Noejs-md5 salt-to-decryption comparison

Noejs-crypto Encryption Tool crypto module provides encryption functions, including a package of hashing, MD5, HMAC, encryption, decryption, signature, and verification functions of OpenSSL. MD5 commonly used in crypto MD5 is an irreversible encryption algorithm. At present, it is one of the most reliable encryption algorithms. There is no prog ...

Posted by kh411dz on Wed, 24 Jul 2019 03:32:43 -0700

Using jsencrypt to implement front-end encryption of parameters

For login function in a project, parameters are usually submitted to the server through form form or ajax for validation. In this process, if the login password is encrypted once in the front end, the security is better than that of direct submission.Recently, when I read the login page of the blog park, I found that the login of the blog park ...

Posted by Izzy1979 on Wed, 10 Jul 2019 10:16:39 -0700

Installation of linux PHP environment

Nginx installation nginx relies on three modules, zlib pcre ssl, which should be installed before installation and ignored if installed Installation by source code: These three extensions do not need to specify the installation directory, they are all installed by default in the / usr/local directory. The first step is to download the sour ...

Posted by riddhi on Sun, 07 Jul 2019 19:51:05 -0700

Nginx configures multiple HTTPS domain names

This article is synchronized with the personal Github blog: https://github.com/johnnian/Blog/issues/8 Welcome to leave a message. Recently, I've been playing the Wechat app. I have the following programs on hand: A Cloud Server: CentOS 7 Multiple primary domain names During the development and testing process, for some reasons, we want to mak ...

Posted by @sh on Mon, 17 Jun 2019 11:41:39 -0700

The source code compiles and updates nginx to the latest version, and starts nginx supporting http2 protocol module.

Recently, due to the migration of code on the company's vm, some problems have been encountered. One VM configures the https protocol. It was thought that after migrating the security certificate, nginx can be configurated. But after modifying the nginx configuration file, after executing the nginx-t command, the following error is reported: n ...

Posted by bigrollerdave on Sun, 16 Jun 2019 14:14:59 -0700

Linux Nginx installation and deployment

Linux Nginx installation and deployment 1. Introduction to Nginx Nginx official website: http://nginx.org/ Nginx is a high-performance HTTP and reverse proxy server, as well as an IMAP/POP3/SMTP server. The purpose of the initial development is to develop proxy email server roommate: Igor Sysoev. The source code conforms to BSD open source. ...

Posted by Grodo on Wed, 12 Jun 2019 11:29:14 -0700

Using OpenSSL to Build CA and Issue Certificates and Revoke Certificates

Experiments OpenSSL is a secure socket layer cryptographic library that includes key and certificate encapsulation management functions and SSL protocols, and provides a wealth of applications for testing or other purposes. OpenSSL is a suite of open source programs, which consists of three parts: first, libcryto, an encryption library with ...

Posted by lancia on Wed, 12 Jun 2019 11:15:40 -0700

ssl protocol and open source implementation of openssl

ssl protocol Secure Socket Layer: Secure Socket Layer, ssl is a set of security protocols, which are called by application layer. When http calls ssl protocol, it is called https. When ftp calls ssl protocol, it is called sftp. lls is a collection of protocols, including: Handshake protocol: including negotiating security parameters and pas ...

Posted by timclaason on Mon, 10 Jun 2019 17:02:40 -0700

Docker Warehouse Harbor Opens TLS Authentication

The company has been using harbor for a long time and has been using http protocol. Recently, it upgraded to version 1.1.2. By the way, it opens https, so record it. Get the installation package You can go to the official Github of the project. Release Publishing Address Download offline installation packages, or download online installation pa ...

Posted by scripterdx on Fri, 31 May 2019 18:05:39 -0700

Semi-automatic Creation of CA and Application Certificate

1 Overview       The reason why this paper calls it semi-automation is that the application for certificates is not a routine work, but only a period of time. At the same time, when creating certificates and method certificates, some parameters need to be adjusted according to the user's needs, such as the validity time of c ...

Posted by blanius on Sat, 25 May 2019 14:30:14 -0700