中文亚洲精品无码_熟女乱子伦免费_人人超碰人人爱国产_亚洲熟妇女综合网

當(dāng)前位置: 首頁 > news >正文

怎么給網(wǎng)站動(dòng)態(tài)做偽靜態(tài)優(yōu)化公司治理結(jié)構(gòu)

怎么給網(wǎng)站動(dòng)態(tài)做偽靜態(tài),優(yōu)化公司治理結(jié)構(gòu),開發(fā)軟件用什么工具,wordpress分類訪問不目錄 1.說明 2.加密和加簽的區(qū)別 3.后端加密,解密,加簽及驗(yàn)簽示例 4.前端加密,解密,加簽及驗(yàn)簽示例 5.前端加密,后端解密,前端加簽,后端驗(yàn)簽 6.注意事項(xiàng) 1.說明 RSA算法是一種非對(duì)稱加密…

目錄

1.說明

2.加密和加簽的區(qū)別

3.后端加密,解密,加簽及驗(yàn)簽示例

4.前端加密,解密,加簽及驗(yàn)簽示例

5.前端加密,后端解密,前端加簽,后端驗(yàn)簽

6.注意事項(xiàng)


1.說明

RSA算法是一種非對(duì)稱加密算法,與對(duì)稱加密算法不同的是,RSA算法有兩個(gè)不同的密鑰,一個(gè)是公鑰,一個(gè)是私鑰。

公鑰是公開的,可以多人持有;私鑰是保密的,只有自己持有。

加密常用的密鑰長(zhǎng)度有1024,2048,3072,4096。密鑰長(zhǎng)度越長(zhǎng),加密的強(qiáng)度也就越強(qiáng),性能也會(huì)越低??梢允褂?024或2048位的密碼。

2.加密和加簽的區(qū)別

①加密是防止信息泄露,確保數(shù)據(jù)傳輸?shù)陌踩?#xff0c;如前端輸入的一些賬號(hào),密碼,卡號(hào)等敏感信息,必須加密后傳輸。

加簽是防止信息被篡改,確保是發(fā)送方傳遞的數(shù)據(jù)。

②通過公鑰進(jìn)行加密傳輸,然后接收方使用私鑰進(jìn)行解密。

通過私鑰進(jìn)行加簽,然后接收方使用公鑰進(jìn)行驗(yàn)簽。

③加密是可逆的,也就是說加密后的密文可以進(jìn)行解密。

加簽是不可逆的,只能通過驗(yàn)簽來驗(yàn)明真?zhèn)巍?/p>

④加密是明文長(zhǎng)度是有限制的,明文的最大長(zhǎng)度=密文長(zhǎng)度-11(單位是字節(jié)),當(dāng)設(shè)置密鑰為1024位時(shí),1024/8-11=117字節(jié),所以明文的最大長(zhǎng)度為117個(gè)字節(jié),解密的最大長(zhǎng)度為127個(gè)字節(jié),相差11個(gè)字節(jié)是因?yàn)榧用軙r(shí)使用了填充模式。

加簽是沒有長(zhǎng)度限制的。

3.后端加密,解密,加簽及驗(yàn)簽示例

①引入依賴

        <dependency><groupId>commons-codec</groupId><artifactId>commons-codec</artifactId><version>1.14</version></dependency>

