Position: Home page » Pool » Bivotong certification machine

Bivotong certification machine

Publish: 2021-04-15 03:27:40
1. There are many brands of SSL certificate that can be purchased. For example, Symantec, GeoTrust, Comodo and rapidssl provided by Anson SSL certificate are good choices. They are international authoritative brands and reliable.
2. Apple's announcement on January 20, 2017 announced that "Apple procts no longer trust wosign CA free SSL certificate G2 intermediate root", which does not mean that it does not trust all wosign certificates. Users who use watcom certificates issued after November 21, 2016 do not have to change their certificates. Related links: https://www.wosign.com/news/announcement-about-Weixin-Action-20170724.htm
3. In fact, the code signature is that the developer signs the code to indicate that the software was developed by me. Main functions: 1. Make sure that the source of the software is trusted. Compare with the following QQ, if the signer is not Tencent, the user will know that the software package is not trusted; 2. Prevent software from being tampered with. You are a good software, very popular, as a result, some unscrupulous hackers add trojan virus to your software package, and then put it on the Internet for people to download, which has damaged your reputation. Do a code signature can prevent people from tampering with your software, once tampered with, windows will find that the summary is not right, it will report an error. By the way, Microsoft is required to run the software must do code signature
in terms of cost performance, the price of Tianwei's foreign certificate is not low, with a code signature of 5000; Jingan seems to have no code signature; It seems that watcom has adjusted its price recently, but it is still cheaper. The code signature is 2888
Oh, there is also the problem of passing 360 detection. Code signature does not pass the detection function, but it allows 360 to quickly identify the identity of software developers. If you make a signature for the Trojan horse and give it to 360 scan, it will not pass.
4. Hello, Guizhou Unicom has been taken as an example. 1) through mobile phone debinding and cancellation: use mobile phone to download Wo pass client (Android, IOS), open the client to enter the personal center, and change the bound mobile phone number to unbind the original number
2) ways of account cancellation in the business hall: if the user cancels the account in the business hall on his own initiative or for some passive reasons such as arrearage, his / her passport account number will be automatically cancelled;
5.
  1. the general anti-virus software is aimed at the function and nature of the software itself

  2. and the signature of digital certificate is to verify the identity of the software developer, improve the reliability of the software and prevent the code from being tampered

  3. if the antivirus software reports a virus, it is likely that the software has been reported recently or has been detected to have a problem, which has nothing to do with the digital certificate. If you have any questions about the software code, you can consult the certificate issuing center< br />

6.

How to apply for SSL certificate? The main steps are as follows:

1. Generate certificate request file CSR

CSR (certificate secure request) is the certificate request file. The first step for the webmaster to apply for SSL certificate is to generate CSR certificate request file. The system will generate two keys, one is the public key, the other is the private key, which is stored on the server. To generate CSR files, webmasters can refer to the documents of web server, general Apache, etc., use OpenSSL command line to generate key + csr2 files, Tomcat, JBoss, resin, etc., use keytool to generate JKS and CSR files, IIS creates a pending request and a CSR file through the wizard

warm reminder: if you are applying for watcom SSL certificate, its digital certificate store https://buy.wosign.com It has been supported that CSR files are automatically generated by the system, and users do not need to generate CSR files on the web server in advance

2. Select CA organization to apply for SSL certificate

CA Organization (certificate authority), which is also called certificate authority, is a trusted third party in e-commerce transactions, and is responsible for the legitimacy inspection of public key in public key system. How to choose CA organization? It is suggested to consider the following points:

(1) it is globally trusted and has passed the WebTrust international certification. SSL certificate is universal and supports more browsers

(2) fast response and 24-hour technical support. Because SSL certificate is related to the safety, credibility and normal operation of the website, as well as the reputation and sales of the website, once there is a problem, it must be solved at the first time, so the service and technical support of Ca manufacturers must be provided 24 hours a day

(3) support Chinese and English. Because most of the domestic websites are for customers who can understand Chinese, supporting Chinese SSL certificate can improve customers' awareness of the company's purchasing SSL certificate to protect its information security and the company's brand influence

(4) high cost performance. Because SSL certificate is a long-term information security basic protection measure for websites, especially e-commerce financial websites, it needs a certain cost, so cost performance should also be considered. Domestic server certificate is sold by the original factory, and there is no agent to earn the middle price difference, so its cost performance is much higher than that of foreign SSL certificate

3. Submit CSR to CA for authentication

CA generally has two authentication methods:

(1) domain name authentication. Generally through the way of administrator mailbox authentication, this way of authentication speed is fast, but the certificate issued does not have the name of the enterprise, only shows the website domain name, that is, we often say the domain name SSL certificate

(2) enterprise document certification. The business license of the enterprise is required

authentication of the above two methods is called EV SSL certificate. EV SSL certificate can make the browser address bar turn green, so authentication is also the most strict. EV SSL certificate is mostly used in finance, e-commerce, securities and other fields with higher requirements for information security protection

4. Obtain SSL certificate and install

after receiving SSL certificate issued by Ca organization, deploy SSL certificate to server, key + cer directly to Apache file, and then modify httpd.conf file; Tomcat and others need to import the certificate cer file issued by Ca into JKS file, it to the server, and then modify server.xml; IIS needs to process the pending request and import the CER file

for the specific graphic tutorial of SSL certificate installation, please visit: webpage link

7. It won't slow down, and it will speed up
1. The client first needs to send its own encryption rules to the server
2. The server determines the encryption algorithm, and then transmits the identity information of the server back to the browser with SSL certificate, including the server IP, public key, certificate authority, etc
3. After obtaining the certificate, the browser verifies the validity of the SSL certificate, such as whether the CA organization is trusted, whether the certificate is expired, and whether the IP of the server is consistent with its own request. After passing the verification, a series of random numbers will be generated, and then the public key in the SSL certificate will be used for encryption. By using the agreed hash to calculate the handshake information, the random number encrypted just now is encrypted again and sent to the server
4. After receiving the information sent by the browser, the server first uses the password to decrypt the handshake information sent by the browser and verify his hash. If it is consistent, the server uses the private key to decrypt the password. After that, a handshake message will be encrypted with a password and sent to the browser again
5. The browser decrypts and calculates the hash of the handshake message. When it is consistent with the message sent by the server, the handshake ends
websites usually go through the above processes after installing SSL certificates, so the overall speed of the website is affected. However, in the actual test, this effect can be ignored, because users can't feel the speed has changed.
8. Since the end of last year, Google has mentioned the websites that use SSL encryption certificate, that is to say, we have seen websites with HTTPS URL prefix, rather than HTTP, will give better weight. As a result, there is a discussion about whether to use SSL for websites at home and abroad. But for websites with general user information transmission, SSL certificate must be used. First, information security; second, users' trust in websites. For our personal website, in view of the cost or learning, we can use free SSL certificate.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750