2.www.k8k8.com

www.k8k8.com  时间:2021-03-20  阅读:()
TITLE:PracticalCryptography:PrivacyforBusinessandE-commerceINSTRUCTOR:FrederickM.
Avolio,independentsecurityconsultantSUMMARYOFTOPICS:UpFront—DefiningTermsBasicsofCryptography—typesandmethods,Applications—PrivateMessaging(E-mail)FilesandDirectoriesStrongUserAuthenticationVirtualPrivateNetworksWebSitesElectronicCommerceNextSteps1PracticalCryptography:AnOverviewFrederickM.
Avolio7/13/98Copyright1998FrederickM.
Avolio2Shameless(butbrief)MarketingAvolioConsulting,http://www.
avolio.
com/–NetworkandcomputersecurityTrainingPolicyandProceduredevelopmentProductReviewandAnalysis–ProductMarketing,technicalassistance–E-mailsystemdesign,configuration,andtraining–Writing:whitepapers,tutorials,productreviews7/13/98Copyright1998FrederickM.
Avolio3SyllabusDefiningTermsBasicsofCryptographyPrivateMessaging(E-mail)FilesandDirectoriesStrongUserAuthenticationVirtualPrivateNetworksWebSitesElectronicCommerce7/13/98Copyright1998FrederickM.
Avolio4DefiningTermsConcernFraudUnauthorizedaccessSnoopingMessageAlterationDisavowalRequirementAuthenticationAuthorizationPrivacyDataIntegrityNon-RepudiationFromUnderstandingDigitalSignaturesbyGailGrant,McGraw-Hill,19977/13/98Copyright1998FrederickM.
Avolio5AuthenticationandIntegrityGuaranteetoReceiverKnowsidentityofsenderMessagenotalteredNotundulydelayedFromInternetSecuritypresentationatWICSbyWhitDiffie7/13/98Copyright1998FrederickM.
Avolio6PrivacyorConfidentialityGuaranteetoSenderAuthorizedreceiversonlyFromInternetSecuritypresentationatWICSbyWhitDiffie7/13/98Copyright1998FrederickM.
Avolio7BusinessNeedsforCryptoPrivacyMostbusinesses(andgovernments)don'tneedlong-termsecurityMailinglists,businessplans,negotiations,productR&DCommerceprivacyneedsaremoderateFinancialinformationmightneedtobesecureforadecadeExceptionsareembarrassments:personal,political,businessFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio8BusinessNeedsforCryptoAuthenticationAuthenticatingsessionsversustransactionsNeedforaudittraildependsonapplicationAudittrailmustbeusableincourtwhilenotcompromisingthefuturesecurityofthesystemFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio9BasicCryptographySecretkeyorsymmetricencryptionPublickeyorassymmetricencryptionOne-wayhashfunctions7/13/98Copyright1998FrederickM.
Avolio10EncryptionSecret-Key(Symmetric)Nowisthetimeforallgoodmen.
.
.
sd84$2*q}59(o32nvt-=gf]|@l^.
.
.
DecryptionEncryptionNowisthetimeforallgoodmen.
.
.
7/13/98Copyright1998FrederickM.
Avolio11EncryptionSecret-Key(Symmetric)BobencryptshismessagestoTedwiththeirsharedsecretkeyTeddecryptsmessagesfromBobwiththesamesecretkey.
7/13/98Copyright1998FrederickM.
Avolio12EncryptionSecret-Key(Symmetric)BobdecryptsTed'smessagesusingtheirsecretkey.
TedsendsmessagesbacktoBobwiththesamesecretkey.
7/13/98Copyright1998FrederickM.
Avolio13EncryptionPublic-Key(Asymmetric)Nowisthetimeforallgoodmen.
.
.
sd84$2*q}59(o32nvt-=gf]|@l^.
.
.
DecryptionEncryptionNowisthetimeforallgoodmen.
.
.
7/13/98Copyright1998FrederickM.
Avolio14EncryptionPublic-Key(Asymmetric)Carol,Ted,Bob,andAliceposttheirpublickeysandkeeptheirprivatekeyssecret7/13/98Copyright1998FrederickM.
Avolio15EncryptionPublic-Key(Asymmetric)TedBobAliceCarol'sPublicKeyCarol'sPublicKeyCarol'sPublicKeyCaroldecryptsthesemessagesusingherprivatekey7/13/98Copyright1998FrederickM.
