2.www.k8k8.com

www.k8k8.com  时间:2021-03-20  阅读:()
TITLE:PracticalCryptography:PrivacyforBusinessandE-commerceINSTRUCTOR:FrederickM.
Avolio,independentsecurityconsultantSUMMARYOFTOPICS:UpFront—DefiningTermsBasicsofCryptography—typesandmethods,Applications—PrivateMessaging(E-mail)FilesandDirectoriesStrongUserAuthenticationVirtualPrivateNetworksWebSitesElectronicCommerceNextSteps1PracticalCryptography:AnOverviewFrederickM.
Avolio7/13/98Copyright1998FrederickM.
Avolio2Shameless(butbrief)MarketingAvolioConsulting,http://www.
avolio.
com/–NetworkandcomputersecurityTrainingPolicyandProceduredevelopmentProductReviewandAnalysis–ProductMarketing,technicalassistance–E-mailsystemdesign,configuration,andtraining–Writing:whitepapers,tutorials,productreviews7/13/98Copyright1998FrederickM.
Avolio3SyllabusDefiningTermsBasicsofCryptographyPrivateMessaging(E-mail)FilesandDirectoriesStrongUserAuthenticationVirtualPrivateNetworksWebSitesElectronicCommerce7/13/98Copyright1998FrederickM.
Avolio4DefiningTermsConcernFraudUnauthorizedaccessSnoopingMessageAlterationDisavowalRequirementAuthenticationAuthorizationPrivacyDataIntegrityNon-RepudiationFromUnderstandingDigitalSignaturesbyGailGrant,McGraw-Hill,19977/13/98Copyright1998FrederickM.
Avolio5AuthenticationandIntegrityGuaranteetoReceiverKnowsidentityofsenderMessagenotalteredNotundulydelayedFromInternetSecuritypresentationatWICSbyWhitDiffie7/13/98Copyright1998FrederickM.
Avolio6PrivacyorConfidentialityGuaranteetoSenderAuthorizedreceiversonlyFromInternetSecuritypresentationatWICSbyWhitDiffie7/13/98Copyright1998FrederickM.
Avolio7BusinessNeedsforCryptoPrivacyMostbusinesses(andgovernments)don'tneedlong-termsecurityMailinglists,businessplans,negotiations,productR&DCommerceprivacyneedsaremoderateFinancialinformationmightneedtobesecureforadecadeExceptionsareembarrassments:personal,political,businessFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio8BusinessNeedsforCryptoAuthenticationAuthenticatingsessionsversustransactionsNeedforaudittraildependsonapplicationAudittrailmustbeusableincourtwhilenotcompromisingthefuturesecurityofthesystemFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio9BasicCryptographySecretkeyorsymmetricencryptionPublickeyorassymmetricencryptionOne-wayhashfunctions7/13/98Copyright1998FrederickM.
Avolio10EncryptionSecret-Key(Symmetric)Nowisthetimeforallgoodmen.
.
.
sd84$2*q}59(o32nvt-=gf]|@l^.
.
.
DecryptionEncryptionNowisthetimeforallgoodmen.
.
.
7/13/98Copyright1998FrederickM.
Avolio11EncryptionSecret-Key(Symmetric)BobencryptshismessagestoTedwiththeirsharedsecretkeyTeddecryptsmessagesfromBobwiththesamesecretkey.
7/13/98Copyright1998FrederickM.
Avolio12EncryptionSecret-Key(Symmetric)BobdecryptsTed'smessagesusingtheirsecretkey.
TedsendsmessagesbacktoBobwiththesamesecretkey.
7/13/98Copyright1998FrederickM.
Avolio13EncryptionPublic-Key(Asymmetric)Nowisthetimeforallgoodmen.
.
.
sd84$2*q}59(o32nvt-=gf]|@l^.
.
.
DecryptionEncryptionNowisthetimeforallgoodmen.
.
.
7/13/98Copyright1998FrederickM.
Avolio14EncryptionPublic-Key(Asymmetric)Carol,Ted,Bob,andAliceposttheirpublickeysandkeeptheirprivatekeyssecret7/13/98Copyright1998FrederickM.
Avolio15EncryptionPublic-Key(Asymmetric)TedBobAliceCarol'sPublicKeyCarol'sPublicKeyCarol'sPublicKeyCaroldecryptsthesemessagesusingherprivatekey7/13/98Copyright1998FrederickM.
