Typical networking configuration case of H3C S3600 hwtacacs

Networking and description In this case, the S3600 switch is used to deploy hwtacacs and link with IMC TAM to achieve the effect of security management equipment. IMC version is PLAT 7.3 E0506P03 The S3600 version information is as follows: H3C Comware Platform Software Comware Software, Version 5.20 ...

Posted on Sun, 28 Jun 2020 23:03:25 -0400 by MartinGr

generate of Go tools

Go language provides a series of powerful tools, flexible use of which can make our project development easier. The tool set includes the following. bug start a bug report build compile packages and dependencies clean remove object files and cached files doc show documentatio ...

Posted on Thu, 25 Jun 2020 22:36:07 -0400 by sdjensen

Linux system security management

Article catalog 1, Account security control 1.1: basic measures for account security 1.1.1: system account cleaning 1.1.2: password security control 1.1.3: command history, automatic logout 1.2 user switching and rights raising 1.2.1: su command - switch user 1.3: PAM security authentication in Li ...

Posted on Wed, 24 Jun 2020 23:16:52 -0400 by gsaldutti

MySQL merges and splits by specified characters

Merging or splitting by specified characters is a common scenario. MySQL is easier to write in merged characters, but splitting by specified characters is more cumbersome (that is, writing more characters).This article will show examples of merging and splitting by specified characters. 1. Consolidation Group_can be used directly for merging sp ...

Posted on Wed, 24 Jun 2020 22:09:54 -0400 by zggtf211

The new colleague "optimizes" the if else with the strategy mode. The technical director said: can you think about it and then change it?

This article comes from the author's contribution, the original author: God loves apples At present, shell house hunting is my employer in Mordor. I usually focus on some java related technologies. I hope you can find something useful in this article. Personal level is limited. If there is any error in the article, please point it out and commu ...

Posted on Wed, 24 Jun 2020 01:01:04 -0400 by storyboo

Research on JBOSS file free web shell

Author: wide byte securityOriginal link: https://mp.weixin.qq.com/s/_SQS9B7tkL1H5fMIgPTOKwThis article is the author's contribution. Seebug Paper is looking forward to your sharing. If you use it, you will have a gift! Submission email: paper@seebug.org In the previous articles, I mainly studied the file free web shell of tomcat and weblogic. ...

Posted on Tue, 23 Jun 2020 05:12:50 -0400 by wee493

The most easy to understand RSA encryption and decryption Guide

preface RSA encryption algorithm is an asymmetric encryption algorithm. In short, it uses one key for encryption and another key for decryption. Because the encrypted key is public, also known as public key, the decrypted key is not public, so it is called private key. secret key There are many articles about RSA encryption, but almost all of t ...

Posted on Sun, 21 Jun 2020 23:57:48 -0400 by receiver

Shell programming syntax and Application

brief introduction Shell scripts are similar to batch processing under Windows/Dos, that is, they are pre-loaded into a file with various commands to facilitate one-time execution of a program file, mainly for administrator setup or management purposes.However, it is more powerful than batch processing under Windows and more efficient than pro ...

Posted on Sun, 21 Jun 2020 18:11:48 -0400 by theweirdone

[Chapter 1 - knowledge] 2. Performance optimization - Bootchart analysis of Android 7.1 Bug

The author of the original text: a detailed account of the past and the future Article link: link Article catalog What is Bootchart What is it in Android Google introduction Google translation in Chinese Bug solution There is only one truth! What is Bootchart Bootchart is an open source softwa ...

Posted on Tue, 16 Jun 2020 22:35:13 -0400 by pointsplat

Data Structure - Common Sorting Methods

Stability: Two equal data, if the sorting algorithm ensures that its relative position does not change after sorting, we call it a stable sorting algorithm. Example: 23(a) 143(b) after sorting is The result is: 1 2 3(a) 3(b) 4 stable sorting The result is: 1 2 3(b) 3(a) 4 unstable sorting ...

Posted on Tue, 16 Jun 2020 12:39:28 -0400 by evlive