Tagged articles
75 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Xiao Liu Lab
Xiao Liu Lab
Dec 30, 2025 · Information Security

Why Our New SSL Certificate Caused Handshake Errors and How We Fixed It

After updating a core API's SSL certificate, a partner reported repeated SSLHandshakeException errors, mistakenly labeling the cert as a development version; thorough verification revealed the issue stemmed from an outdated Java trust store lacking the new Sectigo root, leading to a set of concrete remediation steps and best‑practice lessons.

APICertificateJava
0 likes · 15 min read
Why Our New SSL Certificate Caused Handshake Errors and How We Fixed It
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
Efficient Ops
Efficient Ops
Nov 19, 2025 · Information Security

Master HTTPS Certificate Creation: From CA Basics to Automated Shell Scripts

This guide walks you through the four core stages of HTTPS certificate handling—CA distribution, domain request, validation, and data encryption—while providing detailed OpenSSL commands, Linux/Windows/macOS trust‑store paths, and a ready‑to‑run shell script for fully automated certificate generation.

AutomationCertificateHTTPS
0 likes · 17 min read
Master HTTPS Certificate Creation: From CA Basics to Automated Shell Scripts
Raymond Ops
Raymond Ops
Nov 9, 2025 · Information Security

Master CFSSL: Step‑by‑Step Guide to Generate Self‑Signed Certificates on Linux

This comprehensive tutorial explains the fundamentals of PKI, CA, CSR, and cfssl configuration, shows how to install cfssl on Linux, details the cfssl gencert command and its core parameters, and provides practical, end‑to‑end examples for creating root, intermediate, server, client, and Kubernetes certificates.

AutomationCertificateLinux
0 likes · 14 min read
Master CFSSL: Step‑by‑Step Guide to Generate Self‑Signed Certificates on Linux
Raymond Ops
Raymond Ops
Oct 26, 2025 · Information Security

Top 10 SSL/TLS Questions Every Security Pro Must Master

This comprehensive guide covers the ten most frequently asked SSL/TLS questions, explaining protocol differences, handshake processes, certificate structures, PKI components, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the key improvements introduced in TLS 1.3.

CertificateSSL/TLSTLS 1.3
0 likes · 23 min read
Top 10 SSL/TLS Questions Every Security Pro Must Master
Raymond Ops
Raymond Ops
Sep 16, 2025 · Cloud Native

How to Build a Secure High‑Availability Etcd Cluster on Linux

This guide walks through installing etcd, configuring a three‑node high‑availability cluster with TLS certificates, setting up host files, disabling SELinux and firewalld, creating a Certificate Authority using cfssl, generating node certificates, distributing them, and finally deploying and verifying the cluster on Linux systems.

CertificateCloud NativeLinux
0 likes · 19 min read
How to Build a Secure High‑Availability Etcd Cluster on Linux
Raymond Ops
Raymond Ops
Sep 9, 2025 · Operations

Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS

This tutorial walks you through installing ocserv, creating a CA and server certificates, configuring ocserv settings, adjusting kernel parameters, setting up iptables firewall rules, managing VPN users, and controlling the ocserv service on a CentOS server.

CertificateLinuxOpenConnect
0 likes · 38 min read
Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS
Raymond Ops
Raymond Ops
Aug 25, 2025 · Operations

How to Resolve Kubernetes Certificate Expiration Errors with kubeadm

When a Kubernetes cluster suddenly fails to respond with an x509 certificate expiration error, this guide walks you through using kubeadm commands to renew all certificates, update kubeconfig files, restart kubelet, and verify the new expiration dates, ensuring the cluster returns to normal operation.

CertificateOpskubeadm
0 likes · 8 min read
How to Resolve Kubernetes Certificate Expiration Errors with kubeadm
大转转FE
大转转FE
Aug 5, 2025 · Information Security

Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data

With SSL/TLS certificates now limited to 13 months and soon to just 47 days, this article explains why encryption is essential, details symmetric and asymmetric cryptography, illustrates HTTPS handshake and certificate verification, and shows how these mechanisms protect against man‑in‑the‑middle attacks.

