前面給大家項目的介紹了Docker的基礎內容Docker基礎篇接下來給大家系統的介紹下Docker高級篇的內容:網絡核心、Docker實戰、DockerCompose、Harbor以及Swarm。歡迎關注收藏哦
Docker網絡介紹
Docker是基于LinuxKernel的namespace,CGroups,UnionFileSystem等技術封裝成的一種自定義容器格式,從而提供了一套虛擬運行環境。
namespace:用來做隔離的,比如pid、net、mnt
CGroups:ControllerGroups用來做資源限制,比如內存和CPU等
UnionFileSystems:用來做Image和Container分層
1.計算機網絡模型
Docker網絡官網:https://docs.docker.com/network/。
OSI:開放系統互聯參考模型(OpenSystemInterconnect)
TCP/IP:傳輸控制協議/網際協議(TransmissionControl/InternetProtocol),是指能夠在多個不同網絡間實現信息傳輸的協議簇。TCP/IP協議不僅僅指的是TCP和IP兩個協議,而是指一個由FTP、SMTP、TCP、UDP、IP等協議構成的協議簇,只是因為在TCP/IP協議中TCP協議和IP協議最具代表性,所以被稱為TCP/IP協議。
分層思想:分層的基本想法是每一層都在它的下層提供的服務基礎上提供更高級的增值服務,而最高層提供能運行分布式應用程序的服務
在這里插入圖片描述客戶端發送請求:在這里插入圖片描述
服務端接受請求:
在這里插入圖片描述
2Liunx中網卡
2.1查看網卡信息
查看網卡的命令:ipa
$ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft85987secpreferred_lft85987secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever
PeckShield:此前網絡釣魚獲得2423萬美元的攻擊者將1ETH轉移到TornadoCash:金色財經報道,據PeckShield監測,此前攻擊某巨鯨地址獲得2423萬美元加密貨幣的網絡釣魚攻擊者將1ETH轉移到TornadoCash。
金色財經此前報道,某地址遭受網絡釣魚攻擊損失了價值2423萬美元的stETH和rETH。[2023/9/8 13:26:49]
通過ipa可以看到當前的centos中有的4個網卡信息作用分別是
名稱作用lo本地網卡eth0連接網絡的網卡eth1和宿主機通信的網卡docker0docker的網卡
iplinkshow:
$iplinkshow1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNmodeDEFAULTgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:002:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPmodeDEFAULTgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ff3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPmodeDEFAULTgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ff4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNmodeDEFAULTgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ff
以文件的形式查看網卡:ls/sys/class/net
$ls/sys/class/netdocker0eth0eth1lo
2.2配置文件
在Linux中網卡對應的其實就是文件,所以找到對應的網卡文件即可,存放的路徑
$cd/etc/sysconfig/network-scripts/$lsifcfg-eth0ifdown-ethifdown-pppifdown-tunnelifup-ipppifup-postifup-TeamPortnetwork-functions-ipv6ifcfg-eth1ifdown-ipppifdown-routesifupifup-ipv6ifup-pppifup-tunnelifcfg-loifdown-ipv6ifdown-sitifup-aliasesifup-isdnifup-routesifup-wirelessifdownifdown-isdnifdown-Teamifup-bnepifup-plipifup-sitinit.ipv6-globalifdown-bnepifdown-postifdown-TeamPortifup-ethifup-plusbifup-Teamnetwork-functions
2.3網卡操作
網卡中增加ip地址
Billions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft84918secpreferred_lft84918secinet192.168.100.120/24scopeglobaleth0Billions項目組Billions項目組增加了一個IP地址valid_lftforeverpreferred_lftforeverinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlink/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever
派盾:0xC994開頭Nomad黑客地址已將約3785枚ETH轉至中間地址并開始使用TornadoCash進行混幣:8月2日消息,派盾監測顯示,Nomad黑客地址之一0xC994...0cf599已將約1205枚ETH轉移至中間地址0x7a98...dFa308,約2580枚ETH轉移至中間地址0x8d5D...121124,并開始使用TornadoCash進行混幣。[2022/8/2 2:52:57]
刪除IP地址:ipaddrdelete192.168.100.120/24deveth0
Billions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft84847secpreferred_lft84847secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<NO-CARRIER,BROADCAST,MULTICAST,UP>mtu1500qdiscnoqueuestateDOWNgroupdefaultlik/ether02:42:bf:79:9f:debrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforever
2.4網卡信息解析
狀態:UP/DOWN/UNKOWN等
link/ether:MAC地址
inet:綁定的IP地址
3NetworkNamespace
NetworkNamespace是實現網絡虛擬化的重要功能,它能創建多個隔離的網絡空間,它們有獨自的網絡棧信息。不管是虛擬機還是容器,運行的時候仿佛自己就在獨立的網絡中。
3.1NetworkNamespce實戰
添加一個namespace
ipnetnsaddns1
查看當前具有的namespace