Avolio16EncryptionPublic-Key(Asymmetric)Ted'spublickeyBob'spublickeyAlice'spublickeyCarolrepliestomessagesusingeachrecipient'spublickeyTedBobAliceTed'sprivatekeyBob'sprivatekeyAlice'sprivatekey7/13/98Copyright1998FrederickM.
Avolio17HashFunctionsConvertsastringofdataofanysizeintoafixed-lengthhashNowaytogobackwardsE.
g.
,afingerprintChancesofanytwostringsofdatahashingtothesamevaluevery,verysmall.
Thisisveryimportant!
7/13/98Copyright1998FrederickM.
Avolio18HashFunctionsMD5Messagetextofarbitrarysize.
.
.
MessageTextHashofMessageofshort,fixedsize7/13/98Copyright1998FrederickM.
Avolio19SecurityProblemsSolvedbyCryptographyPrivacyofstoreddata,messages,andconversationsSecureelectroniccommerceTransactionnon-repudiationUseranddataauthenticationE-mailsecurityMulti-partycontrolSecureauditlogsFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio20ApplicationExamplesE-mailUserAuthenticationPrivacyforFilesandDirectoriesVirtualPrivateNetworksWebSiteSecurity7/13/98Copyright1998FrederickM.
Avolio21PrivateE-mailTheGoalsConfidentialityAuthenticationNon-repudiationSecuringE-mailaswellorbetterthanpostalmail!
7/13/98Copyright1998FrederickM.
Avolio22IntegrityandAuthentication1.
MessageSignatureMD5RSANowisthetimeforallgoodmen.
.
.
Sender'sPrivateKeyMessageTextHashofMessage7/13/98Copyright1998FrederickM.
Avolio23IntegrityandAuthentication2.
DatatoSendNowisthetimeforallgoodmen.
.
.
MessageSignatureMessageText7/13/98Copyright1998FrederickM.
Avolio24DigitallySignedMessageTO:sysadminFrom:avolio@tis.
com-----BEGINPGPSIGNEDMESSAGE-----PleasecompletethedeploymentofthePGPsoftwaretoallemployees.
Fred,CSO-----BEGINPGPSIGNATURE-----Version:4.
5iQCVAgUBM+ZICTGr72+Les/dAQHmhwP/WorAeL6LzTJJre6lU77oPkNxYS+izmnM1ozOHxVD6pDlEu7pgsju0g3yRO6tKxN4uJRW5ZeOUtVEgBw+dgFptuOSD9cmDAgSw3SAEFwp9C6cPO0L9MMbc+eps3w8GKLlZkYRZPuANom0ggbmRpqDkjMIU25yEUr5Vj/P54ZuaRY==zu3P-----ENDPGPSIGNATURE--—7/13/98Copyright1998FrederickM.
Avolio25IntegrityandAuthenticationHowcananyonevalidateintegrityandauthenticatesenderMD5RSASender'sPublicKeyCompareRSANowisthetimeforallgoodmen.
.
.
MessageTextMessageSignature7/13/98Copyright1998FrederickM.
Avolio26TO:sysadminFrom:avolio@tis.
com-----BEGINPGPSIGNEDMESSAGE-----PleasecompletethedeploymentofthePGPsoftwaretoallemployees.
Fred,CSO-----BEGINPGPSIGNATURE-----Version:4.
5iQCVAgUBM+ZICTGr72+Les/dAQHmhwP/WorAeL6LzTJJre6lU77oPkNxYS+izmnM1ozOHxVD6pDlEu7pgsju0g3yRO6tKxN4uJRW5ZeOUtVEgBw+dgFptuOSD9cmDAgSw3SAEFwp9C6cPO0L9MMbc+eps3w8GKLlZkYRZPuANom0ggbmRpqDkjMIU25yEUr5Vj/P54ZuaRY==zu3P-----ENDPGPSIGNATURE--—CheckingaSignedMessage7/13/98Copyright1998FrederickM.
Avolio27EncryptionHybridSystemsSymmetrickeyisfastforencryption,butdistributingkeysisdifficultPublickeyisgoodforkeydistribution,butslowatencryptionSolution:usepublickeycryptoasasecuremeansofdistributingthekeysforsymmetricencryption7/13/98Copyright1998FrederickM.
Avolio28AddingPrivacy1.
EncryptedMessageDESRandomkeyNowisthetimeforallgoodmen.
.
.
s5%lk)@slm#]l0|;k^nb[wepqs.
.
.
MessageText7/13/98Copyright1998FrederickM.
Avolio29AddingPrivacy2.
