 Ubuntu Desktop Guideout of range or the network might be hidden. 3. If the network is protected by a password (encryption key), enter the password when prompted and click Connect. If you do not know the key, it may select Connect to Hidden Wireless Network. Wireless Security Security This defines what sort of encryption your wireless network uses. Encrypted connections help protect your wireless connection from other people can't "listen in" and see what websites you're visiting and so on. Some types of encryption are stronger than others, but may not be supported by older wireless networking equipment.0 码力 | 1709 页 | 5.81 MB | 1 年前3 Ubuntu Desktop Guideout of range or the network might be hidden. 3. If the network is protected by a password (encryption key), enter the password when prompted and click Connect. If you do not know the key, it may select Connect to Hidden Wireless Network. Wireless Security Security This defines what sort of encryption your wireless network uses. Encrypted connections help protect your wireless connection from other people can't "listen in" and see what websites you're visiting and so on. Some types of encryption are stronger than others, but may not be supported by older wireless networking equipment.0 码力 | 1709 页 | 5.81 MB | 1 年前3
 This Debian Reference (version 2.109) . . . . . 173 9.9 Data encryption tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 9.9.1 Removable disk encryption with dm-crypt/LUKS . . forensic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 9.25 List of data encryption utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . the following. • Login name • Encrypted password (The initial ”$1$” indicates use of the MD5 encryption. The ”*” indicates no login.) • Date of the last password change, expressed as the number of days0 码力 | 266 页 | 1.25 MB | 1 年前3 This Debian Reference (version 2.109) . . . . . 173 9.9 Data encryption tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173 9.9.1 Removable disk encryption with dm-crypt/LUKS . . forensic analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 9.25 List of data encryption utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . the following. • Login name • Encrypted password (The initial ”$1$” indicates use of the MD5 encryption. The ”*” indicates no login.) • Date of the last password change, expressed as the number of days0 码力 | 266 页 | 1.25 MB | 1 年前3
 Zabbix 6.0 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web OpenSSL 3.0 support OpenSSL 3.0.x is now supported. Note that this change does not affect frontend encryption (which uses its own openssl-php package) and Java gateway JMX encrypted connections to monitoring0 码力 | 1681 页 | 23.19 MB | 1 年前3 Zabbix 6.0 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 678 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web OpenSSL 3.0 support OpenSSL 3.0.x is now supported. Note that this change does not affect frontend encryption (which uses its own openssl-php package) and Java gateway JMX encrypted connections to monitoring0 码力 | 1681 页 | 23.19 MB | 1 年前3
 Zabbix 6.2 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 17. Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web about a Docker container. Encrypted MongoDB plugin connection MongoDB plugin now supports TLS encryption when connecting to MongoDB using named sessions. Updated plugin (MongoDB plugin 1.2.1) is included0 码力 | 1689 页 | 22.82 MB | 1 年前3 Zabbix 6.2 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 17. Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web about a Docker container. Encrypted MongoDB plugin connection MongoDB plugin now supports TLS encryption when connecting to MongoDB using named sessions. Updated plugin (MongoDB plugin 1.2.1) is included0 码力 | 1689 页 | 22.82 MB | 1 年前3
 Referência Debian v2.124mensagem de email consiste em três componentes, o envelope da mensagem, o cabeçalho da mensagem e o corpo da mensagem. • A informação ”To” e ”From” no envelope da mensagem é utilizada pelo SMTP para entregar entregar o email. (A informação de ”From” no envelope da mensagem também é chamada de endereço bounce, From_, etc.). • A informação ”To” e ”From” no cabeçalho da mensagem é mostrada pelo cliente de email. (Embora seja vulgar que sejam os mesmo do envelope da mensagem nem sempre é o caso.) • The email message format covering header and body data is extended by Multipurpose Internet Mail Extensions (MIME)0 码力 | 281 页 | 1.39 MB | 1 年前3 Referência Debian v2.124mensagem de email consiste em três componentes, o envelope da mensagem, o cabeçalho da mensagem e o corpo da mensagem. • A informação ”To” e ”From” no envelope da mensagem é utilizada pelo SMTP para entregar entregar o email. (A informação de ”From” no envelope da mensagem também é chamada de endereço bounce, From_, etc.). • A informação ”To” e ”From” no cabeçalho da mensagem é mostrada pelo cliente de email. (Embora seja vulgar que sejam os mesmo do envelope da mensagem nem sempre é o caso.) • The email message format covering header and body data is extended by Multipurpose Internet Mail Extensions (MIME)0 码力 | 281 页 | 1.39 MB | 1 年前3