CertificateHTTPSMITM
0 likes · 22 min read
Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data
Lin is Dream
Lin is Dream
Jul 23, 2025 · Backend Development

Why Maven's Resource Filtering Breaks Binary Certificates and How to Fix It

The article explains how Maven's default resource filtering corrupts binary .p12 certificates during packaging, causing Spring Boot startup failures, and provides a step‑by‑step solution using dual resource configurations and best practices for handling binary files in Java backend projects.

CertificateJavaResource Filtering
0 likes · 7 min read
Why Maven's Resource Filtering Breaks Binary Certificates and How to Fix It
Java Architect Essentials
Java Architect Essentials
Jun 7, 2025 · Information Security

How to Instantly Generate Trusted Local SSL Certificates with mkcert

This guide explains what mkcert is, its key features, and provides step‑by‑step instructions for installing the tool, generating trusted local SSL/TLS certificates for multiple domains and IPs, and configuring Nginx to enable HTTPS in a local development environment across Windows, macOS, and Linux.

CertificateHTTPSLocal Development
0 likes · 6 min read
How to Instantly Generate Trusted Local SSL Certificates with mkcert
Liangxu Linux
Liangxu Linux
Apr 12, 2025 · Information Security

Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates

mkcert, an open‑source tool by Filippo Valsorda, lets developers quickly create and trust local SSL/TLS certificates across Linux, macOS, and Windows without manual configuration, offering zero‑setup installation, multi‑domain support, advanced features, and simple Nginx integration for secure local testing.

CertificateHTTPSLocal Development
0 likes · 5 min read
Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates
Raymond Ops
Raymond Ops
Jan 12, 2025 · Information Security

Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands

This guide explains common certificate formats (PEM, DER, CRT, CER), shows how to generate a CA key, CSR, and signed certificate with OpenSSL, demonstrates format conversions, and provides commands for inspecting and verifying certificates, all essential for secure operations.

CertificateDEROpenSSL
0 likes · 7 min read
Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands
Practical DevOps Architecture
Practical DevOps Architecture
Nov 21, 2024 · Information Security

Python Script to Retrieve Domain SSL Certificate Expiration Date and Remaining Days

This article presents a Python script that retrieves a domain's SSL certificate information, parses its start and expiration dates, converts them to datetime objects, and calculates the remaining days until the certificate expires, providing a simple command‑line tool for monitoring certificate validity.

AutomationCertificateExpiration
0 likes · 3 min read
Python Script to Retrieve Domain SSL Certificate Expiration Date and Remaining Days
360 Smart Cloud
360 Smart Cloud
May 20, 2024 · Cloud Native

Design and Implementation of Managed (Dedicated) Kubernetes Clusters

This article introduces the concept of managed Kubernetes clusters, compares them with traditional setups, details the architecture and implementation process, discusses challenges such as cross‑cluster webhook routing, certificate issuance, container runtime integration, and outlines the diverse features of the dedicated cluster solution.

CertificateCloud NativeKubernetes
0 likes · 13 min read
Design and Implementation of Managed (Dedicated) Kubernetes Clusters
Architect's Tech Stack
Architect's Tech Stack
Jun 11, 2023 · Operations

Guide to Upgrading HTTP Sites to HTTPS Using acme.sh

This article explains why and how to upgrade an HTTP website to HTTPS, introduces the differences between the protocols, compares paid and free CA certificates, and provides a step‑by‑step tutorial for installing, issuing, installing, and automatically renewing certificates with the acme.sh script.

AutomationCertificateHTTPS
0 likes · 8 min read
Guide to Upgrading HTTP Sites to HTTPS Using acme.sh
AI Cyberspace
AI Cyberspace
May 27, 2023 · Information Security

Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup

This comprehensive guide explains the CIAA security model for network transmission, details confidentiality, integrity, authentication, and availability, and walks through building a private CA with OpenSSL, configuring TLS 1.2/1.3, HTTPS authentication modes, SNI/ESNI extensions, and upgrading curl for HTTP/2 support.

