Duwamish 7.0 series analysis articles

xiaoxiao2021-03-06  41

Duwamish 7.0 series analysis articles

Written by: rickie lee

Email: rickieleemail at yahoo.com

DUWAMISH architecture analysis

Duwamish is Microsoft to provide an enterprise-class distributed system architecture. If you develop an enterprise-class distributed system, you can imitate this architecture. If you develop some simple systems, you can simplify.

DUWAMISH deployment plan

DUWAMISH 7.0 supports two multi-computer deployment scenarios. Non-distributed deployment scenarios deploy web layers, business appearances, business rules, and data access layers on a web host, but can copy the web host between the cluster to achieve load balancing. Distributed Schemes deploy specific components on a separate server. For example, business appearance, business rules, and data access layers may be located on a server that is independent of the web host. Database servers in actual deployment are usually located on a separate computer.

DUWAMISH code analysis

Continue the previous POST "DUWAMISH Architecture Analysis" and "DUWAMISH Deployment Scheme", here, the DuWamish 7.0 case is analyzed at the code level, the main purpose is to resolve the recommended coding style in the duwamish case and extract the code that can be reused or Class.

DUWAMISH password analysis, Part 1

Continue to POST from DUWAMISH before, here will learn about Password's processing. The account password in the Duwamish 7.0 paradigm is stored in Database in Database in Database by SHA1 hash operation and the hash operation, which is stored in Database in Database to improve the security of the system.

DUWAMISH password analysis section, Part 2

Continue to POST from DUWAMISH before, here will learn about Password's processing. The account password in the Duwamish 7.0 paradigm is stored in Database in Database in Database by SHA1 hash operation and the hash operation, which is stored in Database in Database to improve the security of the system.

DUWAMISH password analysis, Part 3

This article primarily learns the following symmetry algorithm (or key algorithm) libraries in .NET, including the following: DES (DATA Encryption Standard, TripleDes, RC2, Rijndael Symmetric Algorithm (or Key Algone) Using a key and one Initialization Vector, IV is initialized to secure data. The effect of encryption depends on the size of the key used, the longer the key, the stronger the confidentiality. Typical key lengths have 64 bits, 128 bits, 192, 256 bits, and 512 bits. Both sides using this data must know the key and initialization vector to encrypt and decrypt data. You must ensure that the key is secure, otherwise others will be able to decrypt the data and read the message. The initialization vector is just a randomly generated character set, using it to ensure that any two texts do not generate the same encrypted data. Then, on this basis, learn to develop a standard encryption / decryption common class library for future development of application systems.

Duwamish Web Services Analysis

转载请注明原文地址:https://www.9cbs.com/read-65865.html

New Post(0)