en English
X

Select Language

Powered by Google TranslateTranslate

We hope you will find the Google translation service helpful, but we don’t promise that Google’s translation will be accurate or complete. You should not rely on Google’s translation. English is the official language of our site.

en English
X

Select Language

Powered by Google TranslateTranslate

We hope you will find the Google translation service helpful, but we don’t promise that Google’s translation will be accurate or complete. You should not rely on Google’s translation. English is the official language of our site.

Tag: SSL and Digital Certificates

What is SSL?

SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are protocols for establishing authenticated and encrypted links between networked computers. Although the SSL
Read More »

Sending Secure Email with S/MIME

S/MIME certificates from SSL.com are a great way for you and/or your business to send and receive authenticated and encrypted email, with trust baked-in at the operating-system level. This article gives a brief overview of what S/MIME is and how it works, and describes the various email and client authentication certificates currently offered by SSL.com.
Read More »

Browsers and Certificate Validation

Browsers are increasing in complexity every year. Even though most people use a browser every day, few know how browsers really work under the hood. This includes really important stuff, such as how browsers know an HTTPS server can be trusted. Read on for a step-by-step guide to browsers and certificate validation.
Read More »

Private vs Public PKI: Building an Effective Plan

Organizations trying to come up with a Public Key Infrastructure (PKI) plan are often confronted with the choice between public and private PKI. In an attempt to help with this decision, this article will talk about the pros and cons of both PKI solutions, and how each case can be used effectively.
Read More »

Remove or Disable a Root Certificate

What with Lenovo’s widely-misunderstood effort to give consumers more choice by overriding their security settings, your newsfeed is likely chock-a-block with references to “root certificates” and suggestions to remove or disable the one which Superfish uses to do its groovy thing. SSL.com wants you to have the knowledge you need to remove or disable any unwanted certificate. Below you will find instructions for removing a root certificate in Firefox, Internet Explorer or via Microsoft Management Console (or MMC).

Read More »

Disable a Root Certificate in Windows MMC

SSL.com wants you to be able to manage your own security architecture whenever possible, and thus presents here a method for disabling a root certificate in Windows using Microsoft Management Console (or MMC). Note that you may need to run MMC with Administrator privileges to follow the instructions below.
Read More »

Pros And Cons Of SSL / HTTPS / TLS

When it comes to the pros and cons of implementing SSL on your web server, there are real disadvantages as well as those that are merely myths. We’re going to break it down and give you the information you need to know to make an informed decision.

Taking security seriously is more important than ever when it comes to doing business online – even if you’re a publisher and not selling any physical goods or services. We got the idea for this post after seeing one over at the Nexcess blog. This is our own take on the SSL debate.

Read More »

When Not To Use a DV SSL Certificate for E-Commerce

Saving money is important for business owners and entrepreneurs, but you really have to be careful about how you go about pinching pennies. An SSL certificate that uses Domain Validation may be cheap to get, but it might not be the best way to protect sensitive data moving to your web server. This is especially true if you’re running or planning on running an ecommerce website.
Read More »