CertificateOpenSSLPKI
0 likes · 51 min read
Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup
Huolala Tech
Huolala Tech
Jan 10, 2023 · Information Security

Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide

This article explains the fundamentals of SSL certificates, details Android’s certificate verification process, walks through common pitfalls such as expired or mismatched certificates, and provides practical solutions—including custom TrustManager implementations, revocation checks, and debugging techniques—to ensure reliable secure communication in Android apps.

AndroidCertificateSSL
0 likes · 24 min read
Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide
Programmer DD
Programmer DD
Sep 22, 2022 · Backend Development

Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL

This guide walks through creating a self‑signed SSL certificate with JDK’s keytool, configuring Spring Boot to use the PKCS12 keystore, redirecting HTTP to HTTPS, and alternatively obtaining a free FreeSSL certificate, covering necessary code, configuration files, and deployment steps for both Windows and Linux environments.

CertificateHTTPSJava
0 likes · 7 min read
Generate and Configure SSL Certificates in Spring Boot with JDK Keytool & FreeSSL
Code DAO
Code DAO
May 2, 2022 · Information Security

Understanding the Principles Behind HTTPS

This article explains how HTTPS combines HTTP with SSL/TLS, walks through the TLS handshake steps, describes symmetric and asymmetric encryption, the role of X.509 certificates, digital signatures, certificate chains, and provides a hands‑on OpenSSL guide for manually verifying a server certificate.

CertificateHTTPSOpenSSL
0 likes · 25 min read
Understanding the Principles Behind HTTPS
Java Captain
Java Captain
Apr 23, 2022 · Information Security

How to Obtain and Configure an SSL Certificate for Mini Program Deployment

This guide details the step‑by‑step process of obtaining a free SSL certificate, exporting it, and configuring the server with the appropriate key‑store settings to enable HTTPS for a mini‑program, including tips on common pitfalls and verification methods.

CertificateHTTPSMini Program
0 likes · 3 min read
How to Obtain and Configure an SSL Certificate for Mini Program Deployment
IT Xianyu
IT Xianyu
Jan 23, 2022 · Information Security

Upgrading an HTTP Site to HTTPS with acme.sh

This guide explains why and how to migrate an HTTP website to HTTPS, covering the differences between the protocols, options for obtaining SSL certificates, step‑by‑step installation of the acme.sh script, generating, installing, and automatically renewing certificates using both HTTP and DNS validation methods.

AutomationCertificateHTTPS
0 likes · 9 min read
Upgrading an HTTP Site to HTTPS with acme.sh
Baidu Geek Talk
Baidu Geek Talk
Oct 13, 2021 · Mobile Development

Why iOS 15 Rejects Your Enterprise IPA and How Re‑signing Fixes It

The article explains the iOS code‑signing verification mechanism, why enterprise IPAs built for iOS 15 fail with a signature‑version error, and provides a step‑by‑step guide to re‑sign the package using newer signature formats, along with a deep dive into certificates, provisioning profiles, entitlements and the underlying cryptographic concepts.

CertificateCode SigningMobile Development
0 likes · 22 min read
Why iOS 15 Rejects Your Enterprise IPA and How Re‑signing Fixes It
php Courses
php Courses
Aug 20, 2021 · Information Security

Using FastGithub to Modify Hosts and Fix Git SSL Certificate Errors

This guide explains how to download and run FastGithub, import its local HTTPS certificate, and resolve common Git SSL certificate verification errors by adjusting Git's SSL settings, providing step‑by‑step instructions and relevant code snippets.

CertificateGitSSL
0 likes · 2 min read
Using FastGithub to Modify Hosts and Fix Git SSL Certificate Errors
MaGe Linux Operations
MaGe Linux Operations
Jun 20, 2021 · Information Security

How to Build TLS-Encrypted Socket Server and Client in Go

This article explains the fundamentals of TLS as a transport‑layer security protocol, demonstrates how to create a TLS‑encrypted socket server and client in Go, and shows how to generate and verify certificate chains using tools like mkcert.