RandomkeyEncryptedkeyRSARecipient'sPublicKey7/13/98Copyright1998FrederickM.
Avolio30AddingPrivacy3.
MD5RSANowisthetimeforallgoodmen.
.
.
Sender'sPrivateKeyMessageSignatureMessageText7/13/98Copyright1998FrederickM.
Avolio31AddingPrivacy4.
EncryptedMessageDatatoSendEncryptedkeys5%lk)@slm#]l0|;k^nb[wepqs.
.
.
MessageSignature7/13/98Copyright1998FrederickM.
Avolio32AddingPrivacyHowcantherecipient(andonlytherecipient)decrypt–DESkeyisencryptedwithrecipientspublickey–Recipientdecryptswithprivatekey(onlyrecipienthasthis)–DESkeyisappliedtoencryptedmessage–Theresultistheclear-textmessage7/13/98Copyright1998FrederickM.
Avolio33SampleEncryptedMessageDate:Tue,08Jul199716:39:25-0400To:user@domainFrom:FrederickMAvolio-----BEGINPGPMESSAGE-----hIwCMavvb4t6z90BA/42UOAdWvnzfhRG2xXyYe203CISLsn2O39vM/y640hNbSl7U29aNGZFfLMRGn7eLZG43SWwBz4cHjphG6iAzeLftRgHkLggxXA9VpGki5PyNID9B0rk4TpRVE3qzgTbdio69aMlK6BdAQ4zWkyxSCi0oR3Vpnh+VVZyOVyaX8etlYRMAvUTsuDYCkr1AQH+OlA4ntqhxoPP/SJpKm5ugMLYiiij8ak8V90a8IYMkYB0CzMrliOJ6ZZxQm1x8orgjL/6Bm5EoSvN4eCCeA/xXKYAAAHXLhG47kVhJkjlPrI/U/sr2aQEm6r+aU1s0ziU1LxF2c5DAW6cD5b4xH+EbvYrnQQJClNMh9y03SjviXvnqFDCO4M70u3iLC50+em4PouqM1DZdoW8O5pb=vhFx-----ENDPGPMESSAGE-----7/13/98Copyright1998FrederickM.
Avolio34Date:Tue,08Jul199716:39:25-0400To:user@domainFrom:FrederickMAvolio-----BEGINPGPMESSAGE-----hIwCMavvb4t6z90BA/42UOAdWvnzfhRG2xXyYe203CISLsn2O39vM/y640hNbSl7U29aNGZFfLMRGn7eLZG43SWwBz4cHjphG6iAzeLftRgHkLggxXA9VpGki5PyNID9B0rk4TpRVE3qzgTbdio69aMlK6BdAQ4zWkyxSCi0oR3Vpnh+VVZyOVyaX8etlYRMAvUTsuDYCkr1AQH+OlA4ntqhxoPP/SJpKm5ugMLYiiij8ak8V90a8IYMkYB0CzMrliOJ6ZZxQm1x8orgjL/6Bm5EoSvN4eCCeA/xXKYAAAHXLhG47kVhJkjlPrI/U/sr2aQEm6r+aU1s0ziU1LxF2c5DAW6cD5b4xH+EbvYrnQQJClNMh9y03SjviXvnqFDCO4M70u3iLC50+em4PouqM1DZdoW8O5pb=vhFx-----ENDPGPMESSAGE-----SampleEncryptedMessage7/13/98Copyright1998FrederickM.
Avolio35SampleEncryptedMessageTO:user@domainFrom:avolio@tis.
comWehavedeployedthePGPmailsoftwareandhavecompletedtraining.
Fred7/13/98Copyright1998FrederickM.
Avolio36SampleEncryptedMessageTO:user@domainFrom:avolio@tis.
comWehavedeployedthePGPmailsoftwareandhavecompletedtraining.
Fred7/13/98Copyright1998FrederickM.
Avolio37FilesandDirectoriesTheGoalsSealdatafilesfromunauthorizedaccessoralteration(reading,writing,etc.
)7/13/98Copyright1998FrederickM.
Avolio38FilesandDirectoriesSimilartoE-mailconcernsandsolutionsEncryptafilewithasymmetrickeyEncryptafilewithYOURpublickeyLikelockingdrawersinadeskoffilecabinetDesertStorm…7/13/98Copyright1998FrederickM.
Avolio39FilesandDirectories7/13/98Copyright1998FrederickM.
