积分充值
 首页
前端开发
AngularDartElectronFlutterHTML/CSSJavaScriptReactSvelteTypeScriptVue.js构建工具
后端开发
.NetC#C++C语言DenoffmpegGoIdrisJavaJuliaKotlinLeanMakefilenimNode.jsPascalPHPPythonRISC-VRubyRustSwiftUML其它语言区块链开发测试微服务敏捷开发架构设计汇编语言
数据库
Apache DorisApache HBaseCassandraClickHouseFirebirdGreenplumMongoDBMySQLPieCloudDBPostgreSQLRedisSQLSQLiteTiDBVitess数据库中间件数据库工具数据库设计
系统运维
AndroidDevOpshttpdJenkinsLinuxPrometheusTraefikZabbix存储网络与安全
云计算&大数据
Apache APISIXApache FlinkApache KarafApache KyuubiApache OzonedaprDockerHadoopHarborIstioKubernetesOpenShiftPandasrancherRocketMQServerlessService MeshVirtualBoxVMWare云原生CNCF机器学习边缘计算
综合其他
BlenderGIMPKiCadKritaWeblate产品与服务人工智能亿图数据可视化版本控制笔试面试
文库资料
前端
AngularAnt DesignBabelBootstrapChart.jsCSS3EchartsElectronHighchartsHTML/CSSHTML5JavaScriptJerryScriptJestReactSassTypeScriptVue前端工具小程序
后端
.NETApacheC/C++C#CMakeCrystalDartDenoDjangoDubboErlangFastifyFlaskGinGoGoFrameGuzzleIrisJavaJuliaLispLLVMLuaMatplotlibMicronautnimNode.jsPerlPHPPythonQtRPCRubyRustR语言ScalaShellVlangwasmYewZephirZig算法
移动端
AndroidAPP工具FlutterFramework7HarmonyHippyIoniciOSkotlinNativeObject-CPWAReactSwiftuni-appWeex
数据库
ApacheArangoDBCassandraClickHouseCouchDBCrateDBDB2DocumentDBDorisDragonflyDBEdgeDBetcdFirebirdGaussDBGraphGreenPlumHStreamDBHugeGraphimmudbIndexedDBInfluxDBIoTDBKey-ValueKitDBLevelDBM3DBMatrixOneMilvusMongoDBMySQLNavicatNebulaNewSQLNoSQLOceanBaseOpenTSDBOracleOrientDBPostgreSQLPrestoDBQuestDBRedisRocksDBSequoiaDBServerSkytableSQLSQLiteTiDBTiKVTimescaleDBYugabyteDB关系型数据库数据库数据库ORM数据库中间件数据库工具时序数据库
云计算&大数据
ActiveMQAerakiAgentAlluxioAntreaApacheApache APISIXAPISIXBFEBitBookKeeperChaosChoerodonCiliumCloudStackConsulDaprDataEaseDC/OSDockerDrillDruidElasticJobElasticSearchEnvoyErdaFlinkFluentGrafanaHadoopHarborHelmHudiInLongKafkaKnativeKongKubeCubeKubeEdgeKubeflowKubeOperatorKubernetesKubeSphereKubeVelaKumaKylinLibcloudLinkerdLonghornMeiliSearchMeshNacosNATSOKDOpenOpenEBSOpenKruiseOpenPitrixOpenSearchOpenStackOpenTracingOzonePaddlePaddlePolicyPulsarPyTorchRainbondRancherRediSearchScikit-learnServerlessShardingSphereShenYuSparkStormSupersetXuperChainZadig云原生CNCF人工智能区块链数据挖掘机器学习深度学习算法工程边缘计算
UI&美工&设计
BlenderKritaSketchUI设计
网络&系统&运维
AnsibleApacheAWKCeleryCephCI/CDCurveDevOpsGoCDHAProxyIstioJenkinsJumpServerLinuxMacNginxOpenRestyPrometheusServertraefikTrafficUnixWindowsZabbixZipkin安全防护系统内核网络运维监控
综合其它
文章资讯
 上传文档  发布文章  登录账户
IT文库
  • 综合
  • 文档
  • 文章

无数据

分类

全部数据库(77)PostgreSQL(40)数据库中间件(13)Greenplum(11)TiDB(8)Vitess(2)Firebird(1)Apache HBase(1)SQLite(1)

