1. Signature and verification of hmac password information
HMAC algorithm can be used to verify the integrity of information, which may be passed between applications, or stored in a place where there may be a security threat. The basic idea is to generate a cryptographic hash of real data and provide a shared secret key. The resulting hash is ...
Posted on Sat, 28 Mar 2020 22:54:06 -0700 by hamzatki
There are many ways to build a complete Internet of things system. Recently, we have been building a set of simplest Internet of things system with python + Alibaba cloud, which can transfer the data on the single chip computer to the PC through Alibaba cloud.
Note: many people will encounter all kinds of problems in the process of learning pyt ...
Posted on Fri, 20 Mar 2020 02:52:52 -0700 by visonardo
Now that you have learned to modify the file, submit the modification to Git version library. Now, practice again. Modify the readme.txt file as follows:
Git is a distributed version control system.
Git is free software distributed under the GPL.
Then try to commit:
$ git add readme.txt
$ git commit -m ...
Posted on Sun, 09 Feb 2020 20:36:26 -0800 by Ice
Setting up development environment
Access to WeChat Public Platform
Fill in server configuration
Verify that the message really came from the WeChat server
Reply to Text Message
Posted on Thu, 23 Jan 2020 21:20:34 -0800 by stig1
In an accident, when crawling a website, the old method is to open the debugging tool to check the request mode, request interception and whether it is asynchronous loading. When I thought the website was very simple, I found that the address and source code of the secondary web page did not correspond
Ajax asynchron ...
Posted on Fri, 17 Jan 2020 23:52:57 -0800 by assonitis
Harm of APK secondary packaging
The secondary packaging of APK is a part of the security risks of Android applications. Generally, it inserts advertising code and related configurations into the applications through decompilation tools, and then publishes them in the third-party application market and forum. The harm of the packaging party to t ...
Posted on Fri, 27 Dec 2019 00:42:00 -0800 by tjbarr
Java fresh e-commerce platform - APP / applet interface transmission common encryption algorithm and detailed explanation
Note: Java fresh e-commerce platform - APP / applet interface transmission common encryption algorithm and detailed explanation, encryption algorithm, is now every software project must use content.
It is widely used in ma ...
Posted on Mon, 23 Dec 2019 20:45:38 -0800 by nomanoma
In the development of WeChat public number, access to jssdk is not necessary, but we can still use it according to business requirements. Here is the method of jssdk for java access that we have sorted out. Here is a record of preparation for access to WeChat JS-SDK. The official network has clear instructions on the functions related to access ...
Posted on Sun, 08 Dec 2019 09:12:25 -0800 by surfnjunkie
hash salt encryption
from werkzeug.security import generate_password_hash,check_password_hash
method = 'pbkdf2:sha1:2000'
salt_length = 8
str_encode = g ...
Posted on Sat, 05 Oct 2019 01:30:38 -0700 by alexweber15
Python Full Stack Development-Common Module Learning
Time & datetime module
re regular expression
1. Introduction of Modules
Module: Used to logically organize Python code (variables, functions, classes, logic: to implement ...
Posted on Sun, 08 Sep 2019 03:14:00 -0700 by anand