Go and the Secure Shell protocol - 0 views
Snort.Org - 0 views
Tails - Privacy for anyone anywhere - 1 views
Code Signing Guide for Teams - 2 views
Basics - Træfik - 0 views
-
Modifier rules only modify the request. They do not have any impact on routing decisions being made.
-
A frontend consists of a set of rules that determine how incoming requests are forwarded from an entrypoint to a backend.
-
Entrypoints are the network entry points into Træfik
- ...27 more annotations...
Deploy a registry server | Docker Documentation - 0 views
-
By default, secrets are mounted into a service at /run/secrets/<secret-name>
-
docker secret create
-
If you use a distributed storage driver, such as Amazon S3, you can use a fully replicated service. Each worker can write to the storage back-end without causing write conflicts.
- ...10 more annotations...
Getting Started - Fortinet Cookbook - 0 views
NAT Gateways - Amazon Virtual Private Cloud - 0 views
-
a network address translation (NAT) gateway to enable instances in a private subnet to connect to the internet or other AWS services
-
but prevent the internet from initiating a connection with those instances
-
NAT gateways are not supported for IPv6 traffic
- ...11 more annotations...
VPCs and Subnets - Amazon Virtual Private Cloud - 0 views
-
you must specify a range of IPv4 addresses for the VPC in the form of a Classless Inter-Domain Routing (CIDR) block
-
A VPC spans all the Availability Zones in the region
-
add one or more subnets in each Availability Zone.
- ...19 more annotations...
How It Works - Let's Encrypt - Free SSL/TLS Certificates - 0 views
-
The objective of Let’s Encrypt and the ACME protocol is to make it possible to set up an HTTPS server and have it automatically obtain a browser-trusted certificate, without any human intervention.
-
First, the agent proves to the CA that the web server controls a domain.
-
Then, the agent can request, renew, and revoke certificates for that domain.
- ...4 more annotations...
phusion/baseimage-docker - 1 views
-
-
docker exec
-
Through SSH
- ...57 more annotations...
Storing Sessions in a Database, by Chris Shiflett - 0 views
-
to store sessions in a database rather than the filesystem
-
server affinity (methods that direct requests from the same client to the same server)
-
store sessions in a central database that is common to all servers
- ...6 more annotations...
SSL/TLS协议运行机制的概述 - 阮一峰的网络日志 - 0 views
-
客户端先向服务器端索要公钥,然后用公钥加密信息,服务器收到密文后,用自己的私钥解密。
-
互联网加密通信协议的历史,几乎与互联网一样长。
-
将公钥放在数字证书中。只要证书是可信的,公钥就是可信的。
- ...20 more annotations...
What is a CSR (Certificate Signing Request)? - 0 views
-
usually generated on the server where the certificate will be installed and contains information that will be included in the certificate such as the organization name, common name (domain name), locality, and country.
-
A private key is usually created at the same time that you create the CSR, making a key pair.
-
CSR or Certificate Signing request is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate
- ...6 more annotations...
SSL Certificate Features - 0 views
-
A certificate authority issues certificates in the form of a tree structure.
-
All certificates below the root certificate inherit the trustworthiness of the root certificate.
-
Any certificate signed by a trusted root certificate will also be trusted.
- ...9 more annotations...
Glossary - CircleCI - 0 views
-
User authentication may use LDAP for an instance of the CircleCI application that is installed on your private server or cloud
-
The first user to log into a private installation of CircleCI
-
Contexts provide a mechanism for securing and sharing environment variables across projects.
- ...22 more annotations...
« First
‹ Previous
61 - 80 of 103
Next ›
Last »
Showing 20▼ items per page