Detailed tutorial on nginx function construction

1, Access control Authentication access based on user name and password Server configuration vim /usr/local/nginx/conf/nginx.conf Add under the location to be verified, taking the root region as an example location / { root html; index index.html index.htm; #Add the following two lines auth_basic "welcome you here"; auth_basic_us ...

Posted by sawade on Sat, 25 Sep 2021 18:07:10 -0700

Add graphic verification code to spring security

preface In the process of using the Spring Security framework, there is often a need to add additional data, such as authentication code, user type, etc. during login authentication. The following describes how to implement it. Note: my project is based on the Spring Boot framework. If it is configured in xml, please study it by yourself. Impl ...

Posted by havenpets on Fri, 24 Sep 2021 21:35:49 -0700

java reflection and vulnerability risk

reflex Reflection plays an irreplaceable role in java. Objects can get their classes through reflection. Classes can get all methods, properties including all private methods through reflection and can be used directly. There are three main ways to get classes: obj.getClass(): An instance of a class, obj, allows you to get its classes dir ...

Posted by emrys404 on Fri, 03 Sep 2021 19:53:52 -0700

Security_Hks_under huks moduleRkc.c Code Commentary Part VI

An overview of this article This is followed by: Security_Hks_under huks moduleRkc.c Code Comments Part OneSecurity_Hks_under huks moduleRkc.c Code Comments Part TwoSecurity_Hks_under huks moduleRkc.c Code Commentary Part ThreeSecurity_Hks_under huks moduleRkc.c Code Comments Part FourSecurity_Hks_under huks moduleRkc.c Code Comments Part ...

Posted by Niko on Fri, 03 Sep 2021 13:37:17 -0700