What is Certificate Transparency? Certificate Transparency (CT) is a system which uses public logs to record all certificates issued by a Certificate Authority (CA). Browsers, CAs and other parties can use CT (alongside other existing techniques) to confirm a certificate was correctly issued and thus » Continue Reading.
Our 30 Day Guarantee All digital certificate products from SSL.com come with an unconditional 30 day money-back guarantee. If you are in any way dissatisfied with your certificate, then let us know within 30 days of issuance and we will refund the full price of » Continue Reading.
Yes, SSL.com’s Basic SSL certificate does work with subdomains. You may select one Fully Qualified Domain Name (FQDN) to protect with your Basic SSL certificate. This FQDN may be either a root domain (for example, yourdomain.com) or a subdomain (i.e., support.yourdomain.com). Whichever you choose, we’ll » Continue Reading.
Don’t click links in suspicious looking emails! Some of our customers have recently reported seeing emails from a suspicious address that appears to be from a subdomain of SSL.com. Please delete these emails, as they are not from us! Some points to remember: Any emails » Continue Reading.
A certificate signing request (CSR) is an encoded message that contains a public key and other relevant information such as your common name, locality and SAN entries (if applicable). Once all of the desired information has been entered during the CSR generation process, the request is digitally » Continue Reading.
Domain Control Validation (aka DV or Domain Validation) Overview In order to establish ownership or authorization to acquire an SSL Certificate for a specific domain, proof of control over the domain must be established. Domain Control Validation (DCV) can be established by the following methods: » Continue Reading.
In a man in the middle (or MITM) attack, communication between two endpoints is compromised by a third party – the ‘man in the middle’. In a passive MITM attack attackers ‘tap’ the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with the » Continue Reading.
We’re happy to accept Purchase Order requests. Please email your Purchase Order information to: email@example.com If you have any questions feel free to email us or contact us via live chat at ssl.com
Yes, you can! Certificate Authorities do not have dominion over the domains to which they provide security, that authority rests solely with the website owner. You can choose to switch SSL providers at any time, without having to consult the previous Certificate Authority. You » Continue Reading.
A cryptographic hash function converts arbitrarily long input data into a predetermined fixed-length output value. Hash functions generally include padding as well as termination schemes that work in union with the function itself to provide greater security to the output value. The most commonly used cryptographic » Continue Reading.