Avolio40FilesandDirectoriesNeedtobebuiltintofilesystemNeedtobebuiltintoapplicationsOpen—automaticallydecryptifencryptedClose—automaticallyencryptifwasencrypted(anddeletecleartext)Closewithencrypt7/13/98Copyright1998FrederickM.
Avolio41StrongUserAuthenticationThegoals"Toestablishthevalidityofaclaimedidentityortoprovideprotectionagainstfraudulenttransactionsbyestablishingthevalidityof.
.
.
[the]individual.
.
.
"—NCSC"RedBook"Toidentifyinawaythatisnotvulnerabletoareplayattack7/13/98Copyright1998FrederickM.
Avolio42ReplayAttackUsername:fredPassword:lisa%7/13/98Copyright1998FrederickM.
Avolio43Stronguserauthentication–SmartcardsortokensSoftware(server)andsmartcardbasedPIN-protectedsmartcardprivatekeySystemissueschallengebasedonuserUserusespasswordtounlocksmartcard,whichreadschallenge,calculatescryptographicresponseResponseisusedasresponsetochallengeAuthenticationTechniques7/13/98Copyright1998FrederickM.
Avolio44AuthenticationTechniquesChallenge:"876261"ServersendsUser"unlocks"authenticationtokenbykeyinginPersonalIdentificationNumberUserenterschallengeintoauthenticationtokenTokenreturnsanencryptedresponsetothechallenge"722512""1105""876261"UserrespondstoserverwithuniqueresponseServercomparesresponse"722512"(Serverandtokenshareasecretencryptionkeythatuserneverhasaccessto)(Secretkey:"0x8A5F42")7/13/98Copyright1998FrederickM.
Avolio45VirtualPrivateNetworksThegoalsPrivacyofcommunicationbetweensecureenclavesoveranuntrustednetworkPrivacyandaccessforremoteemployeesPrivacyandcontrolledaccessforremoteclients7/13/98Copyright1998FrederickM.
Avolio46Encryption—"VirtualPrivateNetworks"and"VirtualNetworkPerimeters"LANALANALANBLANBPrivacy7/13/98Copyright1998FrederickM.
Avolio47VirtualPrivateNetworksFirewall-to-firewallconnectionsovertheInternet.
Usingencrypted"tunnels"overtheInternettoconnectLANsandWANscanreducecosts23-50%(USComputerMarch1996).
SecureWideAreaNetworking(S/WAN).
IPv6,end-to-endencryption,IPSECFirewall-to-firewallconnectionsovertheInternet.
Usingencrypted"tunnels"overtheInternettoconnectLANsandWANscanreducecosts23-50%(USComputerMarch1996).
SecureWideAreaNetworking(S/WAN).
IPv6,end-to-endencryption,IPSEC7/13/98Copyright1998FrederickM.
Avolio48ExtendingthePerimeterPublicNetworkVirtualNetworkPerimeter7/13/98Copyright1998FrederickM.
Avolio49GlobalVPNsKeyIssues–TheInternetisaworldwidenetwork–Companiescrossinternationalboundries–Partnershipscrossinternationalboundries–Privacyinbusinesstransactionsiscriticaltosuccess–NetworkcommunicationsprivacymeansemployingencryptionKeyIssues–TheInternetisaworldwidenetwork–Companiescrossinternationalboundries–Partnershipscrossinternationalboundries–Privacyinbusinesstransactionsiscriticaltosuccess–Networkcommunicationsprivacymeansemployingencryption7/13/98Copyright1998FrederickM.
Avolio50GlobalVPNsEncryptionRequirementsStrong(56bitorbetterkeylength)ExportablePlatformindependentEncryptionRequirementsStrong(56bitorbetterkeylength)ExportablePlatformindependent7/13/98Copyright1998FrederickM.
Avolio51WebSiteSecurityThegoalsDeploymentofwebsitesforinternalandexternaluseProtectionfrommodificationAssurancedatahasnotbeenmodifiedControlofaccess7/13/98Copyright1998FrederickM.
Avolio52WebSiteSecurityWebsiteattacksCIADOJNASAUSAFSingaporeGovernmentNationofIslamMGMStudios7/13/98Copyright1998FrederickM.
Avolio53WebSiteSecurityMessagehashofallfilesonwebsitekept–Periodiccheckingofstoredhashagainsthashofpages—integritycheckingDigitallysignpages,documents,software–Assuranceforusersthatdatahasnotbeenmodified7/13/98Copyright1998FrederickM.