语言

全部英语(64)中文(简体)(13)

格式

全部PDF文档 PDF(77)
 
本次搜索耗时 0.360 秒,为您找到相关结果约 77 个.
  • 全部
  • 数据库
  • PostgreSQL
  • 数据库中间件
  • Greenplum
  • TiDB
  • Vitess
  • Firebird
  • Apache HBase
  • SQLite
  • 全部
  • 英语
  • 中文(简体)
  • 全部
  • PDF文档 PDF
  • 默认排序
  • 最新排序
  • 页数排序
  • 大小排序
  • 全部时间
  • 最近一天
  • 最近一周
  • 最近一个月
  • 最近三个月
  • 最近半年
  • 最近一年
  • pdf文档 Pentest-Report Vitess 02.2019

    user table. Thus, this issue has a rather low impact. The MySQL authentication uses hashing and a salt in order to prevent authenticating with only a hash or replaying a previously recorded authentication sha1(sha1(pw)) Server -> Client: salt (randomly generated for each connection attempt) Client -> Server: sha1(pw) ^ sha1(salt + sha1(sha1(pw))) Server computes: sha1(client_response ^ sha1(salt + sha1(sha1(pw))) Server the password hash is not known to an attacker, a timing attack is not possible. This is because the salt is never reused and causes unpredictable changes. If the attacker has retrieved the stored password
    0 码力 | 9 页 | 155.02 KB | 1 年前
    3
  • pdf文档 微信 SQLite 数据库 损坏恢复实践

    10 13 12 Page (定长) B-tree 2 7 9 B-tree Header (100 – 16 bytes) SQLite Header Magic / KDF Salt (16 bytes) sqlite_master 表根节点 (PageSize – 100 bytes) Page 1 sqlite_master 节点 sqlite_master INDEX 语句 初始化流程 打开文件 读取 Salt,根据密钥生成 Key 解码 Page 1,读取 Header 解析 sqlite_master,生成 Schema 关键数据 打开文件 读取 Salt,根据密钥生成 Key 解码 Page 1,读取 Header 解析 sqlite_master,生成 Schema Salt 【用于正确解密】 Page Size 【正确划分Page】 【正确划分Page】 root_page、SQL 【正确访问表数据】 ◊ 序列化备份关键数据 ◊ 时机: Schema 改变时 ◊ 内容: KDF Salt、PageSize、sqlite_master ◊ 开销: 12 kB、10 ms ◊ ~350 个 table/index Master Backup ◊ 最小化系统 ◊ 读数据,写新DB ◊ 只包含核心逻辑 ◊ 高度容错 ◊
    0 码力 | 31 页 | 546.35 KB | 1 年前
    3
  • pdf文档 Vitess security audit

    069c35c2820e1bf33324f27c3fb5852f1/go/mysql/a uth_server.go#L251 func ScrambleMysqlNativePassword(salt, password []byte) []byte { if len(password) == 0 { return nil } // stage1Hash = SHA1(password) Sum(nil) // scrambleHash = SHA1(salt + SHA1(stage1Hash)) // inner Hash crypt.Reset() crypt.Write(stage1) hash := crypt.Sum(nil) // outer Hash crypt.Reset() crypt.Write(salt) crypt.Write(hash) scramble :=
    0 码力 | 41 页 | 1.10 MB | 1 年前
    3
  • pdf文档 HBase基本介绍

    列列族数量量 1-3 • 每个region⼤大⼩小 10G-50G • 每个cell⼤大⼩小 10M Schema设计 Schema设计 OpenTSDB 存监控指标的时序数据库 [salt][... RowKey: Column Qualifier: RowKey: Column Qualifier: ⻥鱼和熊掌不不可兼得: 冗余 Schema设计 有趣的操作 • 倒序域名: com.google.cloud 利利于压缩空间 • 加盐salt: 防⽌止出现热点 • 倒序时间戳 Long.Max - timestamp • 官⽅方⽂文档 • MapR HBase architecture • HFile结构解析 • Google
    0 码力 | 33 页 | 4.86 MB | 1 年前
    3
  • pdf文档 PostgreSQL 8.3 Documentation