 Zabbix 6.4 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web RS256 A new sign(hash,key,data) JavaScript function has been implemented allowing to use the RS256 encryption algorithm to calculate the signature. For more details see: Additional JavaScript objects. 70 码力 | 1885 页 | 29.12 MB | 1 年前3 Zabbix 6.4 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 663 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web RS256 A new sign(hash,key,data) JavaScript function has been implemented allowing to use the RS256 encryption algorithm to calculate the signature. For more details see: Additional JavaScript objects. 70 码力 | 1885 页 | 29.12 MB | 1 年前3
 Zabbix 7.0 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web behavior is the same. Zabbix agent 2 is only specifically named where its functionality differs. encryption - support of encrypted communications between Zabbix components (server, proxy, agent, zabbix_sender0 码力 | 1949 页 | 31.91 MB | 1 年前3 Zabbix 7.0 Manual. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655 17 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . monitoring deals with the possibilities of using Zabbix in larger and more complex environments. Encryption helps explaining the possibilities of encrypting communications between Zabbix components. Web behavior is the same. Zabbix agent 2 is only specifically named where its functionality differs. encryption - support of encrypted communications between Zabbix components (server, proxy, agent, zabbix_sender0 码力 | 1949 页 | 31.91 MB | 1 年前3
 Zabbix 6.0 ManualRS256 A new sign(hash,key,data) JavaScript function has been implemented allowing to use the RS256 encryption algorithm to calculate the signature. For more details see: Additional JavaScript objects. 21 parameters: • Connection-related parameters: broker URL, topic, username, and password; • TLS encryption parameters: location of the top-level CA(s) certificate, MQTT certificate or certificate chain using MariaDB Connector/C library, thus enabling the encryption of connection to MySQL using the DBTLSConnect parameter. The supported encryption values are ”required” and ”verify_full”. 26 What’s new0 码力 | 1741 页 | 22.78 MB | 1 年前3 Zabbix 6.0 ManualRS256 A new sign(hash,key,data) JavaScript function has been implemented allowing to use the RS256 encryption algorithm to calculate the signature. For more details see: Additional JavaScript objects. 21 parameters: • Connection-related parameters: broker URL, topic, username, and password; • TLS encryption parameters: location of the top-level CA(s) certificate, MQTT certificate or certificate chain using MariaDB Connector/C library, thus enabling the encryption of connection to MySQL using the DBTLSConnect parameter. The supported encryption values are ”required” and ”verify_full”. 26 What’s new0 码力 | 1741 页 | 22.78 MB | 1 年前3
 Zabbix 7.0 中文手册共享许多功能,所以如果功能行为相同,文档中的术语”Zabbix agent” 同时代表 Zabbix agent 和 Zabbix agent 2。Zabbix agent 2 仅在其功能不同的地方特别命名。 encryption(加密) - 使用传输层安全 (TLS) 协议 支持 Zabbix 组件(server,proxy,agent,zabbix_sender 和 zabbix_get 实用程序)之间的加密通信。 Zabbix 的安装将无法继续。 配置数据库连通性 请在该页面输入连接到数据库所需的详细信息。在创建与数据库的连接前,Zabbix 数据库必须先被创建。 若选择 Database TLS encryption 选项,则需要在出现的信息栏中填写有关configuring the TLS connection的配置信息(该功能仅限数 据库类型为 MySQL 或 PostgreSQL)。若选择 HashiCorp net-snmp 不支持 AES192/AES256。另请参阅:http://www.net- snmp.org/wiki/index.php/Strong_Authentication_or_Encryption 确认 在这两个示例中,您将在 “/var/lib/zabbix/snmptraps/snmptraps.log” 中看到类似的行: 2024-01-30T10:04:23+0200 ZBXTRAP0 码力 | 1951 页 | 33.43 MB | 1 年前3 Zabbix 7.0 中文手册共享许多功能,所以如果功能行为相同,文档中的术语”Zabbix agent” 同时代表 Zabbix agent 和 Zabbix agent 2。Zabbix agent 2 仅在其功能不同的地方特别命名。 encryption(加密) - 使用传输层安全 (TLS) 协议 支持 Zabbix 组件(server,proxy,agent,zabbix_sender 和 zabbix_get 实用程序)之间的加密通信。 Zabbix 的安装将无法继续。 配置数据库连通性 请在该页面输入连接到数据库所需的详细信息。在创建与数据库的连接前,Zabbix 数据库必须先被创建。 若选择 Database TLS encryption 选项,则需要在出现的信息栏中填写有关configuring the TLS connection的配置信息(该功能仅限数 据库类型为 MySQL 或 PostgreSQL)。若选择 HashiCorp net-snmp 不支持 AES192/AES256。另请参阅:http://www.net- snmp.org/wiki/index.php/Strong_Authentication_or_Encryption 确认 在这两个示例中,您将在 “/var/lib/zabbix/snmptraps/snmptraps.log” 中看到类似的行: 2024-01-30T10:04:23+0200 ZBXTRAP0 码力 | 1951 页 | 33.43 MB | 1 年前3
 Cilium v1.10 DocumentationUsing kube-router to run BGP Using BIRD to run BGP IPVLAN based Networking (beta) Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1307 页 | 19.26 MB | 1 年前3 Cilium v1.10 DocumentationUsing kube-router to run BGP Using BIRD to run BGP IPVLAN based Networking (beta) Transparent Encryption Host-Reachable Services Kubernetes Without kube-proxy Bandwidth Manager (beta) Kata Containers the AWS VPC CNI plugin in order to enforce network policies, perform load-balancing and provide encryption. Note Some advanced Cilium features may be limited when chaining with other CNI plugins, such Policy (see GitHub issue 12454 [https://github.com/cilium/cilium/issues/12454]) IPsec Transparent Encryption (see GitHub issue 15596 [https://github.com/cilium/cilium/issues/15596]) Important Please ensure0 码力 | 1307 页 | 19.26 MB | 1 年前3
共 87 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9