Avolio16EncryptionPublic-Key(Asymmetric)Ted'spublickeyBob'spublickeyAlice'spublickeyCarolrepliestomessagesusingeachrecipient'spublickeyTedBobAliceTed'sprivatekeyBob'sprivatekeyAlice'sprivatekey7/13/98Copyright1998FrederickM.
Avolio17HashFunctionsConvertsastringofdataofanysizeintoafixed-lengthhashNowaytogobackwardsE.
g.
,afingerprintChancesofanytwostringsofdatahashingtothesamevaluevery,verysmall.
Thisisveryimportant!
7/13/98Copyright1998FrederickM.
Avolio18HashFunctionsMD5Messagetextofarbitrarysize.
.
.
MessageTextHashofMessageofshort,fixedsize7/13/98Copyright1998FrederickM.
Avolio19SecurityProblemsSolvedbyCryptographyPrivacyofstoreddata,messages,andconversationsSecureelectroniccommerceTransactionnon-repudiationUseranddataauthenticationE-mailsecurityMulti-partycontrolSecureauditlogsFromInternetSecuritypresentationatWICSbyBruceSchneier7/13/98Copyright1998FrederickM.
Avolio20ApplicationExamplesE-mailUserAuthenticationPrivacyforFilesandDirectoriesVirtualPrivateNetworksWebSiteSecurity7/13/98Copyright1998FrederickM.
Avolio21PrivateE-mailTheGoalsConfidentialityAuthenticationNon-repudiationSecuringE-mailaswellorbetterthanpostalmail!
7/13/98Copyright1998FrederickM.
Avolio22IntegrityandAuthentication1.
MessageSignatureMD5RSANowisthetimeforallgoodmen.
.
.
Sender'sPrivateKeyMessageTextHashofMessage7/13/98Copyright1998FrederickM.
Avolio23IntegrityandAuthentication2.
DatatoSendNowisthetimeforallgoodmen.
.
.
MessageSignatureMessageText7/13/98Copyright1998FrederickM.
Avolio24DigitallySignedMessageTO:sysadminFrom:avolio@tis.
com-----BEGINPGPSIGNEDMESSAGE-----PleasecompletethedeploymentofthePGPsoftwaretoallemployees.
Fred,CSO-----BEGINPGPSIGNATURE-----Version:4.
5iQCVAgUBM+ZICTGr72+Les/dAQHmhwP/WorAeL6LzTJJre6lU77oPkNxYS+izmnM1ozOHxVD6pDlEu7pgsju0g3yRO6tKxN4uJRW5ZeOUtVEgBw+dgFptuOSD9cmDAgSw3SAEFwp9C6cPO0L9MMbc+eps3w8GKLlZkYRZPuANom0ggbmRpqDkjMIU25yEUr5Vj/P54ZuaRY==zu3P-----ENDPGPSIGNATURE--—7/13/98Copyright1998FrederickM.
Avolio25IntegrityandAuthenticationHowcananyonevalidateintegrityandauthenticatesenderMD5RSASender'sPublicKeyCompareRSANowisthetimeforallgoodmen.
.
.
MessageTextMessageSignature7/13/98Copyright1998FrederickM.
Avolio26TO:sysadminFrom:avolio@tis.
com-----BEGINPGPSIGNEDMESSAGE-----PleasecompletethedeploymentofthePGPsoftwaretoallemployees.
Fred,CSO-----BEGINPGPSIGNATURE-----Version:4.
5iQCVAgUBM+ZICTGr72+Les/dAQHmhwP/WorAeL6LzTJJre6lU77oPkNxYS+izmnM1ozOHxVD6pDlEu7pgsju0g3yRO6tKxN4uJRW5ZeOUtVEgBw+dgFptuOSD9cmDAgSw3SAEFwp9C6cPO0L9MMbc+eps3w8GKLlZkYRZPuANom0ggbmRpqDkjMIU25yEUr5Vj/P54ZuaRY==zu3P-----ENDPGPSIGNATURE--—CheckingaSignedMessage7/13/98Copyright1998FrederickM.
Avolio27EncryptionHybridSystemsSymmetrickeyisfastforencryption,butdistributingkeysisdifficultPublickeyisgoodforkeydistribution,butslowatencryptionSolution:usepublickeycryptoasasecuremeansofdistributingthekeysforsymmetricencryption7/13/98Copyright1998FrederickM.
Avolio28AddingPrivacy1.
EncryptedMessageDESRandomkeyNowisthetimeforallgoodmen.
.
