Public-Key Cryptography, which is also known as asymmetric cryptography, is a system that uses pairs of keys to encrypt and authenticate information. One key in the pair is a public key which can, as the name suggests, be distributed widely without impacting security. The second » Continue Reading.
Is is possible to protect an IP address with an SSL/TLS certificate? Yes, but only under certain circumstances: IP addresses may only be secured with Organization Validated (OV) certificates. Domain Validated (DV) and Extended Validation (EV) certificates may not be used to secure an IP » Continue Reading.
You probably already know that a code signing certificate from SSL.com will assure users that your software is from a known and trusted developer, free from unauthorized modifications and malware, and safe to install, but which code signing certificate should you buy? SSL.com offers » Continue Reading.
Organization Validation (OV) and Individual Validation (IV) certificates – also known as High Assurance certificates – require validation of an organization’s or individual’s identity and address before issuance. For website owners, an SSL.com High Assurance certificate gives visitors to your site an extra level of confidence in your web » Continue Reading.
HTTPS (Hypertext Transfer Protocol Secure) is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. HTTPS is specified by RFC 2818 (May 2000) and uses port 443 by default instead of HTTP’s port 80. An HTTPS URL begins with https:// instead of http://. Modern web browsers also indicate » Continue Reading.
SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between networked computers. Although the SSL protocol was deprecated with the release of TLS 1.0 in 1999, it is still common to refer to these » Continue Reading.
X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations. First introduced in 1988 alongside the X.500 standards for electronic directory services, X.509 has been adapted for internet use » Continue Reading.
DNS over HTTPS (DoH) uses the HTTPS protocol for sending and retrieving encrypted DNS queries and responses. The DoH protocol has been published as a proposed standard by the IETF as RFC 8484. DNS queries and responses have historically been sent as plaintext, potentially compromising the privacy of » Continue Reading.
In a man in the middle (or MITM) attack, communication between two devices in a computer network is compromised by a third party – the “man in the middle.” In a passive MITM attack attackers “tap” the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with » Continue Reading.
In computer science, an operation is idempotent if it can be performed multiple times without having a different result than the first time it was run. For example, a POST HTTPS request that updates a counter in the database is not idempotent because it alters » Continue Reading.