Category:Secure
-
MYSQL8 Security – Audit Management
MYSQL8 Security – Audit Management Audit conceptsI. MYSQL8 open source audit mysql-auditmysql-audit installation and configuration0、Download and unzip the plug-in1, check mysql plugin location2. Upload the library file to the plug-in directory3. Modify my.cnf.4、Installation of plug-ins5. View mysql-audit logsError installing pluginSolution:1. Calculate the offset2. Add the offset to my.cnf3. Adding an offset still reports an error […]
-
[Docker] Docker Use Cases and Future Development, Docker Hub Services, Environment Security
preamble Docker is aOpen source application container engineThe first step in this process is to create a portable container that allows developers to package their application and its dependencies into a portable container and then publish it to any of the popularLinux or WindowsOperating system on the machine, you can also achieve virtualization, containers are […]
-
[Intranet Security – Tunneling] Intranet Penetration_Spp on line (full duplex communication)
catalogs Spp (special protocols on line) 1. Brief description: 2. Usage: 1. Preparation 2. Server 3. Clients 4、cs、msf Spp (special protocols on line) 1. Brief description: 1)Supported protocols:tcp, udp, rudp (reliable udp), ricmp (reliable icmp), rhttp (reliable http), kcp, quic 2)Type of support:Two-way proxy, socks5 forward proxy, socks5 reverse proxy 3)External agency agreementsandinternal forwarding protocolcanfree […]
-
MYSQL8 Security – SSL Authentication
MYSQL8 Security – SSL Authentication SSL ConceptMYSQL Process for Implementing SSLMYSQL Deployment SSl0. SSL Policy1、Creating a certificate2、Configure SSL certificatechecking status 3、Configure SSL usersCreating a User Normal Authentication MethodCreating user-enforced certificate authenticationSetting up mandatory certificate login for users 4. SSL loginSSL encrypted login method 1;SSL Encrypted Login Method 2. SSL Concept SSL (Secure Socket Layer: Secure […]