②工具類

package com.example.utils;import java.io.ByteArrayOutputStream;
import java.security.KeyFactory;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.Signature;
import java.security.spec.PKCS8EncodedKeySpec;
import java.security.spec.X509EncodedKeySpec;
import javax.crypto.Cipher;import org.apache.commons.codec.binary.Base64;/*** @Author linaibo* @Date 2024/2/17 16:26* @Version 1.0*/
public class RsaTool {/*** 16      * RSA最大加密明文大小* 17*/private static final int MAX_ENCRYPT_BLOCK = 117;/*** 21      * RSA最大解密密文大小* 22*/private static final int MAX_DECRYPT_BLOCK = 128;/*** 26      * 獲取密鑰對(duì)* 27      ** 28      * @return 密鑰對(duì)* 29*/public static KeyPair getKeyPair() throws Exception {KeyPairGenerator generator = KeyPairGenerator.getInstance("RSA");generator.initialize(1024);return generator.generateKeyPair();}/*** 37      * 獲取私鑰* 38      ** 39      * @param privateKey 私鑰字符串* 40      * @return* 41*/public static PrivateKey getPrivateKey(String privateKey) throws Exception {KeyFactory keyFactory = KeyFactory.getInstance("RSA");byte[] decodedKey = Base64.decodeBase64(privateKey.getBytes());PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(decodedKey);return keyFactory.generatePrivate(keySpec);}/*** 50      * 獲取公鑰* 51      ** 52      * @param publicKey 公鑰字符串* 53      * @return* 54*/public static PublicKey getPublicKey(String publicKey) throws Exception {KeyFactory keyFactory = KeyFactory.getInstance("RSA");byte[] decodedKey = Base64.decodeBase64(publicKey.getBytes());X509EncodedKeySpec keySpec = new X509EncodedKeySpec(decodedKey);return keyFactory.generatePublic(keySpec);}/*** 63      * RSA加密* 64      ** 65      * @param data 待加密數(shù)據(jù)* 66      * @param publicKey 公鑰* 67      * @return* 68*/public static String encrypt(String data, PublicKey publicKey) throws Exception {Cipher cipher = Cipher.getInstance("RSA");cipher.init(Cipher.ENCRYPT_MODE, publicKey);int inputLen = data.getBytes().length;ByteArrayOutputStream out = new ByteArrayOutputStream();int offset = 0;byte[] cache;int i = 0;// 對(duì)數(shù)據(jù)分段加密while (inputLen - offset > 0) {if (inputLen - offset > MAX_ENCRYPT_BLOCK) {cache = cipher.doFinal(data.getBytes(), offset, MAX_ENCRYPT_BLOCK);} else {cache = cipher.doFinal(data.getBytes(), offset, inputLen - offset);}out.write(cache, 0, cache.length);i++;offset = i * MAX_ENCRYPT_BLOCK;}byte[] encryptedData = out.toByteArray();out.close();// 獲取加密內(nèi)容使用base64進(jìn)行編碼,并以UTF-8為標(biāo)準(zhǔn)轉(zhuǎn)化成字符串// 加密后的字符串return new String(Base64.encodeBase64String(encryptedData));}/*** 96      * RSA解密* 97      ** 98      * @param data 待解密數(shù)據(jù)* 99      * @param privateKey 私鑰* 100      * @return* 101*/public static String decrypt(String data, PrivateKey privateKey) throws Exception {Cipher cipher = Cipher.getInstance("RSA");cipher.init(Cipher.DECRYPT_MODE, privateKey);byte[] dataBytes = Base64.decodeBase64(data);int inputLen = dataBytes.length;ByteArrayOutputStream out = new ByteArrayOutputStream();int offset = 0;byte[] cache;int i = 0;// 對(duì)數(shù)據(jù)分段解密while (inputLen - offset > 0) {if (inputLen - offset > MAX_DECRYPT_BLOCK) {cache = cipher.doFinal(dataBytes, offset, MAX_DECRYPT_BLOCK);} else {cache = cipher.doFinal(dataBytes, offset, inputLen - offset);}out.write(cache, 0, cache.length);i++;offset = i * MAX_DECRYPT_BLOCK;}byte[] decryptedData = out.toByteArray();out.close();// 解密后的內(nèi)容return new String(decryptedData, "UTF-8");}/*** 129      * 簽名* 130      ** 131      * @param data 待簽名數(shù)據(jù)* 132      * @param privateKey 私鑰* 133      * @return 簽名* 134*/public static String sign(String data, PrivateKey privateKey) throws Exception {byte[] keyBytes = privateKey.getEncoded();PKCS8EncodedKeySpec keySpec = new PKCS8EncodedKeySpec(keyBytes);KeyFactory keyFactory = KeyFactory.getInstance("RSA");PrivateKey key = keyFactory.generatePrivate(keySpec);// 不同的簽名算法Signature signature = Signature.getInstance("MD5withRSA");// Signature signature = Signature.getInstance("MD2withRSA");// Signature signature = Signature.getInstance("SHA1withRSA");// Signature signature = Signature.getInstance("SHA224withRSA");// Signature signature = Signature.getInstance("SHA256withRSA");// Signature signature = Signature.getInstance("SHA384withRSA");// Signature signature = Signature.getInstance("SHA512withRSA");signature.initSign(key);signature.update(data.getBytes());return new String(Base64.encodeBase64(signature.sign()));}/*** 147      * 驗(yàn)簽* 148      ** 149      * @param srcData 原始字符串* 150      * @param publicKey 公鑰* 151      * @param sign 簽名* 152      * @return 是否驗(yàn)簽通過* 153*/public static boolean verify(String srcData, PublicKey publicKey, String sign) throws Exception {byte[] keyBytes = publicKey.getEncoded();X509EncodedKeySpec keySpec = new X509EncodedKeySpec(keyBytes);KeyFactory keyFactory = KeyFactory.getInstance("RSA");PublicKey key = keyFactory.generatePublic(keySpec);// 不同的簽名算法Signature signature = Signature.getInstance("MD5withRSA");// Signature signature = Signature.getInstance("MD2withRSA");// Signature signature = Signature.getInstance("SHA1withRSA");// Signature signature = Signature.getInstance("SHA224withRSA");// Signature signature = Signature.getInstance("SHA256withRSA");// Signature signature = Signature.getInstance("SHA384withRSA");// Signature signature = Signature.getInstance("SHA512withRSA");signature.initVerify(key);signature.update(srcData.getBytes());return signature.verify(Base64.decodeBase64(sign.getBytes()));}
}

