Don’t click links in suspicious looking emails! Some of our customers have recently reported seeing emails from a suspicious address that appears to be from a subdomain of SSL.com. Please delete these emails, as they are not from us! Some points to remember: Any emails » Continue Reading.
A certificate signing request (CSR) is an encoded message that contains a public key and other relevant information such as your common name, locality and SAN entries (if applicable). Once all of the desired information has been entered during the CSR generation process, the request is digitally » Continue Reading.
Domain Control Validation Overview In order to establish ownership or authorization to acquire an SSL Certificate for a specific domain, proof of control over the domain must be established. Domain Control Validation (DCV) can be established by the following methods: Email Challenge Response File lookup » Continue Reading.
In a man in the middle (or MITM) attack, communication between two endpoints is compromised by a third party – the ‘man in the middle’. In a passive MITM attack attackers ‘tap’ the communication, capturing information in transit without changing it. If attackers attempt to to modify or tamper with the » Continue Reading.
We’re happy to accept Purchase Order requests. Please email your Purchase Order information to: firstname.lastname@example.org If you have any questions feel free to email us or contact us via live chat at ssl.com
Yes you can! Certificate Authorities do not have dominion over the domains to which they provide security. You can choose to switch SSL providers at any time, without having to consult the previous Certificate Authority. Just create a user account with SSL.com to order your » Continue Reading.
A cryptographic hash function converts arbitrarily long input data into a predetermined fixed-length output value. Hash functions generally include padding as well as termination schemes that work in union with the function itself to provide greater security to the output value. The most commonly used cryptographic » Continue Reading.
Yes, almost always. You are generally NOT locked into one company for your certificate needs. As long as your web host allows third-party certificates* you can quickly replace any existing certificate you have with one from SSL.com. Just create a user account with SSL.com to order your » Continue Reading.
SHA-1 is a cryptographic hash function that can convert an arbitrarily long string of data into a digest with a fixed size of 160 bits. This digest is commonly displayed as a 40 character hexadecimal number. The SHA-1 algorithm is considered insecure, and is being deprecated » Continue Reading.
SHA-2 refers to a family of cryptographic hash functions that can convert arbitrarily long strings of data into digests of a fixed size. This digest is commonly displayed as a fixed value hexadecimal number. (SHA-256, for instance, returns a 64 character code.) SHA-2 has supplanted SHA-1 in security protocols like SSL/TLS. » Continue Reading.