¹ØÓÚMysqlÊÇ·ñÂú×ãC2¼¶µÄÌÖÂÛ
====================================================
Òý×Ô£ºhttp://blog.sina.com.cn/s/blog_538a9d1901008f9g.html
ʲôÊÇC2¼¶°²È«ÐÔ£¿°²È«ÐԵķÖÀàÊÇÔõÑùµÄ£¿(2008-01-30 17:04:39)
DÀࣺ×îµÍ±£»¤£¬±£Áô¸ø²»ÄÜͨ¹ý¸ü¸ß¼¶±ð¼ì²éµÄϵͳ
C1£º½÷É÷±£»¤£¬ÒªÇóÓлùÓÚÓû§¼¶±ðµÄ¿ØÖÆÀ´±£»¤Êý¾Ý£¬Ö÷Òª·ÀÖ¹ÒâÍâʼþ´øÀ´µÄËðʧ£¬ÊÊÓÃÓÚ¶Ô°²È«ÐÔÒªÇó²»ÊÇÌ«¸ßµÄϵͳ
C2£ºÈ¨ÏÞ¿ØÖƱ£»¤£ºÓû§¶Ô×Ô¼ºµÄÐÐΪ¸ºÔð£»ÏµÍ³¿ÉÒÔ¸ú×ÙËùÓйý³ÌºÍ¼Ç¼ij¸öÓû§µÄÐÐΪ¡£·ÀÖ¹¶ÔÏóÖØÒýÓ㬲¢±£Ö¤ÏµÍ³°²È«ÐÔ¼àÊÓÆ÷µÄЧÁ¦¡£Óû§¿ÉÒÔÉ趨±ðÈ˶Ô×Ô¼ºÊý¾ÝµÄȨÏÞ¡£
B1£º±êÖ¾°²È«ÐÔ±£»¤£ºÒªÇóÌØ±ðµÄ°²È«ÐԼƻ®£¬ËùÓеı£ÃÜÊý¾Ý¶¼Òª¼ÓÒ»±êÖ¾£¬ÔÚϵͳÖд«µÝÕâЩÊý¾Ýʱ±ØÐëºË¶Ô±êÖ¾¡£Óû§²»ÄÜ×Ô¼º¸Ä±äÕâЩ±êÖ¾¡£
B2£º½á¹¹»¯±£»¤£¬ÒªÇó½á¹¹»¯µÄ¡¢Õý¹æµÄ°²È«ÐԼƻ®¡£Óû§ÕË»§ÑéÖ¤¹¦ÄÜÔöÇ¿£¬ÒÔÈ·¶¨Ã¿¸öÓû§ºÏ·¨µÄ°²È«ÐÔȨÏÞ¡£
B3£º°²È«Óò£ºÒªÇó°²È«ÐÔϵͳ¾¡¿ÉÄÜС£¬ÅųýÒ»ÇÐÎÞȨÏÞ´úÂëÖ´ÐС£ÕâЩ´úÂë¿ÉÄܲ»ÀûÓÚϵͳµÄ°²È«ÐԺͲâÊÔ£¬ÒªÇóÓи½¼ÓµÄÓйذ²È«ÐÔ¹ÜÀíµÄ¹¤¾ß¡£ÏµÍ³±ØÐëÓкÜÇ¿µÄ·´ÎÞȨ¸Ä¶¯ºÍÇÖÈë¡£
A1£ººËʵµÄÉè¼Æ£º¹¦ÄܺÍB3Ïàͬ£¬µ«A1Òª¾¹ý¸üÑϸñ¡¢¸üÕý¹æµÄ²âÊÔ¡£
=================================================================
¹ØÓÚC2¼¶µÄ¹Ù·½½âÊÍ
Òý×Ô£ºhttp://ftp.ntu.edu.tw/ftp/linux/libs/security/Orange-Linux/refs/Orange/OrangeI-II-2.html
2.2 CLASS (C2): CONTROLLED ACCESS PROTECTION
Systems in this class enforce a more finely grained discretionary access control than (C1) systems, making users individually
accountable for their actions through login procedures, auditing of security-relevant events, and resource isolation. The
following are minimal requirements for systems assigned a class (C2) rating:
Security Policy
Discretionary Access Control
The TCB shall define and control access between named users and named objects (e.g., files and programs) in the ADP system.