③使用

package com.example.utils;import java.security.KeyPair;
import org.apache.commons.codec.binary.Base64;/*** @Author linaibo* @Date 2024/2/17 16:30* @Version 1.0*/
public class TestRsa {public static void main(String[] args) throws Exception {KeyPair keyPair = RsaTool.getKeyPair();String privateKey = new String(Base64.encodeBase64(keyPair.getPrivate().getEncoded()));String publicKey = new String(Base64.encodeBase64(keyPair.getPublic().getEncoded()));System.out.println("公鑰:" + publicKey);System.out.println("私鑰:" + privateKey);String data = "需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字";String encrypt = RsaTool.encrypt(data, RsaTool.getPublicKey(publicKey));System.out.println("加密后:" + encrypt);String decrypt = RsaTool.decrypt(encrypt, RsaTool.getPrivateKey(privateKey));System.out.println("解密后:" + decrypt);String sign = RsaTool.sign(data, RsaTool.getPrivateKey(privateKey));System.out.println("簽名后:" + sign);boolean verify = RsaTool.verify(data, RsaTool.getPublicKey(publicKey), sign);System.out.println("驗(yàn)簽結(jié)果" + verify);}
}

?結(jié)果:

公鑰:MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQD5Wa+wf44UliJLXLQ0UUTZXaH1EZv1bHM4nNSV2xVQY2RN8dKLgQ1J71y+90vJjusi0rOqfFdni2UU3VtnMdtYOYXbhsV14oFtU+3+gWYK28KlqOd5rtjjNR2Vv0sPDaZ+Lfdsq6+p5BpNjtWApPM9ghXj0S6BM3GWjsftNPM/IwIDAQAB
私鑰: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
加密后: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
解密后:需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字需要加密的文字
簽名后:FgpCHgRZg0AoR747wvDDBbPhYeVUCEJfRaJ3tGVJY3QplddTxprtMHYFQalLK3vVP5Dpo/6bMAzQyu8Y4oaArqtYpoURhPnvr4QXTH+fR8MG8PGYc1S11ysAuDPbsb6geAvHRFsspjGJ9oLH2nHBnZzMQ62HGZ+RzAKING219SY=
驗(yàn)簽結(jié)果true

4.前端加密,解密,加簽及驗(yàn)簽示例

前端這塊主要采用jsencrypt進(jìn)行加解密,jsrsasign用來生成密鑰對(duì)、加簽驗(yàn)簽。

①引入依賴

// JSEncrypt
pnpm i jsencrypt// jsrsasign
pnpm i jsrsasign

②加密,解密,加簽及驗(yàn)簽工具類?

import JSEncrypt from "jsencrypt";
import JsRsaSign from "jsrsasign";/*** RSA加密* @param publicKey 公鑰* @param plainText 明文* @returns {*} 密文*/
export function encryptByRSA(publicKey, plainText) {const encryptor = new JSEncrypt();encryptor.setPublicKey(publicKey);return encryptor.encrypt(plainText);
}/*** RSA解密* @param privateKey 私鑰* @param cipherText 密文* @returns {*} 明文*/
export function decryptByRSA(privateKey, cipherText) {const decrypter = new JSEncrypt();decrypter.setPrivateKey(privateKey);return decrypter.decrypt(cipherText);
}/*** 生成RSA密鑰對(duì),填充模式為PKCS8。* 更多模式參考:<a href="https://kjur.github.io/jsrsasign/api/symbols/KEYUTIL.html">https://kjur.github.io/jsrsasign/api/symbols/KEYUTIL.html</a>* @returns {{privateKey: (string|string|*), publicKey: (string|string|*)}}*/
export function generateRsaKeyWithPKCS8() {const keyPair = JsRsaSign.KEYUTIL.generateKeypair("RSA", 1024);const privateKey = JsRsaSign.KEYUTIL.getPEM(keyPair.prvKeyObj, "PKCS8PRV");const publicKey = JsRsaSign.KEYUTIL.getPEM(keyPair.pubKeyObj);return { privateKey, publicKey };
}
/*** SHA256和RSA加簽* @param privateKey 私鑰* @param msg 加簽內(nèi)容* @returns {string} Base64編碼簽名內(nèi)容*/
export function signBySHA256WithRSA(privateKey, msg) {const key = JsRsaSign.KEYUTIL.getKey(privateKey);const signature = new JsRsaSign.KJUR.crypto.Signature({alg: "MD5withRSA",// alg: "SHA1withRSA",// alg: "SHA224withRSA",// alg: "SHA256withRSA",// alg: "SHA384withRSA",// alg: "SHA512withRSA",// alg: "RIPEMD160withRSA",});signature.init(key);signature.updateString(msg);// 簽名后的為16進(jìn)制字符串,這里轉(zhuǎn)換為16進(jìn)制字符串return JsRsaSign.hextob64(signature.sign());
}/*** SHA256和RSA驗(yàn)簽* @param publicKey 公鑰:必須為標(biāo)準(zhǔn)pem格式。如果是PKCS1格式,必須包含-----BEGIN RSA PRIVATE KEY-----,如果是PKCS8格式,必須包含-----BEGIN PRIVATE KEY-----* @param base64SignStr Base64編碼簽名字符串* @param msg 原內(nèi)容* @returns {boolean} 是否驗(yàn)簽通過*/
export function verifyBySHA256WithRSA(publicKey, base64SignStr, msg) {const key = JsRsaSign.KEYUTIL.getKey(publicKey);const signature = new JsRsaSign.KJUR.crypto.Signature({alg: "MD5withRSA",// alg: "SHA1withRSA",// alg: "SHA224withRSA",// alg: "SHA256withRSA",// alg: "SHA384withRSA",// alg: "SHA512withRSA",// alg: "RIPEMD160withRSA",});signature.init(key);signature.updateString(msg);// 需要將Base64進(jìn)制簽名字符串轉(zhuǎn)換成16進(jìn)制字符串return signature.verify(JsRsaSign.b64tohex(base64SignStr));
}

③使用

<!-- eslint-disable vue/require-v-for-key -->
<script setup>
import Component1 from '@/components/Component1.vue';
import Component2 from '@/components/Component2.vue';
import Component3 from '@/components/Component3.vue';
import {useCountStore} from '@/store/modules/count/countStore';
import {useChannelStore} from '@/store/modules/channel/channelStore'
import {ref} from 'vue';
import testStore from './components/testStore.vue';
import {encryptByRSA,decryptByRSA,generateRsaKeyWithPKCS8,signBySHA256WithRSA,verifyBySHA256WithRSA} from '@/utils/crypto';const {privateKey, publicKey} = generateRsaKeyWithPKCS8();
console.log(`生成的私鑰為:\n${privateKey}`);
console.log(`生成的公鑰為:\n${publicKey}`);const cipherText = encryptByRSA(publicKey, "123456789----------123456789");
console.log(`test加密后的內(nèi)容為:\n${cipherText}`);const plainText = decryptByRSA(privateKey, cipherText);
console.log(`解密后的內(nèi)容為:\n${plainText}`);const signature = signBySHA256WithRSA(privateKey, "123456789----------123456789");
console.log(`生成的簽名:\n${signature}`);const isVerified = verifyBySHA256WithRSA(publicKey, signature, "123456789----------123456789");
console.log(`是否驗(yàn)簽通過:${isVerified}`);</script><template><div> </div>
</template><style scoped>
</style>

數(shù)字簽名有多種,加簽及驗(yàn)簽使用的數(shù)字簽名要一致。

結(jié)果:?

