gpg decryption - Disable interactive password entry

Background description gpg decryption will pop up the following window by default. Please enter the password, but there is a problem in script automation lqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqk x Enter passphrase x x x x ...

Posted on Thu, 04 Jun 2020 11:28:59 -0700 by liquidd

CDH6.3.2 enable Kerberos authentication

Tags (space separated): building big data platform 1: How to install and configure KDC service 2: How to enable Kerberos through CDH 3: How to log in to Kerberos and access Hadoop related services 1: How to install and configure KDC service 1.1 system environment 1. Operating system: CentOS7.5x64 2.CDH6.3.2 3. Use root user fo ...

Posted on Sat, 30 May 2020 08:55:47 -0700 by radhoo

Using redis exporter to monitor the performance of redis cluster

There are three modes of redis cluster: master-slave, sentinel and cluster. About the introduction and deployment of these three modes, other articles also have related introduction. I have completed the deployment of the three modes with reference to other blogs, and the blog address is in the comment area.At present, redis uses the master-sl ...

Posted on Tue, 26 May 2020 04:52:09 -0700 by rawb

IDEA activation code (available in 2100, valid in pro test)

Three steps:   1.Download rar package  2. Replace bin content in the IDEA installation directory with bin content in rar, and then edit idea.exe.vmoptions And IDEA64 exe.vmoptions File, same as editing content Put the last line "- javaagent:". Make sure "- javaagent: copy the full path of the jar file here". For example ...

Posted on Sat, 23 May 2020 07:21:22 -0700 by StumpDK

IDEA activation code (available in 2100, valid in pro test)

Three steps:   1.Download rar package  2. Replace bin content in the IDEA installation directory with bin content in rar, and then edit idea.exe.vmoptions And IDEA64 exe.vmoptions File, same as editing content Put the last line "- javaagent:". Make sure "- javaagent: copy the full path of the jar file here". For example ...

Posted on Sat, 23 May 2020 07:21:24 -0700 by Fsoft

Java server configuration for WeChat official account

WeChat official account development server configuration Because the company web page needs to call the official account number api, so it makes special records. Because the IP address obtained by wechat server is not fixed, you need to call api and configure the server address 1. WeChat public platform configuration To configure the serve ...

Posted on Tue, 19 May 2020 04:40:02 -0700 by werty37

idea installation and cracking are permanent and effective

First, download the idea installation package at the following address Link: https://pan.baidu.com/s/1gVl3WAjC_H6jrH2cjK1paw Extraction code: i2t5   Download the jar package needed for cracking Link: https://pan.baidu.com/s/1mU2OQvqSu3A5RBpySIj0Bw Extraction code: m2xf   Let's start our official attack   Put the cracked jar package ...

Posted on Thu, 07 May 2020 07:45:34 -0700 by TowerOfPower

java AES encryption in Android

1 foreword In java development, encryption is still a very common requirement. There are two common encryption methods: symmetric encryption and asymmetric encryption, which use different encryption and decryption keys. The detailed encryption principle will not be discussed here. AES encryption is widely used in Java ...

Posted on Sat, 02 May 2020 07:56:31 -0700 by phpconnect

Implementation of socket push technology in php

Before the emergence of socket, there had been ajax timing request, long polling and other schemes, but they could not meet the needs, so socket was born. socket basic function socket Summarize the commonly used socket functions Server: socket create create set basic parameters of socket Socket bind binding ip and port number Socket listen Sock ...

Posted on Fri, 01 May 2020 13:22:22 -0700 by richei

Python 3 standard library: hmac password information signature and verification

1. Signature and verification of hmac password information HMAC algorithm can be used to verify the integrity of information, which may be passed between applications, or stored in a place where there may be a security threat. The basic idea is to generate a cryptographic hash of real data and provide a shared secret key. The resulting hash is ...

Posted on Sat, 28 Mar 2020 22:54:06 -0700 by hamzatki