CertificateSocketTLS
0 likes · 8 min read
How to Build TLS-Encrypted Socket Server and Client in Go
Liangxu Linux
Liangxu Linux
Dec 30, 2020 · Information Security

Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks

The article explains the vulnerabilities of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and then details how HTTPS—built on SSL/TLS, asymmetric key exchange, and CA certificate validation—prevents these attacks, providing a comprehensive overview of secure web communication.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Why HTTP Is Dangerous and How HTTPS Protects You from Man-in-the-Middle Attacks
Practical DevOps Architecture
Practical DevOps Architecture
Dec 30, 2020 · Cloud Native

Comprehensive Tutorial for Building a High‑Availability Kubernetes Cluster with Etcd and Core Components

This tutorial walks through configuring three servers, generating CA and component certificates with cfssl, deploying an etcd cluster, installing Docker, creating Kubernetes API server, controller‑manager and scheduler configurations, setting up systemd services, and verifying the health of the high‑availability Kubernetes cluster.

CertificateCloud NativeDocker
0 likes · 18 min read
Comprehensive Tutorial for Building a High‑Availability Kubernetes Cluster with Etcd and Core Components
Programmer DD
Programmer DD
Oct 17, 2020 · Operations

How to Upgrade Your Site from HTTP to HTTPS with Free acme.sh Certificates

This guide explains why you should switch from HTTP to HTTPS, compares the two protocols, shows how to obtain free or paid SSL certificates, and provides step‑by‑step instructions for installing and automating certificate issuance using the acme.sh script on Apache, Nginx or standalone servers.

AutomationCertificateSSL
0 likes · 9 min read
How to Upgrade Your Site from HTTP to HTTPS with Free acme.sh Certificates
Fulu Network R&D Team
Fulu Network R&D Team
Sep 23, 2020 · Information Security

Generating and Using P12 Certificates with BouncyCastle in .NET Core

This article explains how to generate PKCS#12 (p12) certificates using BouncyCastle in .NET Core, extract keys with OpenSSL, install the certificates on Windows, and demonstrates encryption and decryption with the generated keys, providing complete code samples and step‑by‑step instructions.

.NET CoreBouncyCastleC
0 likes · 15 min read
Generating and Using P12 Certificates with BouncyCastle in .NET Core
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
Sep 18, 2020 · Cloud Native

Why Etcd Clusters Use Odd Nodes & What Happens During Leader Election

This article explains etcd’s Raft‑based consensus, why odd‑numbered nodes are recommended, details the leader election process with log excerpts, discusses split‑brain and consistency guarantees, and provides step‑by‑step instructions for generating certificates, deploying an etcd cluster, and using etcdctl commands.

CertificateCluster DeploymentDistributed Systems
0 likes · 19 min read
Why Etcd Clusters Use Odd Nodes & What Happens During Leader Election
Wukong Talks Architecture
Wukong Talks Architecture
Jul 30, 2020 · Mobile Development

iOS Certificate Configuration Process

This guide walks through the complete iOS certificate setup, covering Apple developer registration, creation of development and distribution certificates, app ID configuration, adding test devices, and provisioning profile generation, with practical notes and code snippets for each step.

Apple DeveloperCertificateMobile Development
0 likes · 4 min read
iOS Certificate Configuration Process
Selected Java Interview Questions
Selected Java Interview Questions
Jun 16, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying cryptographic processes—including certificate verification, asymmetric and symmetric encryption, and the role of Certificate Authorities—while also addressing common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security Mechanisms of HTTPS
Efficient Ops
Efficient Ops
Mar 21, 2020 · Information Security

Why Did Apple Devices Show Certificate Errors on March 20, 2020?

In March 2020, Apple devices displayed security warnings because the HTTPS certificate for appleimap.163.com had expired due to NetEase Mail’s failure to renew it, highlighting how overlooked certificate management can disrupt services and underscoring the need for automated monitoring tools in large organizations.

AppleCertificateNetEase
0 likes · 4 min read
Why Did Apple Devices Show Certificate Errors on March 20, 2020?
Efficient Ops
Efficient Ops
Feb 19, 2020 · Information Security

How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained

This article explains how HTTPS protects data through encryption and identity authentication, describes symmetric and asymmetric algorithms, outlines PKI and certificate issuance processes, demonstrates Nginx certificate deployment, and shows how trust chains and cross‑certificates ensure reliable secure connections.