    ...............................................................................1988 F.20.2.2. gen_salt() ....................................................................................1989 F.20.3 the server. It first MD5 encrypts it based on the user name, and then encrypts it based on a random salt sent by the server when the database connection was made. It is this double-encrypted value that is different user if you need to do that.) Because MD5-encrypted passwords use the role name as cryptographic salt, renaming a role clears its password if the password is MD5-encrypted. The remaining variants change
    0 码力 | 2143 页 | 4.58 MB | 1 年前
    3
  • pdf文档 PostgreSQL 8.3 Documentation

    ...............................................................................1871 F.20.2.2. gen_salt() .............................................................................1872 F.20.3. PGP encryption the server. It first MD5 encrypts it based on the user name, and then encrypts it based on a random salt sent by the server when the database connection was made. It is this double- encrypted value that different user if you need to do that.) Because MD5-encrypted passwords use the role name as cryptographic salt, renaming a role clears its password if the password is MD5- encrypted. The remaining variants change
    0 码力 | 2015 页 | 4.54 MB | 1 年前
    3
  • pdf文档 PostgreSQL 8.4 Documentation

    ........................................................................2073 xliv F.23.2.2. gen_salt() .............................................................................2073 F.23.3. PGP encryption the server. It first MD5 encrypts it based on the user name, and then encrypts it based on a random salt sent by the server when the database connection was made. It is this double- encrypted value that must be configured for the server’s user name, not the client’s. Because md5 uses the user name as salt on both the client and server, md5 cannot be used with db_user_namespace. Note: This feature is intended
    0 码力 | 2224 页 | 5.05 MB | 1 年前
    3
  • pdf文档 PostgreSQL 8.4 Documentation

    ...............................................................................2209 F.23.2.2. gen_salt() ....................................................................................2209 F.23.3 the server. It first MD5 encrypts it based on the user name, and then encrypts it based on a random salt sent by the server when the database connection was made. It is this double-encrypted value that is must be con- figured for the server’s user name, not the client’s. Because md5 uses the user name as salt on both the client and server, md5 cannot be used with db_user_namespace. Note: This feature is intended
    0 码力 | 2371 页 | 5.09 MB | 1 年前
    3
  • pdf文档 firebird 40 language reference

    Result type VARBINARY Syntax RSA_SIGN_HASH (message_digest KEY private_key [HASH ] [SALT_LENGTH salt_length] [PKCS_1_5]) ::= MD5 | SHA1 | SHA256 | SHA512 Table 205. RSA_SIGN_HASH Function default is SHA256. This should be the same hash as used to generate message_digest. salt_length Length of the desired salt in bytes; default is 8; minimum 1, maximum 32. The recommended value is between Syntax RSA_VERIFY_HASH (message_digest SIGNATURE signature KEY public_key [HASH ] [SALT_LENGTH salt_length] Chapter 8. Built-in Scalar Functions 489 [PKCS_1_5]) ::= MD5 | SHA1 | SHA256
    0 码力 | 778 页 | 3.43 MB | 1 年前
    3
  • pdf文档 PostgreSQL 9.0 Documentation

    ...............................................................................2238 F.25.2.2. gen_salt() .............................................................................2238 F.25.3. PGP encryption the server. It first MD5-encrypts it based on the user name, and then encrypts it based on a random salt sent by the server when the database connection was made. It is this double- encrypted value that must be configured for the server’s user name, not the client’s. Because md5 uses the user name as salt on both the client and server, md5 cannot be used with db_user_namespace. Note: This feature is intended
    0 码力 | 2401 页 | 5.50 MB | 1 年前
    3
共 77 条
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 8
前往
页
相关搜索词
PentestReportVitess02.2019微信SQLSQLite数据据库数据库损坏恢复实践securityauditHBase基本介绍PostgreSQL8.3Documentation8.4firebird40languagereference9.0
IT文库
关于我们 文库协议 联系我们 意见反馈 免责声明
本站文档数据由用户上传或本站整理自互联网,不以营利为目的,供所有人免费下载和学习使用。如侵犯您的权益,请联系我们进行删除。
IT文库 ©1024 - 2025 | 站点地图
Powered By MOREDOC AI v3.3.0-beta.70
  • 关注我们的公众号【刻舟求荐】,给您不一样的精彩
    关注我们的公众号【刻舟求荐】,给您不一样的精彩