.
s5%lk)@slm#]l0|;k^nb[wepqs.
.
.
MessageText7/13/98Copyright1998FrederickM.
Avolio29AddingPrivacy2.
RandomkeyEncryptedkeyRSARecipient'sPublicKey7/13/98Copyright1998FrederickM.
Avolio30AddingPrivacy3.
MD5RSANowisthetimeforallgoodmen.
.
.
Sender'sPrivateKeyMessageSignatureMessageText7/13/98Copyright1998FrederickM.
Avolio31AddingPrivacy4.
EncryptedMessageDatatoSendEncryptedkeys5%lk)@slm#]l0|;k^nb[wepqs.
.
.
MessageSignature7/13/98Copyright1998FrederickM.
Avolio32AddingPrivacyHowcantherecipient(andonlytherecipient)decrypt–DESkeyisencryptedwithrecipientspublickey–Recipientdecryptswithprivatekey(onlyrecipienthasthis)–DESkeyisappliedtoencryptedmessage–Theresultistheclear-textmessage7/13/98Copyright1998FrederickM.
Avolio33SampleEncryptedMessageDate:Tue,08Jul199716:39:25-0400To:user@domainFrom:FrederickMAvolio-----BEGINPGPMESSAGE-----hIwCMavvb4t6z90BA/42UOAdWvnzfhRG2xXyYe203CISLsn2O39vM/y640hNbSl7U29aNGZFfLMRGn7eLZG43SWwBz4cHjphG6iAzeLftRgHkLggxXA9VpGki5PyNID9B0rk4TpRVE3qzgTbdio69aMlK6BdAQ4zWkyxSCi0oR3Vpnh+VVZyOVyaX8etlYRMAvUTsuDYCkr1AQH+OlA4ntqhxoPP/SJpKm5ugMLYiiij8ak8V90a8IYMkYB0CzMrliOJ6ZZxQm1x8orgjL/6Bm5EoSvN4eCCeA/xXKYAAAHXLhG47kVhJkjlPrI/U/sr2aQEm6r+aU1s0ziU1LxF2c5DAW6cD5b4xH+EbvYrnQQJClNMh9y03SjviXvnqFDCO4M70u3iLC50+em4PouqM1DZdoW8O5pb=vhFx-----ENDPGPMESSAGE-----7/13/98Copyright1998FrederickM.
Avolio34Date:Tue,08Jul199716:39:25-0400To:user@domainFrom:FrederickMAvolio-----BEGINPGPMESSAGE-----hIwCMavvb4t6z90BA/42UOAdWvnzfhRG2xXyYe203CISLsn2O39vM/y640hNbSl7U29aNGZFfLMRGn7eLZG43SWwBz4cHjphG6iAzeLftRgHkLggxXA9VpGki5PyNID9B0rk4TpRVE3qzgTbdio69aMlK6BdAQ4zWkyxSCi0oR3Vpnh+VVZyOVyaX8etlYRMAvUTsuDYCkr1AQH+OlA4ntqhxoPP/SJpKm5ugMLYiiij8ak8V90a8IYMkYB0CzMrliOJ6ZZxQm1x8orgjL/6Bm5EoSvN4eCCeA/xXKYAAAHXLhG47kVhJkjlPrI/U/sr2aQEm6r+aU1s0ziU1LxF2c5DAW6cD5b4xH+EbvYrnQQJClNMh9y03SjviXvnqFDCO4M70u3iLC50+em4PouqM1DZdoW8O5pb=vhFx-----ENDPGPMESSAGE-----SampleEncryptedMessage7/13/98Copyright1998FrederickM.
Avolio35SampleEncryptedMessageTO:user@domainFrom:avolio@tis.
comWehavedeployedthePGPmailsoftwareandhavecompletedtraining.
Fred7/13/98Copyright1998FrederickM.
Avolio36SampleEncryptedMessageTO:user@domainFrom:avolio@tis.
comWehavedeployedthePGPmailsoftwareandhavecompletedtraining.
Fred7/13/98Copyright1998FrederickM.
Avolio37FilesandDirectoriesTheGoalsSealdatafilesfromunauthorizedaccessoralteration(reading,writing,etc.
)7/13/98Copyright1998FrederickM.
Avolio38FilesandDirectoriesSimilartoE-mailconcernsandsolutionsEncryptafilewithasymmetrickeyEncryptafilewithYOURpublickeyLikelockingdrawersinadeskoffilecabinetDesertStorm…7/13/98Copyright1998FrederickM.
