Is Ligao Sunshine Coast the central region
as for the power supply, it is generally rated at 180W, plus the independent power supply. As for changing the power supply, just think about it. The motherboard of a brand machine only recognizes the power supply of this brand, so it can't be changed
if it's a mini chassis with half the thickness, you can only find a half knife graphics card. Now it's very few. I think I'm worried about the hd7670. I don't know how to continue to ask. Please accept if you are satisfied
2. L = (1.5 * 340) * (3060 / 340) = 4590m
or if the speed of aircraft is 1.5 times the speed of sound, the flight distance of aircraft in the same time is also 1.5 times the distance of sound propagation, that is, 1.5 * 3060 = 4590m.
C3 authentication is mainly e to the user's violation of the "fire coin OTC platform anti-x money and anti KB financing user guide" and the account freezing and withdrawal restrictions caused by triggering the fire coin f control system. Fire coin forbids OTC users to lend their own account to others. Therefore, the information required for fire coin C3 authentication is mostly about proving that you are a real user of the account, such as bank card running water Online shopping records, water and electricity payment records, etc
hotcoin is a bitcoin trading platform, which has obtained round a capital investment of 10 million RMB from Zhenge fund, Dai Zhikang, Sequoia Capital (shareholders of many global well-known companies such as apple and Alibaba). Hotcoin implements strict risk control management and operates stably. As of the end of 2016, the accumulated turnover of fire currency reached 200 billion yuan
on September 15, 2017, huoyuan.com announced that the registration and RMB recharge business will be suspended from now on, and all users will be informed before September 30 that they are about to stop trading. At the same time, all transactions of digital assets against RMB will be graally stopped before October 31
fire coin network will carry out five major business in the world, including fire coin global professional station, fire coin South Korea, fire coin China, fire Coin Wallet, fire coin global dollar station. Among them, fire coin China focuses on blockchain technology R & D and application information, while fire coin Korea and fire coin global dollar station will continue to provide local legal currency to digital currency digital asset trading services

Digital certificate is an electronic document issued by Ca organization. It is a series of numbers that can show the identity information of network users. It provides a way to verify the identity of network users on the computer network. Therefore, digital certificate is also called digital identification
digital certificate encrypts or decrypts the information and data of network users in computer network communication to ensure the integrity and security of information and data
However, it also increases the risk of abusing some sensitive or valuable data Both the buyer and the seller must ensure that all financial transactions concted on the Internet are true and reliable, and that customers, businesses, enterprises and other parties in the transaction have absolute confidence In other words, we must ensure the four elements of network security, namely, the confidentiality of information transmission, the integrity of data exchange, the non repudiation of sending information, and the certainty of the identity of traders
extended data:
digital certificate mainly has the following three characteristics:
first, security. When a user applies for a certificate, there will be two different certificates, which are respectively used for the work computer and for the information interaction of the user. If the computers used are different, the user needs to re obtain the certificate used to verify the computer used by the user, and can not make a backup. In this way, even if someone steals the certificate, the user's account information can not be obtained, and the account information is guaranteed
Second, uniqueness. The digital certificate gives the corresponding access rights according to the user's identity. If the user changes the computer to log in the account, and the user does not have the certificate backup, it is unable to implement the operation, and can only view the account information. The digital certificate is like a "key". The so-called "one key can only open one lock" is the embodiment of its uniqueness Thirdly, convenience. Users can immediately apply for, open and use digital certificate, and can choose the corresponding digital certificate guarantee technology according to the needs of users. Users do not need to master the encryption technology or principle, can directly through the digital certificate for security protection, very convenient and efficientdigital certificate is a series of data that marks the identity information of all parties in network communication, and its function is similar to ID card in real life. It is issued by an authoritative organization, and people can use it to identify each other in communication
the simplest certificate contains a public key, a name and a digital signature of the certificate authority. In general, the certificate also includes the valid time of the key, the name of the issuing authority (certificate authorization center), the serial number of the certificate and other information. The format of the certificate follows the ITU X.509 international standard
a standard X.509 digital certificate contains the following contents:
version information of the certificate
certificate serial number, each certificate has a unique certificate serial number
the signature algorithm used by the certificate
the name of the issuing organization of the certificate, and the naming rules are generally in X.500 format
the validity period of a certificate. Currently, the universal certificate generally adopts UTC time format, and its timing range is 1950-2049
the name of the certificate owner, and the naming rules are generally in X.500 format
the public key of the certificate owner
the signature of the certificate issuer
using digital certificate, a set of strict identity authentication system is established by using symmetric and asymmetric cryptosystems and other cryptographic technologies, so as to ensure that the information is not stolen by others except the sender and receiver; Information will not be tampered in the process of transmission; The sender can confirm the identity of the receiver through the digital certificate; The sender cannot deny his own information
2. Why use digital certificate
e to the Internet e-commerce system technology, online shopping customers can easily obtain the information of businesses and enterprises, but it also increases the risk of abuse of some sensitive or valuable data. Both the buyer and the seller must ensure that all financial transactions on the Internet are true and reliable, and that all parties involved in the transactions, such as customers, businesses and enterprises, have absolute confidence. Therefore, the Internet e-commerce system must ensure that it has very reliable security technology, that is to say, it must ensure the four elements of network security, That is, the confidentiality of information transmission, the integrity of data exchange, the non repudiation of sending information, and the certainty of the identity of traders<
confidentiality of information
business information in a transaction is required to be confidential. If the account number and user name of a credit card are known, it may be stolen, and the ordering and payment information is known by competitors, it may lose business opportunities. Therefore, in the information dissemination of e-commerce, there are generally encryption requirements<
the certainty of the identity of traders
the two sides of online trading are likely to be strangers, thousands of miles apart. To make the transaction successful, the first thing is to confirm the identity of the other party. Businesses should consider whether the client is a liar, and customers will worry that the online store is not a black shop playing with fraud. Therefore, it is the premise to confirm the identity of the other party conveniently and reliably. For banks, credit card companies and sales stores that provide services for customers or users, in order to carry out service activities safely, confidentially and reliably, identity authentication should be carried out. For the relevant sales stores, they do not know the number of the credit card used by the customers. The store can only give the confirmation of the credit card to the bank. Banks and credit card companies can use a variety of confidentiality and identification methods to confirm whether the customer's identity is legal. At the same time, they should also prevent the occurrence of non payment and confirm the order and order receipt information
non repudiation
e to the ever-changing business situation, once a transaction is concluded, it cannot be denied. Otherwise, the interests of one party will be damaged. For example, when ordering gold, the price of gold is lower, but after receiving the order, the price of gold rises. If the receiving party can deny the actual time of receiving the order, or even the fact of receiving the order, the ordering party will suffer losses. Therefore, every link in the process of electronic transaction communication must be undeniable
immutability
e to the ever-changing business situation, once a transaction is concluded, it should not be denied. Otherwise, the interests of one party will be damaged. For example, when ordering gold, the price of gold is lower, but after receiving the order, the price of gold rises. If the receiving party can deny the actual time of receiving the order, or even the fact of receiving the order, the ordering party will suffer losses. Therefore, every link in the process of electronic transaction communication must be undeniable
digital security certificate provides a way to verify identity on the Internet. The security certificate system mainly adopts the public key system, and other technologies include symmetric key encryption, digital signature, digital envelope and so on
we can use digital certificate to establish a set of strict identity authentication system through the use of symmetric and asymmetric cryptography, so as to ensure that the information is not stolen by others except the sender and receiver; Information will not be tampered in the process of transmission; The sender can confirm the identity of the receiver through the digital certificate; The sender cannot deny his own information<
3. Digital authentication principle
digital certificate adopts public key system, that is, a pair of matching keys are used for encryption and decryption. Each user sets a specific private key (private key) which is only known to him, and uses it to decrypt and sign; At the same time, a public key (public key) is set and disclosed by the user, which is shared by a group of users for encryption and signature verification. When sending a confidential file, the sender uses the public key of the receiver to encrypt the data, while the receiver uses its private key to decrypt the data, so that the information can arrive at the destination safely. The encryption process is an irreversible process by digital means, that is, only private key can be used to decrypt
