Practical File Encryption on Linux: OpenSSL and Secure Remote Transmission Guide

Practical File Encryption on Linux: OpenSSL and Secure Remote Transmission Guide

In Linux systems, file encryption is an important means of ensuring data security. Whether for local storage or remote transmission, a reasonable encryption strategy can effectively prevent the leakage of sensitive information. This article will detail file encryption methods on Linux based on OpenSSL 3.5, covering scenarios such as file packaging encryption, single file encryption, … Read more

Compilation Process Record of MySQL Version 8.4.2 on the Feiteng Platform with ARM Architecture

Compilation Process Record of MySQL Version 8.4.2 on the Feiteng Platform with ARM Architecture

As a globally popularMySQL database, it has witnessed the growth ofMySQL from version3.x to the current8.x. The issue known as the2038 problem withMySQL has been resolved since version8.0.28. Recently, I downloaded the latest8.4.2 version and compiled it from source on the minimal Feiteng platform with ARM architecture, documenting some issues encountered during the process. 1.WARN_MISSING_SYSTEM_TIRPC … Read more

Linux | Porting SSH Service to i.MX6ULL Development Board (Chapter 15)

Linux | Porting SSH Service to i.MX6ULL Development Board (Chapter 15)

Click the blue text above to follow us 01. SSH Official Website and Download Links >>> The official download link for OpenSSL is as follows. This is the open-source organization that Luo Yonghao donated 1 million to. https://www.openssl.org/source/ The GitHub download link for OpenSSL is as follows. https://github.com/openssl/openssl The official website for the SSH open-source … Read more

Fundamentals of Blockchain Technology in C Language: Hashing and Encryption

Fundamentals of Blockchain Technology in C Language: Hashing and Encryption

Blockchain technology has garnered significant attention in recent years, with its core focus on data security and immutability. In blockchain, hash functions and encryption algorithms play crucial roles. This article will introduce how to implement basic hashing and encryption functions in C language to help beginners understand these concepts. 1. Introduction to Hash Functions A … Read more

Ansible Solution for Bulk Upgrading OpenSSH and OpenSSL

Ansible Solution for Bulk Upgrading OpenSSH and OpenSSL

Complete Ansible Playbook (<span>upgrade_openssh_openssl.yml</span>) yaml —- name: Upgrade OpenSSH and OpenSSL to fix vulnerabilities hosts: all become: yes serial: 1 # Operate on one host at a time to reduce risk vars: # Target versions (modify according to actual needs) target_openssh_version: "8.9p1" target_openssl_version: "3.0.11" # Fallback versions (for emergency recovery) fallback_openssh_version: "8.4p1" fallback_openssl_version: "1.1.1w" tasks: … Read more

The First Domestic Yocto Project Book: Efficiently Customizing Embedded Linux Systems and Easily Deploying Qt Applications

The First Domestic Yocto Project Book: Efficiently Customizing Embedded Linux Systems and Easily Deploying Qt Applications

01 Modular Build System: The Yocto Project uses the BitBake build tool, allowing developers to easily add, remove, or modify packages, including Qt SDK and OpenSSL. Flexibility and Customizability: Developers can highly customize the system according to project requirements, supporting various hardware architectures and operating system configurations, ensuring that components like Qt and OpenSSL are … Read more

Summary of Vulnerabilities in HTTP/HTTPS Protocols: How to Check and Prevent Them

Summary of Vulnerabilities in HTTP/HTTPS Protocols: How to Check and Prevent Them

The following is a classification and organization of vulnerabilities in the HTTP/HTTPS protocols based on the perspectives of black box testing、white box testing and gray box testing: 1. Black Box Testing (External Perspective, No Internal Access) Definition: Simulates the attacker’s perspective, testing only through external network interfaces without relying on internal system code or configuration … Read more

Avoiding Pitfalls: A Guide for C Programmers

Avoiding Pitfalls: A Guide for C Programmers

In 2014, the open-source library OpenSSL, which supports secure transport layer protocols, revealed a shocking vulnerability in its TLS/DTLS Heartbeat extension, which contained a buffer overflow vulnerability. This is the infamous Heartbleed vulnerability. This vulnerability allowed attackers to obtain encrypted data and steal the keys used for encryption. Since OpenSSL is one of the foundational … Read more

Application of National Encryption Algorithms in Various Platforms

Application of National Encryption Algorithms in Various Platforms

National encryption refers to the domestic encryption algorithms recognized by the National Cryptography Administration. The main algorithms include SM1, SM2, SM3, SM4, and the latest SM9. These algorithms are primarily used in domestic environments as recognized by the National Cryptography Administration. SM2 Algorithm: The SM2 elliptic curve public key cryptography algorithm is a public key … Read more

Applications of C++ in Encryption and Decryption

Applications of C++ in Encryption and Decryption

What Are Encryption and Decryption? Why Do We Need Them? How Does C++ Play a Role? In today’s information age, data security has become a core issue of concern across various industries. Encryption and decryption technologies, as crucial means of protecting data privacy, are ubiquitous. Whether in online payments, social media, or internal corporate communications, … Read more