ipnetnslistBillions項目組ipnetnslistns1
刪除namespace
ipnetnsdeletens1Billions項目組ipnetnslistns1Billions項目組ipnetnslistBillions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoopstateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00在這里插入圖片描述啟動網絡狀態
火幣全球站現已暫停DOCK充提業務:官方消息,由于DOCK主網升級,火幣全球站現已暫停DOCK的充提業務。[2021/5/20 22:26:48]
ipnetnsexecns1ifuploBillions項目組ipnetnsexecns1ifuploBillions項目組
關掉網絡狀態
Billions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoqueuestateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00
還可以通過link來設置狀態
Billions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforeverBillions項目組ipnetnsexecns1ipa1:lo:<LOOPBACK>mtu65536qdiscnoqueuestateDOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverBillions項目組ipnetnsaddns2Billions項目組ipnetnsexecns1iplink1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNmodeDEFAULTgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:006:veth-ns1@if5:<BROADCAST,MULTICAST>mtu1500qdiscnoopstateDOWNmodeDEFAULTgroupdefaultqlen1000link/ether7e:bb:ee:13:a2:9abrdff:ff:ff:ff:ff:fflink-netnsid1Billions項目組ipnetnsexecns1iplinksetveth-ns1upBillions項目組ipa1:lo:<LOOPBACK,UP,LOWER_UP>mtu65536qdiscnoqueuestateUNKNOWNgroupdefaultqlen1000link/loopback00:00:00:00:00:00brd00:00:00:00:00:00inet127.0.0.1/8scopehostlovalid_lftforeverpreferred_lftforeverinet6::1/128scopehostvalid_lftforeverpreferred_lftforever2:eth0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether52:54:00:4d:77:d3brdff:ff:ff:ff:ff:ffinet10.0.2.15/24brd10.0.2.255scopeglobalnoprefixroutedynamiceth0valid_lft66199secpreferred_lft66199secinet6fe80::5054:ff:fe4d:77d3/64scopelinkvalid_lftforeverpreferred_lftforever3:eth1:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscpfifo_faststateUPgroupdefaultqlen1000link/ether08:00:27:6e:31:45brdff:ff:ff:ff:ff:ffinet192.168.56.10/24brd192.168.56.255scopeglobalnoprefixrouteeth1valid_lftforeverpreferred_lftforeverinet6fe80::a00:27ff:fe6e:3145/64scopelinkvalid_lftforeverpreferred_lftforever4:docker0:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuestateUPgroupdefaultlink/ether02:42:52:d4:0a:9fbrdff:ff:ff:ff:ff:ffinet172.17.0.1/16brd172.17.255.255scopeglobaldocker0valid_lftforeverpreferred_lftforeverinet6fe80::42:52ff:fed4:a9f/64scopelinkvalid_lftforeverpreferred_lftforever24:veth78a90d0@if23:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterdocker0stateUPgroupdefaultlink/ether7e:6b:8c:bf:7e:30brdff:ff:ff:ff:ff:fflink-netnsid2inet6fe80::7c6b:8cff:febf:7e30/64scopelinkvalid_lftforeverpreferred_lftforever26:vetha2bfbf4@if25:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterdocker0stateUPgroupdefaultlink/etherce:2f:ed:e5:61:32brdff:ff:ff:ff:ff:fflink-netnsid3inet6fe80::cc2f:edff:fee5:6132/64scopelinkvalid_lftforeverpreferred_lftforever
安全公司:黑客利用惡意Docker鏡像挖掘Monero:網絡安全公司Palo Alto Networks威脅研究部門Unit 42表示,最近發現的一個加密劫持挖礦方案使用惡意的Docker鏡像來隱藏加密貨幣挖礦代碼。
研究人員發現這個Docker鏡像六個變體,其中包含XMRig加密挖礦木馬,這使得黑客能夠從受損的Docker容器中挖掘門羅幣(Monero)。這些鏡像保存在官方Docker Hub存儲庫的一個賬戶中,下載次數超過200萬次。報告指出,其中一個與黑客有關的加密錢包里有大約525枚門羅幣,價值約3.6萬美元。(Data Breach Today)[2020/6/27]
然后查看tomcat01中的網絡:dockerexec-ittomcat01ipa可以發現
Billions項目組ping172.17.0.2PING172.17.0.2(172.17.0.2)56(84)bytesofdata.64bytesfrom172.17.0.2:icmp_seq=1ttl=64time=0.038ms64bytesfrom172.17.0.2:icmp_seq=2ttl=64time=0.038ms^C---172.17.0.2pingstatistics---2packetstransmitted,2received,0%packetloss,time999msrttmin/avg/max/mdev=0.038/0.038/0.038/0.000ms