Avolio54WebSiteSecurityControlledaccess–Stronguserauthentication–Usernameandpasswordoverprotectedchannel7/13/98Copyright1998FrederickM.
Avolio55WebSiteSecurityftp://info.
cert.
org/pub/cert_advisories/CA-97.
20.
javascript:-----BEGINPGPSIGNEDMESSAGE-----CERT*AdvisoryCA-97.
20Originalissuedate:July8,1997Lastrevised:July28,1997,AppendixA-addedinformationforHewlett-PackardandIBM.
SectionIII.
A-slightwordingchange.
Acompleterevisionhistoryisattheendofthisfile.
Topic:JavaScriptVulnerability…-----BEGINPGPSIGNATURE-----Version:2.
6.
2iQCVAwUBM9yyN3VP+x0t4w7BAQFLAgP/Z1moGK6SI2Q3OBbV/fpCOcW2J9TdXE3/UHuZ7vHCjKDWxelHr5551JQ9i19s6sVBNDOX1W031IrlS36nIblp3vX4rVuAaufwVOxqxYg44i3gxsC8NgC/HW5j7KHsOiGzoRmU5a+vWyLmmged+Y2wBDrxGeqbHacE4S6FPph4/w8==5MP2-----ENDPGPSIGNATURE-----7/13/98Copyright1998FrederickM.
Avolio56E-CommerceTransactionsecurity–Privacyofasale–IntegrityofasaleElectronicpayment–Privacy–Integrity–ProvenanceofanagreementtotransferfundsFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio57TransactionSecurityVirtualPrivateNetworkapproach–Encryptionandauthenticationdoneaspartofthenetworkcommunication–Networksoftwaremustbemodified–UsersneednotmodifybehaviororapplicationsoftwareFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio58TransactionSecurityApplication-levelencryption–OSandplatformindependent–Nodataisexposedbetweenclientandserversoftware–MostwebbrowsersareusingthistypeofsecuritySSL,SHTTPFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio59TransactionSecurityApplication-levelencryption–Browserandservershakehandsanddecideonencryptionschemeandkey–Dataistransmittedencryptedwiththekey–Theyshakehandsattheend.
FromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,1997ThisisthemeaningofthefilledinkeyontheNetscapebrowsers.
7/13/98Copyright1998FrederickM.
Avolio60TransactionSecurityMoste-commercetodayusesapplication-leveltransactionsecurityMosttransactionsecuritytodayprotectsprivacyofthedatasentfromtheclient–Orderblanksorquestionnaires–CreditCardnumbersMoste-commerceontheInternettodayisliketelephonecatalogorderingwithoutthecatalogortelephone7/13/98Copyright1998FrederickM.
Avolio617/13/98Copyright1998FrederickM.
Avolio627/13/98Copyright1998FrederickM.
Avolio63ElectronicPaymentSecurepaymentprotocolsexistMostinvolveatrustedthirdentityactingasagatewaytofinancialnetworksordirectlytoabank7/13/98Copyright1998FrederickM.
Avolio64WheredowegofromhereOr,whatmoreisneeded7/13/98Copyright1998FrederickM.
Avolio65InfrastructureNeededPublicKeyInfrastructureKeycreationKeydistributionKeycertificationKeylookupKeyrevocationLocallyandGlobally7/13/98Copyright1998FrederickM.
Avolio66CertificatesAmessageName,e-mail,publickey-----BEGINPGPPUBLICKEYBLOCK-----Version:4.
5mQCNAjPmUEIAAAEEAMj14c0xswae9XfbMVQeDFq8OVf29+N1745Hey5vkYw7UZUn7K1ehDYK44W+f1Y/Ns4g3lFJNxuFRbPZXUPAc8dlPiBR1xq+wqcoOIm+gpQEd5Dl1EgsUyE+3Si0WQ6zELRvKCWKww6/8egKDaMqQTgMqZFQEqjRFEvspjTJR9s3AAURtAt1c2VyQGRvbWFpbg===Cexv-----ENDPGPPUBLICKEYBLOCK-----7/13/98Copyright1998FrederickM.
Avolio67CertificateSignedbysomeonetrustworthyFredAvolioPublicKey:dhe34j3ffhhej3457/13/98Copyright1998FrederickM.
Avolio68SummaryandReview7/13/98Copyright1998FrederickM.
Avolio69EncryptionUsesEncryptionistheencodingofinformationandcanbeusedatmanydifferentpoints:–Fileencryptionforstorage(e.
g.
.
