Front end security against CSRF attack

The front end is not only to render the data on the page, but also to do a lot of things For example, we should do a good job in safety Suppose, a management system, when you log in the system, you do not do security work Other people can add, delete, modify and check your data through your interface. T ...

Posted by youdontmeanmuch on Mon, 24 Feb 2020 02:48:14 -0800

How is Seesion used in C + + server?

How is Seesion used in C + + server? The two mechanisms of cookie and session are introduced and used in the official account (CPP background server public view), but it seems that we seldom encounter in the C++ background development process. How is session used in our server? First, let's look ...

Posted by neveriwas on Sat, 22 Feb 2020 20:09:54 -0800

Windows play Kubernetes series 4-build K8S Dashboard

Download official yaml file The latest configuration file v2.0.0-beta 8, recommended.yaml, UI address wget https://raw.githubusercontent.com/kubernetes/dashboard/v2.0.0-beta8/aio/deploy/recommended.yaml Original document: kind: Service apiVersion: v1 metadata: labels: k8s-app: kubernetes-dashboard name: kubernetes-dashboard namespace: ...

Posted by and1c on Fri, 21 Feb 2020 06:56:51 -0800

md5sum and random number creation in shell programming

1. What is md5sum MD5 full name is message digest algorithm. This algorithm calculates information of any length bit by bit, and generates a "fingerprint" (or "message digest") with a binary length of 128 bits (hex length is 32 bits). The possibility of different files generating t ...

Posted by damo87 on Sat, 15 Feb 2020 21:09:27 -0800

Extended etcd cluster node with certificate

background A 7-node k8s cluster and a master node's disk are abnormal, which often causes the etcd of the node to write to the card, and then drags down the etcd cluster. Therefore, it is considered to migrate the etcd of the node. As shown in the figure above, the disk of the tstr501384 node is ...

Posted by turkman on Wed, 05 Feb 2020 00:30:35 -0800

CoreOS Configuration Docker API TLS Certification

We often use Portainer to manage the docker environment, Jenkins to build and deploy the docker automatically, and the Docker API is used for remote management. Usually we just open a 2375 (usually) port without security protection, which is dangerous and can lead to remote hijacking attacks.Then we need to configure the TLS certified 2376 (usu ...

Posted by krotkruton on Wed, 22 Jan 2020 08:29:43 -0800

CentOS 7.6 builds nginx 1.16.1 and uses the upstream check module

Environmental description: host name Operating system version ip nginx version httpd version Remarks nginx Centos 7.6.1810 172.27.34.41 1.16.1 / nginx server web01 Centos 7.6.1810 172.27.34.161 / 2.4.6 web server web02 Centos 7.6.1810 172.27.34.162 / 2.4.6 web server web03 Centos 7.6.1810 172.27.34.163 / 2.4.6 web server 1, Brief ...

Posted by jungalist on Wed, 22 Jan 2020 07:36:22 -0800

Django + uWSGI + Nginx + https project deployment, and generate https certificate with OpenSSL

Background: Recently, I suddenly came into contact with OpenSSL. I suddenly thought that I had not written anything related to the deployment of Django + uWSGI + Nginx + https project, so I sorted out a piece of data. Catalog 1, OpenSSL installation 2, Generate certificate 3, Nginx configuration 4, Ac ...

Posted by frymaster on Sun, 19 Jan 2020 06:20:10 -0800

Docker Security Management (Actual!!!)

Docker Security Difference between Docker and Virtual Machine Isolation and Sharing By adding Hypervisor layer, virtual hardware such as network card, memory, CPU and so on, virtual machines can be built on top of it. Each virtual machine has its own system core Docker containers isolate file systems, processes, devices, networks and other re ...

Posted by OMorchoe on Tue, 14 Jan 2020 11:21:14 -0800

Build Nginx Server and Deep Optimization

Blog Outline: 1. Introduction to Nginx2. Set up Nginx server3. Upgrade version of Nginx service to 1.24. Modify Nginx Service Header Information5. Detailed explanation of location Option in nginx main configuration file6. Configure https to access Nginx7. Open Nginx Access Certification 1. Introduction to Nginx Nginx is developed for perform ...

Posted by katarra on Fri, 10 Jan 2020 09:35:14 -0800