既然可以ping通,而且centos和tomcat01又屬于兩個不同的NetWorkNameSpace,他們是怎么連接的?看圖
在這里插入圖片描述其實在tomcat01中有一個eth0和centos的docker0中有一個veth是成對的,類似于之前實戰中的veth-ns1和veth-ns2,要確認也很簡單
yuminstallbridge-utilsbrctlshow
執行
Billions項目組dockernetworklsNETWORKIDNAMEDRIVERSCOPE92242fc0f805bridgebridgelocal96b999d7fcc2hosthostlocal17b86f9caa33nonenulllocal
不妨檢查一下bridge:dockernetworkinspectbridge
"Containers":{"4b3500fed6b99c00b3ed1ae46bd6bc33040c77efdab343175363f32fbcf42e63":{"Name":"tomcat01","EndpointID":"40fc0925fcb59c9bb002779580107ab9601640188bf157fa57b1c2de9478053a","MacAddress":"02:42:ac:11:00:02","IPv4Address":"172.17.0.2/16","IPv6Address":""},"92d2ff3e9be523099ac4b45058c5bf4652a77a27b7053a9115ea565ab43f9ab0":{"Name":"tomcat02","EndpointID":"1d6c3bd73e3727dd368edf3cc74d2f01b5c458223f844d6188486cb26ea255bc","MacAddress":"02:42:ac:11:00:03","IPv4Address":"172.17.0.3/16","IPv6Address":""}}
在tomcat01容器中是可以訪問互聯網的,順便把這張圖畫一下咯,NAT是通過iptables實現的
在這里插入圖片描述
4.2自定義NetWork
創建一個network,類型為Bridge
dockernetworkcreatetomcat-net或者dockernetworkcreatetomcat-net--subnet=172.18.0.0/24tomcat-net
聲音 | Imperva安全公司:惡意挖礦者正利用Docker服務器漏洞挖掘Monero:據ethnews消息,網絡安全公司Imperva研究人員發布了一份報告,詳細描述了應用軟件容器制造商Docker服務器中的漏洞,Imperva發現大多數惡意行為都在挖掘Monero。根據Imperva的數據,3822個Docker容器是脆弱的,因為它們的遠程API配置錯誤,其中400個是公開的,并且可以被公眾訪問,獲得訪問權限的大多數惡意挖礦者正在使用這些容器挖掘Monero。[2019/3/6]
查看已有的NetWork:dockernetworkls
Billions項目組dockernetworklsNETWORKIDNAMEDRIVERSCOPEb5c9cfbc0410bridgebridgelocal96b999d7fcc2hosthostlocal17b86f9caa33nonenulllocal43915cba1f92tomcat-netbridgelocal
查看tomcat-net詳情信息:dockernetworkinspecttomcat-net
Billions項目組dockerrun-d--namecustom-net-tomcat--networktomcat-nettomcat-ip:1.0264b3901f8f12fd7f4cc69810be6a24de48f82402b1e5b0df364bd1ee72d8f0e
查看custom-net-tomcat的網絡信息:截取了關鍵信息
12:br-43915cba1f92:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuestateUPgroupdefaultlink/ether02:42:71:a6:67:c7brdff:ff:ff:ff:ff:ffinet172.18.0.1/16brd172.18.255.255scopeglobalbr-43915cba1f92valid_lftforeverpreferred_lftforeverinet6fe80::42:71ff:fea6:67c7/64scopelinkvalid_lftforeverpreferred_lftforever14:veth282a555@if13:<BROADCAST,MULTICAST,UP,LOWER_UP>mtu1500qdiscnoqueuemasterbr-43915cba1f92stateUPgroupdefaultlink/ether3a:3d:83:15:3f:edbrdff:ff:ff:ff:ff:fflink-netnsid3inet6fe80::383d:83ff:fe15:3fed/64scopelinkvalid_lftforeverpreferred_lftforever
查看網卡接口信息
Billions項目組dockerexec-itcustom-net-tomcatping172.17.0.2PING172.17.0.2(172.17.0.2)56(84)bytesofdata.^C---172.17.0.2pingstatistics---3packetstransmitted,0received,100%packetloss,time2000ms
此時如果tomcat01容器能夠連接上tomcat-net上應該就可以了
dockernetworkconnecttomcat-nettomcat01Billions項目組dockerexec-itcustom-net-tomcatpingtomcat01PINGtomcat01(172.18.0.3)56(84)bytesofdata.64bytesfromtomcat01.tomcat-net(172.18.0.3):icmp_seq=1ttl=64time=0.031ms
5深入分析Container網絡-Host&None
5.1Host
Host模式下,容器將共享主機的網絡堆棧,并且主機的所有接口都可供容器使用.容器的主機名將與主機系統上的主機名匹配
創建一個容器,并指定網絡為host
dockerrun-d--namemy-tomcat-host--networkhosttomcat-ip:1.0
查看ip地址
dockerexec-itmy-tomcat-hostipa
檢查host網絡
dockernetworkinspecthost"Containers":{"f495a6892d422e61daab01e3fcfa4abb515753e5f9390af44c93cae376ca7464":{"Name":"my-tomcat-host","EndpointID":"77012b1ac5d15bde3105d2eb2fe0e58a5ef78fb44a88dc8b655d373d36cde5da","MacAddress":"","IPv4Address":"","IPv6Address":""}}
5.2None
None模式不會為容器配置任何IP,也不能訪問外部網絡以及其他容器.它具有環回地址,可用于運行批處理作業.
