In computer science, an operation is idempotent if it can be performed multiple times without having a different result than the first time it was run. For example, a POST HTTPS request that updates a counter in the database is not idempotent because it alters » Continue Reading.
TLS 1.3 offers a feature called 0-RTT (zero round trip time) Resumption mode, in an effort to enhance performance. When a browser successfully completes a TLS handshake with a server for the first time, both the client and the server can store a pre-shared encryption key » Continue Reading.
TLS versions 1.0 and 1.1 are affected by a large number of protocol and implementation vulnerabilities that have been published by security researchers in the last two decades. Attacks like ROBOT affected the RSA key exchange algorithm, while LogJam and WeakDH showed that many TLS servers » Continue Reading.
In software security, downgrade attacks are network attacks that force victims to use older, more vulnerable versions of software in order to exploit known vulnerabilities against them. This has been especially dangerous in TLS clients supporting both modern and earlier versions of TLS, the latter » Continue Reading.
This how-to will walk you through the process of ordering, validating, and retrieving a Personal Pro Email and ClientAuth Certificate from SSL.com. 1. Go to the product page for Business Email, Client Authentication, and Document Signing Certificates and click the Buy Now button. 2. Choose a duration for your » Continue Reading.
HTTP Strict Transport Security (HSTS) is a web security policy mechanism designed to protect HTTPS websites against downgrade attacks and cookie hijacking. A web server configured to use HSTS instructs web browsers (or other client software) to use only HTTPS connections and disallows use of the HTTP protocol. This instruction is called the » Continue Reading.
A chain of trust is a linked path of verification and validation from an end-entity digital certificate to a root certificate authority (CA) that acts as a trust anchor. Chain of trust for www.ssl.com, showing end-entity, intermediate, and root certificates. In SSL/TLS, S/MIME, code signing, » Continue Reading.
Monthly invoices from SSL.com represent one-time charges, reflecting any unpaid balance remaining at the end of any given month. They do not reflect recurring bills. For example, if you get an invoice for $100 at the end of June, it simply means that you have » Continue Reading.
If you add any additional domains when re-processing a multi-domain certificate, your bill for the new domains will be prorated by the amount of time remaining on that certificate. However, if you change any of the domains that the certificate covers but don’t change the » Continue Reading.
By signing up for SSL.com’s referral link program, you can earn commissions of up to 25% on sales referred from your website! This how-to will walk you through signing up, retrieving a banner ad to place on your website, and creating a custom link to » Continue Reading.