Avolio39FilesandDirectories7/13/98Copyright1998FrederickM.
Avolio40FilesandDirectoriesNeedtobebuiltintofilesystemNeedtobebuiltintoapplicationsOpen—automaticallydecryptifencryptedClose—automaticallyencryptifwasencrypted(anddeletecleartext)Closewithencrypt7/13/98Copyright1998FrederickM.
Avolio41StrongUserAuthenticationThegoals"Toestablishthevalidityofaclaimedidentityortoprovideprotectionagainstfraudulenttransactionsbyestablishingthevalidityof.
.
.
[the]individual.
.
.
"—NCSC"RedBook"Toidentifyinawaythatisnotvulnerabletoareplayattack7/13/98Copyright1998FrederickM.
Avolio42ReplayAttackUsername:fredPassword:lisa%7/13/98Copyright1998FrederickM.
Avolio43Stronguserauthentication–SmartcardsortokensSoftware(server)andsmartcardbasedPIN-protectedsmartcardprivatekeySystemissueschallengebasedonuserUserusespasswordtounlocksmartcard,whichreadschallenge,calculatescryptographicresponseResponseisusedasresponsetochallengeAuthenticationTechniques7/13/98Copyright1998FrederickM.
Avolio44AuthenticationTechniquesChallenge:"876261"ServersendsUser"unlocks"authenticationtokenbykeyinginPersonalIdentificationNumberUserenterschallengeintoauthenticationtokenTokenreturnsanencryptedresponsetothechallenge"722512""1105""876261"UserrespondstoserverwithuniqueresponseServercomparesresponse"722512"(Serverandtokenshareasecretencryptionkeythatuserneverhasaccessto)(Secretkey:"0x8A5F42")7/13/98Copyright1998FrederickM.
Avolio45VirtualPrivateNetworksThegoalsPrivacyofcommunicationbetweensecureenclavesoveranuntrustednetworkPrivacyandaccessforremoteemployeesPrivacyandcontrolledaccessforremoteclients7/13/98Copyright1998FrederickM.
Avolio46Encryption—"VirtualPrivateNetworks"and"VirtualNetworkPerimeters"LANALANALANBLANBPrivacy7/13/98Copyright1998FrederickM.
Avolio47VirtualPrivateNetworksFirewall-to-firewallconnectionsovertheInternet.
Usingencrypted"tunnels"overtheInternettoconnectLANsandWANscanreducecosts23-50%(USComputerMarch1996).
SecureWideAreaNetworking(S/WAN).
IPv6,end-to-endencryption,IPSECFirewall-to-firewallconnectionsovertheInternet.
Usingencrypted"tunnels"overtheInternettoconnectLANsandWANscanreducecosts23-50%(USComputerMarch1996).
SecureWideAreaNetworking(S/WAN).
IPv6,end-to-endencryption,IPSEC7/13/98Copyright1998FrederickM.
Avolio48ExtendingthePerimeterPublicNetworkVirtualNetworkPerimeter7/13/98Copyright1998FrederickM.
Avolio49GlobalVPNsKeyIssues–TheInternetisaworldwidenetwork–Companiescrossinternationalboundries–Partnershipscrossinternationalboundries–Privacyinbusinesstransactionsiscriticaltosuccess–NetworkcommunicationsprivacymeansemployingencryptionKeyIssues–TheInternetisaworldwidenetwork–Companiescrossinternationalboundries–Partnershipscrossinternationalboundries–Privacyinbusinesstransactionsiscriticaltosuccess–Networkcommunicationsprivacymeansemployingencryption7/13/98Copyright1998FrederickM.
Avolio50GlobalVPNsEncryptionRequirementsStrong(56bitorbetterkeylength)ExportablePlatformindependentEncryptionRequirementsStrong(56bitorbetterkeylength)ExportablePlatformindependent7/13/98Copyright1998FrederickM.
Avolio51WebSiteSecurityThegoalsDeploymentofwebsitesforinternalandexternaluseProtectionfrommodificationAssurancedatahasnotbeenmodifiedControlofaccess7/13/98Copyright1998FrederickM.
Avolio52WebSiteSecurityWebsiteattacksCIADOJNASAUSAFSingaporeGovernmentNationofIslamMGMStudios7/13/98Copyright1998FrederickM.
Avolio53WebSiteSecurityMessagehashofallfilesonwebsitekept–Periodiccheckingofstoredhashagainsthashofpages—integritycheckingDigitallysignpages,documents,software–Assuranceforusersthatdatahasnotbeenmodified7/13/98Copyright1998FrederickM.
