Tagged articles
12 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 1, 2024 · Cloud Native

Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes

This guide walks you through the fundamentals of cert-manager in Kubernetes, explaining the difference between Issuer and ClusterIssuer, and provides step‑by‑step commands to create self‑signed, CA, and ACME issuers, verify them, and reference official documentation for secure certificate automation.

ACMECAClusterIssuer
0 likes · 5 min read
Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CAHTTPSSSL/TLS
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPHTTPS
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Open Source Tech Hub
Open Source Tech Hub
Jan 22, 2021 · Information Security

How to Secure SSH Access with Certificate‑Based Authentication

This guide explains how to set up SSH certificate‑based authentication by creating a Certificate Authority, generating user and host keys, signing certificates, configuring both server and client to trust them, and managing revocation, offering a more secure alternative to password or key‑pair logins.

CACertificate AuthenticationLinux
0 likes · 13 min read
How to Secure SSH Access with Certificate‑Based Authentication
Programmer DD
Programmer DD
Sep 28, 2020 · Information Security

Why SSL Certificates Matter: Choosing the Right CA for Secure Websites

Understanding SSL certificates, their role in securing web traffic, why trusted CAs are essential, the cost factors, free options like Let’s Encrypt, and the various validation types helps developers select the appropriate certificate and configure it properly, typically via Nginx, for robust HTTPS protection.

CALet’s EncryptSSL
0 likes · 7 min read
Why SSL Certificates Matter: Choosing the Right CA for Secure Websites
Sohu Tech Products
Sohu Tech Products
Jun 24, 2020 · Information Security

Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT

This article explains how HTTPS security depends on certificates, outlines the risks of certificate forgery, describes the certificate issuance process, and introduces Certificate Transparency and the Expect-CT header as mechanisms to detect and mitigate forged certificates.

CACertificate ForgeryCertificate Transparency
0 likes · 7 min read
Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CAHTTPSPKI
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices