当前位置:网站首页>Job CE
Job CE
2022-07-28 20:52:00 【Domineering】
ce The first day of homework
1.at Configure in 5 Hours later, , take “This is a at task” write in root Home directory at_test In file
touch a_test
at now + 5 hours
2.crontab To configure , Every Saturday , Sunday 9 Half past six ,14 spot Remind me to go RHCE course write in root Home directory cron_test In file
touch cron_test
crontab -e
33. On two Linux Upper Department chrony service : requirement : The first one synchronizes the time from Alibaba cloud server , The second synchronizes the time from the first
vim /etc/chrony.conf
systemctl enable chronyd
systemctl restart chrond
44. What is symmetric encryption , What is asymmetric encryption , What are the encryption algorithms of symmetric encryption , What encryption algorithms are needed for asymmetric encryption
Symmetric encryption : Both encryption and decryption use the same secret key , The asymmetric key is a pair of keys It consists of public key and private key
The encryption speed of symmetric key is faster than that of asymmetric key , But the security is not as good as asymmetric key , Asymmetric keys ensure a certain degree of security , But the identity of the other party cannot be confirmed , There are also risks .
Symmetric encryption algorithm :DES encryption 、 Information verification code 、AES encryption 、 triple ·DES
Encryption algorithm of asymmetric encryption :RSA、Elgamal、 Knapsack algorithm 、Rabin、D-H、ECC Elliptic curve encryption algorithm
边栏推荐
- 瀚高数据库最佳实践配置工具HG_BP日志采集内容
- JS page black and white background switch JS special effect
- Fragment中使用ViewPager滑动浏览页面
- Speech controlled robot based on ROS (I): realization of basic functions
- Huawei cloud digital asset chain, "chain" connects the digital economy, infinite splendor
- 3D laser slam: Interpretation of logo-loam paper - Introduction
- Algorithm interview high frequency problem solving guide [1]
- 想画一张版权属于你的图吗?AI作画,你也可以
- Unity package project to vs deploy hololens process summary
- 【ADB常用命令及其用法大全(来自[醒不了的星期八]的全面总结)】
猜你喜欢

Unity object path query tool

Classes and objects (medium)

How to make the design of governance structure more flexible when the homogenization token is combined with NFT?

Laser slam:logo-loam --- code compilation, installation and gazebo test

Speech controlled robot based on ROS (I): realization of basic functions

Redis入门二:redhat 6.5安装使用

Redis 3.0源码分析-数据结构与对象 SDS LIST DICT

h5微信射击小游戏源码

作业 ce

Lvs+keepalived high availability deployment practical application
随机推荐
User and group and authority management
Redis入门一:Redis实战读书笔记
Unity makes prefabricated bodies with one key and modifies prefabricated bodies with one key
Redis的三种删除策略以及逐出算法
LVS+KeepAlived高可用部署实战应用
【服务器数据恢复】HP StorageWorks系列存储RAID5两块盘故障离线的数据恢复案例
Mongoose condition queries part of the data of the specified attribute
Voice controlled robot based on ROS (II): implementation of upper computer
关于正则的两道笔试面试题
View the thread stack according to the lwtid of opengauss/mogdb.
PL515 SOT23-5 单/双口 USB 充电协议端口控制器 百盛电子代理商
Random talk on GIS data (VI) - projection coordinate system
Integrating database Ecology: using eventbridge to build CDC applications
Use of DDR3 (axi4) in Xilinx vivado (5) board test
Unity uses shader to quickly make a circular mask
太空射击第14课: 玩家生命
C# 委托 delegate 的理解
Unity performance optimization scheme arrangement
JS fly into JS special effect pop-up login box
瀚高数据库最佳实践配置工具HG_BP日志采集内容