5.前端加密,后端解密,前端加簽,后端驗(yàn)簽

前后端的工具類直接使用上面的即可。加簽的數(shù)字簽名確保前后端的一致。

        String pri = "MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAL03PU6h7DfX0pGb" +"hFak0gAPJVSCOFjy0vXfPefm88wr9gx3aIGqRNyubdtw37jG3jUF+b1d/5M5bVB1" +"YB23cs5FkjmIVwdiUoHgRPCUwDoet6ZpamDSdpLTWqmC4uDb9R8FLRI1Q2h2cMBV" +"T+TR6D+fFHRLOJFvlrh+juvcZvonAgMBAAECgYBSoWj4ieXqjSm7xLqKS/gZZoPa" +"3/NThNdz4EXcnBMjup782ricx4rDBLmc9zH8M3yekzl45S/TT2TZmiibUZ2kjVYs" +"ZV3GoVzVbBek9vStDHVlVjGQvUnVbMuoKTpcEs0efjIz3Su0NQsxLyb4+KZFMzts" +"H/C4JOBE0kb/cuhhIQJBAPeMvUg61pvR2IfrTiREtiN9uKi0b+pSDH5E+sq89rET" +"QjC65a209pVoWkdx4HBKIK4KL+saLAI8w9b1fZhPGc0CQQDDrLzM2JFjCpC4g9gx" +"NdFTZmwFaqKrAkKB3tw492PgvLZWbO6HocDWRMYi1RtkBYq7FFzRftIAr7QDxKLz" +"oJ/DAkAX7NRGbNldCfUBfe55duKbn4T/WSEP5ooqkgQjIAw/pPrattWH6luCqSlA" +"inMEp0VtTLLA6DCkrrbGyccvt0VpAkEAuKnXT9b+diKta4T5zY9FqliZjw8QzySF" +"0XyaBqTqPFi8F5ocDiJIE6658nt9qwpT37Qa2Ja/52fqEjhLtHIc8wJAB1T7XQ1s" +"olFqeE3T9n/3NfbvSw66Act2kYS+KrGYtrDMjSBH+s7rIN7DWAz/zlCRPQ0EyY9w" +"gcEyHHFoKN2vDA==";String pub = "MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC9Nz1Ooew319KRm4RWpNIADyVU" +"gjhY8tL13z3n5vPMK/YMd2iBqkTcrm3bcN+4xt41Bfm9Xf+TOW1QdWAdt3LORZI5" +"iFcHYlKB4ETwlMA6HremaWpg0naS01qpguLg2/UfBS0SNUNodnDAVU/k0eg/nxR0" +"SziRb5a4fo7r3Gb6JwIDAQAB";String decrypt1 = RsaTool.decrypt("jNlG4S6w4xrq62todeiXJoPoCrQ0WRn1wq2WkKm+s7bPFkYnYDARebVh8tbSl0OL/FIBE1HytI6jRnzo6CxkdMVPdUh3W1gcAMOLtYEdOOW8g749/vMH6ptBYgG7I02TdRTilCKrWxG1yBUU/2vz73w+Ges4l2bw+s87zr7WXh8=", RsaTool.getPrivateKey(pri));System.out.println("解密后:" + decrypt1);boolean verify1 = RsaTool.verify("123456789----------123456789", RsaTool.getPublicKey(pub), "VECLGuhG59fwhE3ikT2mpO/CTf/9EMXRdL3U308j98jYQLx1WamjMJmBmPF/nf8b6D0Uv2TxmPOnLAw/iFe+6f1oC62DFzR77J7agomi8cG0itcxY37WhExv4tkrgxf8DMH9uZ7SoYMTtXoSD4PtJIDxJnvWo5/4QmqtnZfA3d4=");System.out.println("驗(yàn)簽結(jié)果" + verify1);

結(jié)果:

解密后:123456789----------123456789
驗(yàn)簽結(jié)果true

6.注意事項(xiàng)

①因?yàn)榧用艿拿魑拈L(zhǎng)度限制,所以需要分段進(jìn)行加密。

②公鑰加密,私鑰解密;私鑰加簽,公鑰驗(yàn)簽

③后端RSA的數(shù)字簽名算法主要有以下兩種:

  • MD系列?。主要包括MD2withRSA和MD5withRSA。
  • SHA系列?。主要包括SHA1withRSA、SHA224withRSA、SHA256withRSA、SHA384withRSA、SHA512withRSA。

數(shù)字簽名算法具有安全性、抗否認(rèn)性的特點(diǎn),它是一種帶有密鑰(公鑰、私鑰)的消息摘要算法,用于驗(yàn)證數(shù)據(jù)完整性、認(rèn)證數(shù)據(jù)來源、抗否認(rèn)等。

④前后端加簽使用的簽名算法略有區(qū)別,可以選擇使用前后端都有的數(shù)字簽名。加簽和驗(yàn)簽使用的數(shù)字簽名算法要一致。

參照:

RSA加密、解密、簽名、驗(yàn)簽的原理及方法_rsa解密-CSDN博客

?數(shù)字簽名算法MD5withRSA-CSDN博客

前后端RSA互相加解密、加簽驗(yàn)簽、密鑰對(duì)生成(Java)_jsencrypt java-CSDN博客?

http://www.risenshineclean.com/news/54902.html

相關(guān)文章:

  • 做爰全過程教育網(wǎng)站百度競(jìng)價(jià)排名官網(wǎng)
  • 手機(jī)和電腦網(wǎng)站分開做引擎優(yōu)化搜索
  • 家庭寬帶做網(wǎng)站穩(wěn)定鄭州網(wǎng)站制作公司
  • b2b推廣平臺(tái)濟(jì)南做seo排名
  • 2 網(wǎng)站內(nèi)部鏈接優(yōu)化廣州seo技術(shù)優(yōu)化網(wǎng)站seo
  • 詩歌網(wǎng)站開發(fā)意義百度網(wǎng)站優(yōu)化培訓(xùn)
  • 眼鏡網(wǎng)站怎么做谷歌海外廣告投放推廣
  • 自己做網(wǎng)站好不好小紅書推廣方式有哪些
  • 為企業(yè)做一個(gè)網(wǎng)站多少錢旅游推廣賺傭金哪個(gè)平臺(tái)好
  • 常州手機(jī)網(wǎng)站建設(shè)新手怎么做網(wǎng)絡(luò)銷售
  • 那些語言可以做動(dòng)態(tài)網(wǎng)站qq群排名優(yōu)化軟件購(gòu)買
  • 重慶銅梁網(wǎng)站建設(shè)價(jià)格新手做seo怎么做
  • 做家鄉(xiāng)網(wǎng)站源代碼網(wǎng)站收錄查詢網(wǎng)
  • 東平建設(shè)局網(wǎng)站網(wǎng)址提交百度
  • 自己建網(wǎng)站做外貿(mào)網(wǎng)店代運(yùn)營(yíng)靠譜嗎
  • 做威客有什么靠譜網(wǎng)站怎樣推廣自己的產(chǎn)品
  • 男男做的視頻網(wǎng)站請(qǐng)簡(jiǎn)述網(wǎng)絡(luò)營(yíng)銷的特點(diǎn)
  • 廣州網(wǎng)站建設(shè)騰虎seo推廣培訓(xùn)課程
  • 山東網(wǎng)站域名備案時(shí)間廣州百度首頁優(yōu)化
  • 網(wǎng)站建設(shè)價(jià)格標(biāo)準(zhǔn)報(bào)價(jià)手機(jī)seo快速排名
  • 如何編輯網(wǎng)站內(nèi)容國(guó)內(nèi)新聞最新消息10條
  • 個(gè)人主頁怎么找安徽搜索引擎優(yōu)化seo
  • 制作網(wǎng)站需要什么關(guān)鍵詞挖掘查詢工具愛站網(wǎng)
  • wordpress多站點(diǎn)文章調(diào)用長(zhǎng)沙seo服務(wù)
  • 做網(wǎng)站如何上傳百度平臺(tái)商家
  • wordpress tracseo人才網(wǎng)
  • 網(wǎng)站域名可以更改嗎seo引擎優(yōu)化公司
  • 網(wǎng)站建設(shè)的banner圖東莞網(wǎng)站推廣方案
  • 電子商務(wù)網(wǎng)站建設(shè)的作用百度網(wǎng)址大全簡(jiǎn)單版
  • 做視頻網(wǎng)站的條件域名權(quán)重是什么意思