxy server and email (IMAP/POP3) proxy server, characterized by less memory and strong concurrency
Because the dependency libraries of g + +, gcc, OpenSSL devel, PCRE devel and zli ...
Posted by Anxious on Mon, 22 Jun 2020 00:44:20 -0700
As mentioned in the last article Variables and operation principle in Nginx , here is a module that mainly provides variables and modifies the values of variables, that is, the anti-theft chain module we want to talk about: the referer module.
Simple and effective means of anti-theft chain
If you ...
With the rise of the media and audio-video industry, as well as the product demand for cross-platform mobile business, there has been an increase in the workload of developers and the difficulty of the work. For example, audio-video playback needs to support 95% of audio-video formats on the m ...
Posted by chriskiely on Sun, 07 Jun 2020 18:17:49 -0700
Every system needs an entrance for users to enter, which is generally used to connect the public network and the internal network. It is the total entrance of system traffic and the front guard of the system. This paper mainly introduces the design from user initiated request to load balancing layer. ...
Posted by webaddict on Sun, 07 Jun 2020 03:42:30 -0700
Recently, more than 10 secondary domain names of individuals need to issue certificates. Let's Encrypt provides free SSL certificates with a term of three months. When they expire, they need renew. The official also provides certbot, a tool for automatic renew. Here, we record the general certificate that uses Let's Encrypt to generate t ...
Posted by iRock on Fri, 29 May 2020 00:36:59 -0700
preparation in advance
Execute yum update openssh to upgrade first.
The official upgrade is okay anyway.If you have previously manually compiled an upgrade of openssh, test yourself for changes to the default profile path.)
(Unified openssh version 7.4p1 is prepared here before Unified Compile Installation is upgraded to openssh 8.2p1)
Posted by CleoK on Fri, 22 May 2020 21:10:07 -0700
nginx forward proxy http/https and proxy mail service
In the company's Intranet environment, you cannot directly connect to the external network. The intranet service is required to access the Internet through the forward proxy.
Installation environment preparation:
Nginx itself does not support https protocol request forwa ...
PHP encryption extension library Mcrypt extension library
php upgrade from 7.0 to 7.1 discards an extension, that is, the mcrypt extension. Although the extension can be used normally on the installation, a warning will be given to tell us that the mcrypt related methods have been discarded and have been removed by 7.2. Therefore, it i ...
Posted by sloshire1 on Mon, 18 May 2020 08:15:14 -0700