In today’s digital age, security is critical to any application. One way to enhance security is using SSL/TLS certificates to secure communications
SSL stands for Secure Sockets Layer. It is a way to keep the communication between a client and server secure and hence it safeguards data that is transferred between the two machines. It prevents a hacker from reading or modifying any information that is being transferred, which might include personal information.
Chatbots are increasingly important for companies, but they can also present security risks. Here are six tips to improve chatbot security.
Certificate chains are used to be able to verify an end user certificate against a list of intermediaries and a root authority. We are going to explain this in a bit more detail.
Transport Layer Security, better known as SSL/TLS, is an encryption protocol designed to offer secure communications over the internet to improve user privacy.
Despite billions of dollars being invested in cybersecurity technologies, the use of look-alike domains and counterfeit websites to trick people with phishing scams is on the rise. 🤷♂️
DNS has been at the heart of infrastructure since its inception in 1985. It is responsible for resolving human readable names to the IP addresses used by computer software.
Cloudflare configuration
Securing Redis installation with mTLS and accessing it from a compute instance on GCP for free.
What is Certificate Transparency Required Error?
A deep dive discussion on SSL certificate
Outdated systems can leave us vulnerable to bad actors. Zero-day exploits are common with just about every system that exists. If we do not upgrade regularly, we leave ourselves at the mercy of black-hat hackers who regularly take advantage of any out-of-date application they can find. This is equally true with OpenSSL as with anything else.
Google takes over 200 various factors for determining the website rankings in a SERP. One of the key and crucial factors is website security. If you want your website to be displayed higher in SERPs, then you must give due importance to the online security of users who’ll be visiting your site.
This is a follow up on a story that I've published a few years ago. It still receives a huge amount of traffic so I decided to update it with the latest information.
Are you aware that most internet users don’t feel secure about the protection provided by the current laws?
Read this comprehensive guide on digital signatures and digital certificates and get the difference between the two.
This is a guide to creating self-signed SSL certificates using OpenSSL on Linux. It provides easy “cut and paste” code that you will need to generate your first RSA key pair. After creating your first set of keys, you should have the confidence to create certificates for a variety of situations. RSA keys are used everywhere these days and knowing how to generate them is an essential skill to posess for system admins, and an easy procedure for the hobbiest to pick up.
This article is a beginner guide introduction to Golang and for those with experience with other languages but wish to learn the Go programming language.
What is a digital signature? It’s probably not what you think it is… in fact, you’re using several right now…
Set up two named domain websites on one server host
How can your small business avoid being a victim of a cyber fraud? Here are 10 cyber security steps for small business safety.
On 5th January 2020, the Federal Depository Library Program website was hacked by suspected Iranian cyber-criminals.
Prerequisite knowledge: Linux, SSH, SSL, Docker, Nginx, HTTP, DNS
JA3 and JA3S are TLS fingerprinting methods that may be useful in security monitoring to detect and prevent against malicious activity within encrypted traffic.
I bet you created at least once an RSA key pair, usually because you needed to connect to GitHub and you wanted to avoid typing your password every time. You diligently followed the documentation on how to create SSH keys and after a couple of minutes your setup was complete.
In the context of public key cryptography, certificates are a way to prove the identity of the owner of a public key.
Visit the /Learn Repo to find the most read stories about any technology.