99 pool security check failed
the solution is very simple:
1, upgrade 360 security guard to the latest version
2, completely uninstall the original version and then re install it
3, including configuration files, document storage, and registry information generated ring software installation. These will often affect the effect of secondary clean installation.
HMAC check failure refers to whether the message sent through the insecure channel has been tampered
on the premise that the sender and the receiver share the secret key, HMAC can be used to determine whether the message sent through the insecure channel has been tampered. The sender calculates the hash value of the original data and transmits the original data and the hash value in one message at the same time
the receiver recalculates the hash value of the received message and checks whether the calculated HMAC matches the transmitted HMAC. Because changing the message and regenerating the correct hash value requires a key, any change to the data or hash value results in a mismatch. Therefore, if the original hash value matches the calculated hash value, the message passes authentication
extended data:
background of HMAC:
first, with the continuous development of Internet, network security problems become increasingly prominent. In order to ensure the integrity of the message data received by the receiver, people use message authentication to verify the above properties. At present, there are three main methods for message authentication: message authentication code, hash function and message encryption
1. Message authentication code: it is an algorithm that needs a key. It can authenticate messages of variable length and take the output result as an authenticator
2. Hash function: it maps a message of any length to a hash value of fixed length, and takes the hash value (message digest) as the authenticator
Message encryption: it takes the ciphertext of the whole message as the authenticator In recent years, people are more and more interested in using hash function to design MAC for two reasons:1. The software execution speed of general hash function is faster than that of block cipher
2. The library code of cryptographic hash function comes from many sources
Thirdly, HMAC emerges as the times require. HMAC is a mechanism of message authentication using hash function in cryptography. The message authentication provided by HMAC includes two aspects:1, message integrity authentication: it can prove that the message content has not been modified in the transmission process
2. Source identity authentication: because both sides of communication share the authentication key, the receiver can authenticate the source of sending the data to be consistent with the claimed one, that is, it can reliably confirm that the received message is consistent with the sent one
HMAC is a way of providing authentication service selected by many current security protocols, which is widely used and has withstood the test of various forms of attacks
reference source: network HMAC
reference source: network hmacmd5
2. In recent years, magnetic link, electric donkey and seed download protocols have graally emerged, because Xunlei also supports these protocols by default. Xunlei will take advantage of its own scale and brand privileges to obtain files from those sources first, but electric donkey and magnetic link can not get any benefits from Xunlei, so they will start to take technical measures to counter Xunlei, forcing Xunlei to always be in the state of 99% download, so that the source of seeds, electric donkey and magnetic link can always be in the state of sharing. The solution is to manually pause a few times, and then continue.
The personal center in wechat is in "I" after login
wechat access to personal Center:
1. Enter the account password and click login
development materials:
wechat is a free application for providing instant messaging service for intelligent terminals launched by Tencent on January 21, 2011, which is built by the proct team of Tencent Guangzhou R & D center led by Zhang Xiaolong. Wechat supports the rapid sending of free voice messages, videos, pictures and text through the network across communication operators and operating system platforms