in public key cryptosystem, RSA system is commonly used. Its mathematical principle is to decompose a large number into the proct of two prime numbers. Encryption and decryption use two different keys. Even if plaintext, ciphertext and encryption key (public key) are known, it is computationally impossible to derive decryption key (private key). According to the current level of computer technology, it takes thousands of years to crack the 1024 bit RSA key. Public key technology solves the management problem of key distribution. Merchants can make public their public key and keep their private key. The shopper can encrypt the information with the public key, send it to the merchant safely, and then the merchant can decrypt it with his private key
if the user needs to send encrypted data, the sender needs to use the receiver's digital certificate (public key) to encrypt the data, while the receiver uses its own private key to decrypt the data, so as to ensure the security of the data
in addition, users can realize the integrity and validity of data by digital signature, and only need to encrypt the data by using the private key. Because the private key is only owned by the user, the uniqueness of the signature file can be ensured, that is, the data is sent by the signer himself, and the signer can not deny or can not deny it; The data has not been modified in the process from issuing to receiving, and the issued documents are true
[page]
4. How are digital certificates issued
digital certificates are issued by certification authorities. Root certificate is the foundation of establishing trust relationship between authentication authority and users. Users must download and install digital certificates before using them
authentication center is a management organization that can issue digital certificates to users to confirm their identity. In order to prevent the forgery of digital certificates, the public key of the certification authority must be reliable. The certification authority must publish its public key or provide an electronic certificate to prove the validity of its public key. The latter method leads to the emergence of multi-level certification authority
the issuing process of digital certificate is as follows: users generate their own key pair, and transmit the public key and part of personal identity information to a certification center. After the authentication center verifies the identity, it will perform some necessary steps to make sure that the request is actually sent by the user. Then, the authentication center will send the user a digital certificate, which contains the information of the user and his key, as well as the digital certificate confirming the public key of the authentication center. When users want to prove the validity of their public key, they can provide this digital certificate
5. Encryption technology
because the data may be eavesdropped by the infringer in the process of transmission and lose confidential information, encryption technology is the main security measures adopted by e-commerce, and is the most commonly used security means. Encryption technology is the use of technical means to change important data into garbled code (encryption) transmission, and then restore (decryption) by the same or different means after reaching the destination
encryption includes two elements: algorithm and key. An encryption algorithm is the combination of ordinary text (or understandable information) and a number (key) to generate incomprehensible ciphertext. Key and algorithm are equally important to encryption
key is an algorithm used to encode and decode data. In the process of security, we can ensure the security of information communication through appropriate key encryption technology and management mechanism. The cryptosystem of key encryption technology is divided into symmetric key system and asymmetric key system
correspondingly, data encryption technology can be divided into two categories, namely symmetric encryption (private key encryption) and asymmetric encryption (public key encryption). Symmetric encryption is typically represented by DNS (data encryption standard) algorithm, while asymmetric encryption is usually represented by RSA (Rivest Shamir ad1eman) algorithm. Symmetric encryption key and decryption key are the same, but asymmetric encryption key and decryption key are different. Encryption key can be public, but decryption key needs to be confidential< Symmetric encryption technology
6. Symmetric encryption adopts symmetric cryptography, which is characterized by the same key used for file encryption and decryption, that is, the encryption key can also be used as the decryption key. This method is called symmetric encryption algorithm in cryptography. Symmetric encryption algorithm is easy to use, short key and difficult to decipher. In addition to data encryption standard (DNS), another symmetric key encryption system is international data encryption algorithm (idea). It has better encryption performance than DNS, and it does not require so much computer function. IDEA encryption standard is used by PGP (pretty good privacy) system
Application of symmetric encryption algorithm in e-commerce transaction