,forlaptops)–PrivateE-mail–DigitalsignaturesforDoctorOrders–Integritycheckingforchangestopatientrecords–EncrypteddataintransitRoutertorouterencryptionFirewalltofirewallencryptionattheIPlevel7/13/98Copyright1998FrederickM.
Avolio70EncryptionApplicationsAccessControl–UsecryptographicfunctionstodistributeaccesscontrollistsandprivilegesAuthentication–DigitalSignaturesprovidepositiveproofofidentity–Digitalcertificatesusedtobindpublickeytophysicalidentity7/13/98Copyright1998FrederickM.
Avolio71EncryptionApplicationsNon-repudiation–CryptographicfunctionsusetoprovideunforgeableproofofreceiptorauthorshipAvailability–Combinationofapplicationsusedtoreducethechancesofdenialofserviceormalicioussystemoutages7/13/98Copyright1998FrederickM.
Avolio72BasicToolsofCryptographySymmetricencryption–ProvidessecrecyamongpartieswhoshareacommonkeyMessageauthenticationcodes–ProvidesintegritycheckingandauthenticationPublic-keyencryption–Allowssomeonetoreceivesecretmessagefrompeoplehe'snevermet–AllowsmethodofexchangingsecretkeysDigitalsignatureschemes–Establishesintegrity,authenticity,andnon-repudiationSecurehashfunctions–UsedtoreduceamessagetoafixedsizeforsignatureFromInternetSecuritypresentationatWICSbyBruceSchneier73PracticalCryptography:AnOverviewFrederickM.
Avolio

inux国外美老牌PhotonVPS月$2.5 ,Linux系统首月半价

PhotonVPS 服务商我们是不是已经很久没有见过?曾经也是相当的火爆的,我们中文习惯称作为饭桶VPS主机商。翻看之前的文章,在2015年之前也有较多商家的活动分享的,这几年由于服务商太多,乃至于有一些老牌的服务商都逐渐淡忘。这不有看到PhotonVPS商家发布促销活动。PhotonVPS 商家七月份推出首月半价Linux系统VPS主机,首月低至2.5美元,有洛杉矶、达拉斯、阿什本机房,除提供普...

georgedatacenter39美元/月$20/年/洛杉矶独立服务器美国VPS/可选洛杉矶/芝加哥/纽约/达拉斯机房/

georgedatacenter这次其实是两个促销,一是促销一款特价洛杉矶E3-1220 V5独服,性价比其实最高;另外还促销三款特价vps,georgedatacenter是一家成立于2019年的美国VPS商家,主营美国洛杉矶、芝加哥、达拉斯、新泽西、西雅图机房的VPS、邮件服务器和托管独立服务器业务。georgedatacenter的VPS采用KVM和VMware虚拟化,可以选择windows...

腾讯云爆款秒杀:1C2G5M服务器38元/年,CDN流量包6元起

农历春节将至,腾讯云开启了热门爆款云产品首单特惠秒杀活动,上海/北京/广州1核2G云服务器首年仅38元起,上架了新的首单优惠活动,每天三场秒杀,长期有效,其中轻量应用服务器2G内存5M带宽仅需年费38元起,其他产品比如CDN流量包、短信包、MySQL、直播流量包、标准存储等等产品也参与活动,腾讯云官网已注册且完成实名认证的国内站用户均可参与。活动页面:https://cloud.tencent.c...

www.k8k8.com为你推荐
硬盘工作原理高人指点:电子存储器(U盘,储存卡,硬盘等)的工作原理陈嘉垣陈浩民、马德钟强吻女星陈嘉桓,求大家一个说法。嘀动网手机一键通用来干嘛呢?同一ip网站同一个IP不同的30个网站,是不是在一个服务器上呢?www.119mm.comwww.993mm+com精品集!www.zjs.com.cn我的信用卡已经申请成功了,显示正在寄卡,怎么查询寄卡信息?javlibrary.comsony home network library官方下载地址sodu.tw给个看免费小说的网站www.mfav.orgwww.osta.org.cn国家职业资格证书全国联网查询,为什么随便输入什么都可以查,都要验证码月风随笔享受生活作文600字
怎么申请域名 堪萨斯服务器 韩国俄罗斯 cpanel主机 美国主机论坛 42u标准机柜尺寸 xfce 搜狗抢票助手 骨干网络 什么是刀片服务器 已备案删除域名 91vps 空间技术网 绍兴电信 四川电信商城 web服务器是什么 主机管理系统 iki lamp怎么读 深圳域名 更多