The enforcement mechanism (e.g., self/group/public controls, access control lists) shall allow users to specify and control
sharing of those objects by named individuals, or defined groups of individuals, or by both, and shall provide controls to
limi
Ïà¹ØÎĵµ£º
Äã˵ÊÇд¸ö¶¯Ì¬¿â²»¾ÍÐÐÁË£¬»¹ËµÐ´½Å±¾£¬½Å±¾¸ú¶¯Ì¬¿â²î±ð´óÈ¥ÁË
gcc±àÒëµÄʱºò¾ÍÄÜÉú³É¶¯Ì¬Á¬½Ó¿â
windowsÏÂÃæÃ»ÓÐsoµÄ¸ÅÄwindows½Ðdll
ËÑÏÂLinux gcc ¶¯Ì¬¿â
±àдºÃcÓïÑÔ³ÌÐò£¬¾ÍÊÇfileϵͳµ÷Óõöº¯Êý£¬fopen,freadÖ®ÀàµÄ
gcc±àÒë³ÉsoÎļþ£¬Ò»¸öÃüÁî¾Í¸ã¶¨£¬ÎÒÍü¼Ç¾ßÌåµÄÑ¡ÏîÁË ......
µ¼³öÕû¸öÊý¾Ý¿â£ºmysqldump -uÓû§Ãû -pÃÜÂë ÐèÒªµ¼³öµÄÊý¾Ý¿âÃû > µ¼³öÎļþÃû.sql
ÆäËû²ÎÊý£º
-d ²»°üº¬Êý¾Ý£¬Ö»ÓÐÊý¾Ý¿â±í½á¹¹
--add-drop-table ÔÚÿ¸öcreateÓï¾ä֮ǰÔö¼ÓÒ»¸ödrop
--skip-opt ÿÌõ¼Ç¼ֻ¶ÔÓ¦Ò»¸öinsertÓï¾ä ......
×î½ü¹ØÓÚÖÐÎÄÏÔʾÂÒÂëµÄÌù×ӱȽ϶࣬ËùÒÔÒ²×öÁ˸ö×ܽ᣺
¿ÉÒԲο¼Ò»ÏÂÑîÌÎÌΰæÖ÷µÄ¡¶¸÷ÖÖÂÒÂëÎÊÌâ»ã×Ü¡·
http://topic.csdn.net/u/20071124/08/3b7eae69-ed1d-4a77-8895-9930bf3601af.html
MySQL×Ö·û¼¯µÄÔÀí½éÉÜ¡£ÕªÂ¼ÓÚ¹Ù·½Îĵµ¡£http://dev.mysql.com/doc/refman/5.1/zh/charset.html
²»Í¬µÄ±àÂë¸ñʽ»áµ¼ÖÂͬһ×Ö· ......
MySQL ClusterÅäÖÃstep by step
À´Ô´£ºhttp://space.itpub.net/15415488/viewspace-620903
¹«Ë¾ÓиöÏîÄ¿ÊDzâÊÔdistributed DB£¬ÆäÖÐÒ»ÏîÊÇÕë¶ÔMySQL ClusterµÄ²âÊÔ¡£
ÓÚÊÇ»¨ÁËÁ½Ììʱ¼ä×°»úÆ÷ºÍÅäÖÃMySQL Cluster¡£Õû¸ö¹ý³Ì»¹ÊDZȽÏ˳ÀûµÄ£¬µ±È»Èç¹û¶ÔMySQL³£ÓÃÃüÁî±È½ÏÊìϤµÄ»°»á¸ü˳Àû¡£
ÁôÏÂstep by stepÅä ......