Avolio54WebSiteSecurityControlledaccess–Stronguserauthentication–Usernameandpasswordoverprotectedchannel7/13/98Copyright1998FrederickM.
Avolio55WebSiteSecurityftp://info.
cert.
org/pub/cert_advisories/CA-97.
20.
javascript:-----BEGINPGPSIGNEDMESSAGE-----CERT*AdvisoryCA-97.
20Originalissuedate:July8,1997Lastrevised:July28,1997,AppendixA-addedinformationforHewlett-PackardandIBM.
SectionIII.
A-slightwordingchange.
Acompleterevisionhistoryisattheendofthisfile.
Topic:JavaScriptVulnerability…-----BEGINPGPSIGNATURE-----Version:2.
6.
2iQCVAwUBM9yyN3VP+x0t4w7BAQFLAgP/Z1moGK6SI2Q3OBbV/fpCOcW2J9TdXE3/UHuZ7vHCjKDWxelHr5551JQ9i19s6sVBNDOX1W031IrlS36nIblp3vX4rVuAaufwVOxqxYg44i3gxsC8NgC/HW5j7KHsOiGzoRmU5a+vWyLmmged+Y2wBDrxGeqbHacE4S6FPph4/w8==5MP2-----ENDPGPSIGNATURE-----7/13/98Copyright1998FrederickM.
Avolio56E-CommerceTransactionsecurity–Privacyofasale–IntegrityofasaleElectronicpayment–Privacy–Integrity–ProvenanceofanagreementtotransferfundsFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio57TransactionSecurityVirtualPrivateNetworkapproach–Encryptionandauthenticationdoneaspartofthenetworkcommunication–Networksoftwaremustbemodified–UsersneednotmodifybehaviororapplicationsoftwareFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio58TransactionSecurityApplication-levelencryption–OSandplatformindependent–Nodataisexposedbetweenclientandserversoftware–MostwebbrowsersareusingthistypeofsecuritySSL,SHTTPFromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,19977/13/98Copyright1998FrederickM.
Avolio59TransactionSecurityApplication-levelencryption–Browserandservershakehandsanddecideonencryptionschemeandkey–Dataistransmittedencryptedwiththekey–Theyshakehandsattheend.
FromWebSecuritySourcebookbyRubin,atal,JohnWiley&Sons,1997ThisisthemeaningofthefilledinkeyontheNetscapebrowsers.
7/13/98Copyright1998FrederickM.
Avolio60TransactionSecurityMoste-commercetodayusesapplication-leveltransactionsecurityMosttransactionsecuritytodayprotectsprivacyofthedatasentfromtheclient–Orderblanksorquestionnaires–CreditCardnumbersMoste-commerceontheInternettodayisliketelephonecatalogorderingwithoutthecatalogortelephone7/13/98Copyright1998FrederickM.
Avolio617/13/98Copyright1998FrederickM.
Avolio627/13/98Copyright1998FrederickM.
Avolio63ElectronicPaymentSecurepaymentprotocolsexistMostinvolveatrustedthirdentityactingasagatewaytofinancialnetworksordirectlytoabank7/13/98Copyright1998FrederickM.
Avolio64WheredowegofromhereOr,whatmoreisneeded7/13/98Copyright1998FrederickM.
Avolio65InfrastructureNeededPublicKeyInfrastructureKeycreationKeydistributionKeycertificationKeylookupKeyrevocationLocallyandGlobally7/13/98Copyright1998FrederickM.
Avolio66CertificatesAmessageName,e-mail,publickey-----BEGINPGPPUBLICKEYBLOCK-----Version:4.
5mQCNAjPmUEIAAAEEAMj14c0xswae9XfbMVQeDFq8OVf29+N1745Hey5vkYw7UZUn7K1ehDYK44W+f1Y/Ns4g3lFJNxuFRbPZXUPAc8dlPiBR1xq+wqcoOIm+gpQEd5Dl1EgsUyE+3Si0WQ6zELRvKCWKww6/8egKDaMqQTgMqZFQEqjRFEvspjTJR9s3AAURtAt1c2VyQGRvbWFpbg===Cexv-----ENDPGPPUBLICKEYBLOCK-----7/13/98Copyright1998FrederickM.
Avolio67CertificateSignedbysomeonetrustworthyFredAvolioPublicKey:dhe34j3ffhhej3457/13/98Copyright1998FrederickM.