CertificateCross CertificateHTTPS
0 likes · 14 min read
How HTTPS Secures Web Traffic: Encryption, PKI, and Certificate Chains Explained
Architect's Tech Stack
Architect's Tech Stack
Jan 1, 2020 · Information Security

Understanding the Principles and Security Mechanisms of HTTPS

This article explains why HTTPS is considered secure, details its underlying TLS handshake and data transmission process, clarifies the roles of asymmetric and symmetric encryption, the necessity of CA‑issued certificates, and discusses common misconceptions such as man‑in‑the‑middle attacks and packet capture.

CertificateHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding the Principles and Security Mechanisms of HTTPS
Ziru Technology
Ziru Technology
Jul 24, 2019 · Information Security

PKI, Digital Signatures, and SSH: A Practical Guide to Modern Encryption

This article explains the fundamentals of Public Key Infrastructure (PKI), compares symmetric and asymmetric encryption, details digital signatures and certificates, and illustrates how SSH leverages these technologies for secure remote login, while also exploring their applications in IoT and code signing.

CertificatePKISSH
0 likes · 18 min read
PKI, Digital Signatures, and SSH: A Practical Guide to Modern Encryption
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
Ctrip Technology
Ctrip Technology
Aug 15, 2018 · Mobile Development

Integrating Apple Pay in iOS Apps: Process, Security, and Practical Considerations

This article provides a comprehensive overview of Apple Pay integration on iOS, covering the end‑to‑end payment flow, Apple’s security mechanisms, certificate preparation, differences between domestic and international implementations, and practical tips for developers to avoid common pitfalls.

Apple PayCertificatePayment Integration
0 likes · 16 min read
Integrating Apple Pay in iOS Apps: Process, Security, and Practical Considerations
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Dec 28, 2017 · Information Security

How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic

This article demystifies HTTPS by explaining its underlying encryption, signing, and certificate mechanisms, illustrating how zero‑knowledge proof concepts secure identity verification, and providing practical guidance on upgrading from HTTP, configuring certificates, capturing traffic with Fiddler, and understanding session recovery and performance considerations.

CertificateFiddlerHTTPS
0 likes · 11 min read
How HTTPS Uses Zero‑Knowledge Proofs to Secure Your Web Traffic
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained
ITPUB
ITPUB
May 25, 2017 · Information Security

How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive

This article explains why HTTPS is considered secure, how it prevents man‑in‑the‑middle attacks through certificate verification, details the TLS handshake captured with Wireshark, and shows the cryptographic primitives behind RSA, ECDHE and AES, including practical code snippets and the cost of using HTTPS.

CertificateHTTPSMan-in-the-Middle
0 likes · 19 min read
How HTTPS Defends Against Man‑in‑the‑Middle Attacks: A Deep Dive
WeChat Backend Team
WeChat Backend Team
Dec 12, 2016 · Information Security

Understanding TLS Handshake: Server Certificate, Key Exchange, and Client Authentication

This article explains the TLS handshake process, covering server certificate transmission, server key exchange details, certificate request handling, server hello done, client certificate usage, client key exchange mechanisms, RSA premaster secret encryption, Diffie‑Hellman and ECDH key exchanges, and the certificate verify step.

CertificateSecurityTLS
0 likes · 24 min read
Understanding TLS Handshake: Server Certificate, Key Exchange, and Client Authentication
MaGe Linux Operations
MaGe Linux Operations
Apr 20, 2016 · Information Security

Why Your SSL Certificate Is Untrusted and How to Fix It

This guide explains the five most common reasons an SSL certificate appears untrusted—such as using a self‑signed certificate, misconfigured trust chain, missing domain coverage, expiration, or lack of SNI support—and provides practical steps to resolve each issue.

CertificateSNISSL
0 likes · 6 min read
Why Your SSL Certificate Is Untrusted and How to Fix It
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudCertificateHTTPS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It