Noejs-md5 salt-to-decryption comparison
Noejs-crypto Encryption Tool
crypto module provides encryption functions, including a package of hashing, MD5, HMAC, encryption, decryption, signature, and verification functions of OpenSSL.
MD5 commonly used in crypto
MD5 is an irreversible encryption algorithm. At present, it is one of the most reliable encryption algorithms. There is no prog ...
Posted by kh411dz on Wed, 24 Jul 2019 03:32:43 -0700
Using jsencrypt to implement front-end encryption of parameters
For login function in a project, parameters are usually submitted to the server through form form or ajax for validation. In this process, if the login password is encrypted once in the front end, the security is better than that of direct submission.Recently, when I read the login page of the blog park, I found that the login of the blog park ...
Posted by Izzy1979 on Wed, 10 Jul 2019 10:16:39 -0700
Installation of linux PHP environment
Nginx installation
nginx relies on three modules, zlib pcre ssl, which should be installed before installation and ignored if installed
Installation by source code:
These three extensions do not need to specify the installation directory, they are all installed by default in the / usr/local directory.
The first step is to download the sour ...
Posted by riddhi on Sun, 07 Jul 2019 19:51:05 -0700
Nginx configures multiple HTTPS domain names
This article is synchronized with the personal Github blog: https://github.com/johnnian/Blog/issues/8 Welcome to leave a message.
Recently, I've been playing the Wechat app. I have the following programs on hand:
A Cloud Server: CentOS 7
Multiple primary domain names
During the development and testing process, for some reasons, we want to mak ...
Posted by @sh on Mon, 17 Jun 2019 11:41:39 -0700
The source code compiles and updates nginx to the latest version, and starts nginx supporting http2 protocol module.
Recently, due to the migration of code on the company's vm, some problems have been encountered. One VM configures the https protocol. It was thought that after migrating the security certificate, nginx can be configurated. But after modifying the nginx configuration file, after executing the nginx-t command, the following error is reported:
n ...
Posted by bigrollerdave on Sun, 16 Jun 2019 14:14:59 -0700
Linux Nginx installation and deployment
Linux Nginx installation and deployment
1. Introduction to Nginx
Nginx official website: http://nginx.org/
Nginx is a high-performance HTTP and reverse proxy server, as well as an IMAP/POP3/SMTP server. The purpose of the initial development is to develop proxy email server roommate: Igor Sysoev. The source code conforms to BSD open source. ...
Posted by Grodo on Wed, 12 Jun 2019 11:29:14 -0700
Using OpenSSL to Build CA and Issue Certificates and Revoke Certificates
Experiments
OpenSSL is a secure socket layer cryptographic library that includes key and certificate encapsulation management functions and SSL protocols, and provides a wealth of applications for testing or other purposes.
OpenSSL is a suite of open source programs, which consists of three parts: first, libcryto, an encryption library with ...
Posted by lancia on Wed, 12 Jun 2019 11:15:40 -0700
ssl protocol and open source implementation of openssl
ssl protocol
Secure Socket Layer: Secure Socket Layer, ssl is a set of security protocols, which are called by application layer. When http calls ssl protocol, it is called https. When ftp calls ssl protocol, it is called sftp.
lls is a collection of protocols, including:
Handshake protocol: including negotiating security parameters and pas ...
Posted by timclaason on Mon, 10 Jun 2019 17:02:40 -0700
Docker Warehouse Harbor Opens TLS Authentication
The company has been using harbor for a long time and has been using http protocol. Recently, it upgraded to version 1.1.2. By the way, it opens https, so record it.
Get the installation package
You can go to the official Github of the project. Release Publishing Address Download offline installation packages, or download online installation pa ...
Posted by scripterdx on Fri, 31 May 2019 18:05:39 -0700
Semi-automatic Creation of CA and Application Certificate
1 Overview The reason why this paper calls it semi-automation is that the application for certificates is not a routine work, but only a period of time. At the same time, when creating certificates and method certificates, some parameters need to be adjusted according to the user's needs, such as the validity time of c ...
Posted by blanius on Sat, 25 May 2019 14:30:14 -0700