創建一個tomcat容器,并指定網絡為none
dockerrun-d--namemy-tomcat-none--networknonetomcat-ip:1.0
查看ip地址
dockerexec-itmy-tomcat-none
檢查none網絡
dockernetworkinspectnone"Containers":{"c957b61dae93fbb9275acf73c370e5df1aaf44a986579ee43ab751f790220807":{"Name":"my-tomcat-none","EndpointID":"16bf30fb7328ceb433b55574dc071bf346efa58e2eb92b6f40d7a902ddc94293","MacAddress":"","IPv4Address":"","IPv6Address":""}}
6端口映射
創建一個tomcat容器,名稱為port-tomcat
dockerrun-d--nameport-tomcattomcat-ip:1.0
思考如何訪問tomcat的服務
dockerexec-itport-tomcatbashcurllocalhost:8080
如果要載centos7上訪問呢
dockerexec-itport-tomcatipacurl172.17.0.4:8080
如果我們需要在centos中通過localhost來訪問呢?這時我們就需要將port-tomcat中的8080端口映射到centos上了
dockerrm-fport-tomcatdockerrun-d--nameport-tomcat-p8090:8080tomcat-ip:1.0curllocalhost:8090
centos7是運行在win10上的虛擬機,如果想要在win10上通過ip:port方式訪問呢?
Billions項目組這種方式等同于橋接網絡。也可以給該網絡指定使用物理機哪一塊網卡,比如#config.vm.network"public_network",:bridge=>'en1:Wi-Fi(AirPort)'config.vm.network"public_network"centos7:ipa--->192.168.8.118win10:瀏覽器訪問192.168.8.118:9080在這里插入圖片描述
7多機之間通信
具體深入介紹會在DockerSwarm中詳聊,本節簡單介紹。
在同一臺centos7機器上,發現無論怎么折騰,我們一定有辦法讓兩個container通信。那如果是在兩臺centos7機器上呢?畫個圖
在這里插入圖片描述VXLAN技術實現:VirtualExtensibleLAN(虛擬可擴展局域網)。在這里插入圖片描述
ps:掌握了Docker的網絡,其實也就掌握整個技術的核心了,如果文章有幫助歡迎關注點贊收藏哦
https://www.ixiera.com
轉自鏈聞ChainNews 雖然合成資產概念近兩年內在去中心化金融領域增長迅猛,但是目前DeFi的合成資產協議仍普遍局限于簡單合成「股票」及「加密貨幣」等資產.
1900/1/1 0:00:00“玩客幣騙錢,陳磊騙子還我血汗錢!”近日,網友發帖稱,有投資者到迅雷總部拉橫幅示威,要求迅雷CEO陳磊還錢.
1900/1/1 0:00:00特朗普宣誓就職,美國正式進入“網紅總統”時代。特朗普新政將如何影響中國經濟?2017年中國宏觀經濟將面臨怎樣的局面?交通銀行金融研究中心此前發布了總篇幅超過5萬字的《2017年中國宏觀經濟金融展.
1900/1/1 0:00:00編者按:這里是36氪推出的欄目,盤點當天國內外投融資動態。今日國內的焦點是:以外貿B2C電子商務運營為核心業務賽維電商獲得2.22億人民幣定增融資,海外的投融資關注重點是:基因組數據提供商Med.
1900/1/1 0:00:00作者/曹樂溪 “我們allin區塊鏈了。”雙方落座沒多久,拍片網CEO夏攀就語出驚人。而且他還說,他是“被逼著做的”.
1900/1/1 0:00:00比特幣白皮書 Bitcoin:APeer-to-PeerElectronicCashSystemSatoshiNakamotosatoshin@gmx.comwww.bitcoin.
1900/1/1 0:00:00