Avolio68SummaryandReview7/13/98Copyright1998FrederickM.
Avolio69EncryptionUsesEncryptionistheencodingofinformationandcanbeusedatmanydifferentpoints:–Fileencryptionforstorage(e.
g.
.
,forlaptops)–PrivateE-mail–DigitalsignaturesforDoctorOrders–Integritycheckingforchangestopatientrecords–EncrypteddataintransitRoutertorouterencryptionFirewalltofirewallencryptionattheIPlevel7/13/98Copyright1998FrederickM.
Avolio70EncryptionApplicationsAccessControl–UsecryptographicfunctionstodistributeaccesscontrollistsandprivilegesAuthentication–DigitalSignaturesprovidepositiveproofofidentity–Digitalcertificatesusedtobindpublickeytophysicalidentity7/13/98Copyright1998FrederickM.
Avolio71EncryptionApplicationsNon-repudiation–CryptographicfunctionsusetoprovideunforgeableproofofreceiptorauthorshipAvailability–Combinationofapplicationsusedtoreducethechancesofdenialofserviceormalicioussystemoutages7/13/98Copyright1998FrederickM.
Avolio72BasicToolsofCryptographySymmetricencryption–ProvidessecrecyamongpartieswhoshareacommonkeyMessageauthenticationcodes–ProvidesintegritycheckingandauthenticationPublic-keyencryption–Allowssomeonetoreceivesecretmessagefrompeoplehe'snevermet–AllowsmethodofexchangingsecretkeysDigitalsignatureschemes–Establishesintegrity,authenticity,andnon-repudiationSecurehashfunctions–UsedtoreduceamessagetoafixedsizeforsignatureFromInternetSecuritypresentationatWICSbyBruceSchneier73PracticalCryptography:AnOverviewFrederickM.
Avolio

Contabo美国独立日促销,独立服7月€3.99/月

Contabo自4月份在新加坡增设数据中心以后,这才短短的过去不到3个月,现在同时新增了美国纽约和西雅图数据中心。可见Contabo加速了全球布局,目前可选的数据中心包括:德国本土、美国东部(纽约)、美国西部(西雅图)、美国中部(圣路易斯)和亚洲的新加坡数据中心。为了庆祝美国独立日和新增数据中心,自7月4日开始,购买美国地区的VPS、VDS和独立服务器均免设置费。Contabo是德国的老牌服务商,...

Linode($5/月),新用户注册送100美元,11个数据中心云服务器

关于Linode,这是一家运营超过18年的VPS云主机商家,产品支持随时删除(按小时计费),可选包括美国、英国、新加坡、日本、印度、加拿大、德国等全球十多个数据中心,最低每月费用5美元($0.0075/小时)起。目前,注册Linode的新用户添加付款方式后可以获得100美元赠送,有效期为60天,让更多新朋友可以体验Linode的产品和服务。Linode的云主机产品分为几类,下面分别列出几款套餐配置...

CUBECLOUD:香港服务器、洛杉矶服务器、全场88折,69元/月

CUBECLOUD(魔方云)成立于2016年,亚太互联网络信息中心(APNIC)会员,全线产品均为完全自营,专业数据灾备冗余,全部产品均为SSD阵列,精品网络CN2(GIA) CU(10099VIP)接入,与当今主流云计算解决方案保持同步,为企业以及开发者用户实现灵活弹性自动化的基础设施。【夏日特促】全场产品88折优惠码:Summer_2021时间:2021年8月1日 — 2021年8月8日香港C...

www.k8k8.com为你推荐
怎么查询商标如何查询商标注册甲骨文不满赔偿未签合同被辞退的赔偿郭泊雄郭佰雄最后一次出现是什么时候?www.zjs.com.cn请问宅急送客服电话号码是多少?45gtv.comLETSCOM是什么牌子?dpscycle痛苦术士PVE输出宏惠丰吧毕节医药高等专科可以专升本吗www.5566.com.cn免费手机游戏邯郸纠风网河北邯郸有几个县个名单非法集资酒仙琐事如何才能成为酒仙
双线虚拟主机 东莞服务器租用 免费动态域名 x3220 企业主机 服务器评测 kdata godaddy优惠码 福建天翼加速 新家坡 服务器是干什么的 稳定免费空间 卡巴斯基破解版 如何安装服务器系统 万网空间管理 网通服务器 下载速度测试 cxz 百度云空间 lamp的音标 更多