Variables and encryption in Ansible

1. Variable naming Like most programming languages, ansible’s built-in keywords cannot be used as variable names, including numbers, underscores, and letters. They can only start with underscores or letters. 2. Variable level Global: set from the command line or configuration file paly: set in play and related structures Host: a task consisting of a checklist, […]

Touge-Using RAS encryption and decryption in openssl

Level 1: RSA encryption and decryption Use the OpenSSL command line to implement RSA encryption and decryption of text files. Create a clear text file hello.txt with the content GuetPython Use genrsa to generate a 1024-bit plaintext rsa private key privacy.pem, that is, an unencrypted private key. Use rsa to output the public key file […]

RSA+AES realizes data encryption and transmission

When logging in to the website, users will be asked to enter their username and password. In the payment scenario, they will be asked to enter their bank card number and ID number. These sensitive data may be intercepted, cracked, or tampered with during the transmission process. Even if the website uses the powerful HTTPS […]

SKF toolkit UKEY encryption and decryption JAVA interface calls UKEY DLL/SO driver

Recently, the company needs to develop national encryption and decryption based on the UKEY method. After searching around the Internet, I can only find the only UEKY interface of Longmai Technology, and there are only a few. After a period of exploration, I finally finished writing the test and passed it. (Ukey provided by Haitai […]

Java uses Base64 to implement encryption and decryption of user information, which is equivalent to token

Directory 1 question 2 implementation 1 Question The springboot project needs to implement encryption and decryption of users After the user logs in, the user information is encrypted and stored in a cookie. When the page is accessed later, the cookie is carried to other pages and then decrypted. As long as the cookie expires, […]

Response content encryption and anti-crawling case 1: Obtaining 4K high-definition and uncensored pictures of a certain Jane’s wallpaper

Table of Contents Preface need Destination URL detailed steps 1. Find the data interface 2. Analyze the source of encrypted data 3. Stack backtrace and analyze the function logic 4. Enter the decryption function 5. Generate js encryption logic code 6. Build python code logic Foreword Page flipping and crawling are prohibited. Attacks or distributed […]

Two problems encountered in okhttp post request header post parameter encryption

If you have questions about whether it is necessary to encrypt parameters after using https for network requests, you can read my last article: Network Security https. Remember to read it patiently. Let me talk about the questions below: Caused by: java.lang.IllegalArgumentException: Unexpected char 0x0a At first, I thought it was the okhttp framework that […]