Tag

CA

0 views collected around this technical thread.

Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 1, 2024 · Cloud Native

Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes

This guide walks you through the fundamentals of cert-manager in Kubernetes, explaining the difference between Issuer and ClusterIssuer, and provides step‑by‑step commands to create self‑signed, CA, and ACME issuers, verify them, and reference official documentation for secure certificate automation.

ACMECAClusterIssuer
0 likes · 5 min read
Configure cert-manager Issuers & ClusterIssuers for Secure Kubernetes
Java Architect Essentials
Java Architect Essentials
Jun 27, 2024 · Information Security

Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, illustrates its susceptibility to man‑in‑the‑middle attacks, discusses symmetric and asymmetric encryption attempts, and then details how HTTPS (TLS) and the CA trust model protect data transmission from interception and tampering.

CAHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication
Sohu Tech Products
Sohu Tech Products
Apr 17, 2024 · Information Security

Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security

HTTPS secures web traffic by combining symmetric and asymmetric encryption, digital signatures, and certificate authorities within the TLS protocol to ensure confidentiality, integrity, authentication, and non‑repudiation, replacing insecure HTTP and becoming mandatory for modern browsers, servers, and platforms despite earlier concerns about cost and complexity.

CADigital CertificateEncryption
0 likes · 17 min read
Understanding HTTPS and SSL/TLS: A Comprehensive Guide to Web Security
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAEncryptionHTTP
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Architecture Digest
Architecture Digest
Feb 8, 2021 · Information Security

Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, illustrates its susceptibility to man‑in‑the‑middle attacks, discusses mitigation techniques using symmetric and asymmetric encryption, and describes how HTTPS with TLS and a CA certification system protects data integrity and confidentiality.

CAEncryptionHTTP
0 likes · 10 min read
Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication
Sohu Tech Products
Sohu Tech Products
Jun 24, 2020 · Information Security

Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT

This article explains how HTTPS security depends on certificates, outlines the risks of certificate forgery, describes the certificate issuance process, and introduces Certificate Transparency and the Expect-CT header as mechanisms to detect and mitigate forged certificates.

CACertificate ForgeryCertificate Transparency
0 likes · 7 min read
Preventing HTTPS Certificate Forgery: Certificate Transparency and Expect-CT
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CACertificatesHTTPS
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices