Search Results

Guide to TLS standards compliance

The Transport Layer Security (TLS) protocol [01] is the primary means of protecting network communications over the Internet. It (and its predecessor, Secure Sockets Layer or SSL) have been used for decades in many applications, but most notably in browsers when they visit HTTPS sites. » Continue Reading.

PCI and NIST are deprecating TLS 1.0

Change is the only constant in internet security, and the evolution of standards to protect online traffic is a good example. In this fine article, our writer Nick Naziridis examines why major standards that impact you every day (including ones maintained by NIST and PCI » Continue Reading.

Deprecating early TLS for a safer Internet

SUMMARY: Major commercial and governmental standards organizations are now requiring use of newer, more secure versions of Transport Layer Security (TLS) to protect your information. We explain why this is a good move and what it means to you. Introduction Earlier this year, the Payment » Continue Reading.

Purchase a New Certificate

The 6 Steps to Success when ordering an SSL Certificate. Select certificate type Pay for certificate Create CSR Submit CSR Validate request Install certificate on website

Create the .well-known folder in IIS

Domain Validation can be a tricky thing, especially since it’s such an infrequent task.  If you decided to use either the HTTP or the HTTPS Hash File domain validation methods and were wondering how to create a hidden directory within IIS, then this article is » Continue Reading. Becomes an Accredited NAESB CA, a public Certificate Authority (CA), and a voting member of the CA/Browser Forum trusted by millions of users worldwide, is pleased to announce accreditation by the North American Energy Standards Board as an Independent Authorized Certification Authority. The North American Energy Standards Board (or » Continue Reading.

Comparing ECDSA vs RSA

by Nick Naziridis / June 8, 2018 Introduction Lately, there have been numerous discussions on the pros and cons of RSA[01] and ECDSA[02], in the crypto community. For the uninitiated, they are two of the most widely-used digital signature algorithms, but even for the more » Continue Reading.

Sample Valid, Revoked and Expired SSL/TLS Certificates

Valid SSL/TLS Certificates sha1 fingerprint 820B2A4178C92872B79185C9C047B9962AA0ACE9 sha-256 fingerprint 448C5A4C8FDB0913A203B892D79AEF13F72C5746228889EAD450AAF3427EDE27 Serial # 43ACB780D72D70C2 sha1 fingerprint 576B745F992D1D3FBFCFD2F850AC133C88F7F23F sha-256 fingerprint 0806B9AD5B79E04364E14F88D7F6A5651C4765BF79937AA9DFBA25DA135D0F7D Serial # 38A190AABB25C767 sha1 fingerprint 33152C7308F6DE4F1423004DEF9F62ED3A2842BC sha-256 fingerprint FE02998700EE1D0E66A5AA4F3849CE90D84FC92E8CB2E0ED2D2B33119394CE39 Serial # 1FF30119F8CF2BAA sha1 fingerprint E8FE52017D78F23528E916B1F0C8F5A9EF74CF3F sha-256 fingerprint 781B21DF88DEBEAA4F86D5C0DCD14B495410979FADFAECA050257344B819EC92 Serial # 26A9F040E0349AE8 » Continue Reading.