Add programs to firewall exceptions (windos firewall trust items)

using System; using System.Collections.Generic; using System.Diagnostics; using System.IO; using System.Linq; using System.Text; using System.Windows.Forms; namespace Sci { public class FireWall { // Example: FireWall_Allow(); #region Add program to firewall exceptions /// <summary> /// Add the current application to the firewall exceptions /// </summary> public static void FireWall_Allow() { string exePath = Application.ExecutablePath; string ruleName = […]

Implementation of the simple version of the logic algorithm of the game “The Evolution of Trust” (C language)

The Evolution of Trust Website:>The Evolution of Trust (dccxi.com) This article explains how to use C language to implement the logic algorithm of the game “The Evolution of Trust” (the game is interesting and thought-provoking, it is recommended to read this article after playing it) Game rules: First enter the number of each character and […]

ACMG 2.0 supports zero trust network model

Cloud Evangelist In ACMG 2.0, we provide users with two usage modes. The first is the non-intrusive forwarding mode. In this mode, ACMG will not insert proxy objects such as sidecar or proxy into the Pod or Node, but will use the domain name. The traffic is forwarded to the ACMG centralized gateway, allowing the […]

Certificate verification failed: The certificate is NOT trusted

1. Question When installing software, the ubuntu 22.04 system prompts: Certificate verification failed: The certificate is NOT trusted. The certificate chain uses not yet valid certificate. Could not handshake: Error in the certificate verification. After this operation, 19.4 MB of additional disk space will be used. Ign:1 https://mirrors.tuna.tsinghua.edu.cn/ubuntu jammy/main amd64 flex amd64 2.6.4-8build2 Ign:2 https://mirrors.tuna.tsinghua.edu.cn/ubuntu […]

Generate trusted https certificate -use

Configuration to generate CA certificate General diagram: (1), create CA certificate through openssl Step 1:Create a secret key, which is the basis of the CA certificate, and everything after that All come from this secret key # Generate a 2048-bit key through the rsa algorithm openssl genrsa -out myCA.key 2048 The second step: is to […]

Nomad series-Nomad+Traefik+Tailscale integration to achieve zero trust security

Series of articles Nomad series of articles Traefik series of articles Tailscale series of articles Overview Finally, it’s time to get started: Nomad + Traefik + Tailscale integration for zero-trust security. it’s here: Nomad is responsible for container scheduling; (container orchestration tool) Traefik is responsible for ingress traffic; (Ingress tool) Tailscale enables cross-regional connectivity, 4-layer […]

When and How Can We Trust Predictions? Quantifying Unbi

Author: Zen and the Art of Computer Programming 1. Introduction With the rapid development of deep learning technology in recent years, the Transformer model sweeping the NLP field, and the emergence of a large number of annotated data sets and other factors, models based on deep learning are increasingly used in fields such as machine […]

Can we trust our AI algorithms? How well do they reflect

Author: Zen and the Art of Computer Programming 1. Introduction Artificial Intelligence (AI) is one of the most popular technologies in modern society. However, it has become increasingly complex and difficult to understand for a large number of people. In this article, I will discuss some basic concepts related to artificial intelligence (AI ), as […]

Looking at TrustZone-V2.0 from the perspective of hardware architecture and software architecture

Foreword I wrote an article before [Looking at TrustZone from the perspective of hardware architecture and software architecture]. I forgot to publish it on CSDN at the time. I saw this article again recently and felt that there were some things in it that were not included in my article, especially about the memory part. […]

Linux machine configuration trusts Harbor self-signed ssl certificate

Linux machine configuration trusts Harbor self-signed ssl certificate Harbor is a popular open source container image repository that supports storage, signing, scanning and copying of container images. To ensure that communication with Harbor is secure, it is usually configured with SSL/TLS. However, in order to avoid purchasing a certificate or simplify the deployment process, many […]