Tagged articles
36 articles
Page 1 of 1
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Ray's Galactic Tech
Ray's Galactic Tech
Jan 14, 2026 · Information Security

From Simple HTTPS to Enterprise‑Grade mTLS: Build a Secure Nginx Infrastructure

This guide explains why HTTPS only encrypts traffic while mTLS authenticates both parties, and provides a step‑by‑step solution—including environment setup, CA design, certificate generation, Nginx mutual‑TLS configuration, role‑based access, Kubernetes deployment, logging, and best‑practice recommendations—to create a production‑ready, enterprise‑level security infrastructure.

Certificate AuthorityDevOpsMutual TLS
0 likes · 8 min read
From Simple HTTPS to Enterprise‑Grade mTLS: Build a Secure Nginx Infrastructure
Architect's Guide
Architect's Guide
Oct 14, 2025 · Information Security

How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption

This article explains why HTTPS is considered secure, details the underlying TLS handshake—including certificate verification and symmetric data encryption—and clarifies common misconceptions such as the role of CAs, the possibility of man‑in‑the‑middle attacks, and whether HTTPS traffic can be intercepted.

Certificate AuthorityHTTPSMITM attack
0 likes · 11 min read
How HTTPS Secures Web Traffic: Deep Dive into Certificates and Encryption
Liangxu Linux
Liangxu Linux
Aug 26, 2025 · Information Security

How to Build a Private Certificate Authority (CA) on Linux with OpenSSL

This guide walks you through installing OpenSSL, creating a secure directory layout, configuring OpenSSL, generating a self‑signed root certificate, issuing client certificates, managing CA files, revoking certificates, and inspecting certificate details, all with clear command‑line examples and diagrams.

Certificate AuthorityLinuxOpenSSL
0 likes · 16 min read
How to Build a Private Certificate Authority (CA) on Linux with OpenSSL
Ops Community
Ops Community
Jun 18, 2025 · Information Security

How to Build Your Own Private CA on Linux with OpenSSL

Learn step-by-step how to set up a private Certificate Authority on Linux using OpenSSL, covering CA and PKI basics, directory structure, configuration files, generating root and client certificates, managing revocation lists, and essential commands for secure certificate management.

Certificate AuthorityLinuxOpenSSL
0 likes · 16 min read
How to Build Your Own Private CA on Linux with OpenSSL
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2024 · Information Security

How to Build a Private CA and Manage Certificates with OpenSSL

Learn step‑by‑step how to set up a private Certificate Authority using OpenSSL, create the necessary directory structure, configure files, generate self‑signed root certificates, issue and revoke client certificates, and understand related files and processes such as CRL, index databases, and certificate verification.

Certificate AuthorityOpenSSLPKI
0 likes · 17 min read
How to Build a Private CA and Manage Certificates with OpenSSL
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
Liangxu Linux
Liangxu Linux
Dec 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust

This article explains why HTTPS is needed, defines the protocol, describes the four security properties—confidentiality, integrity, authentication, and non‑repudiation—covers symmetric and asymmetric encryption, hybrid encryption, hash functions, digital signatures, certificate authorities, and the trust chain that together protect web communications.

Certificate AuthorityHTTPSTLS
0 likes · 15 min read
How HTTPS Secures Your Data: A Beginner’s Guide to Encryption, Integrity, and Trust
MaGe Linux Operations
MaGe Linux Operations
Nov 23, 2023 · Information Security

How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates

HTTPS protects online communications by combining TLS encryption, digital certificates, and cryptographic techniques such as symmetric and asymmetric encryption, hash functions, and certificate authorities, ensuring confidentiality, integrity, authentication, and non‑repudiation, while addressing key exchange, trust chains, and common security pitfalls.

Certificate AuthorityHTTPSTLS
0 likes · 17 min read
How HTTPS Secures Your Data: A Beginner’s Guide to TLS, Encryption, and Certificates
MaGe Linux Operations
MaGe Linux Operations
Feb 20, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamentals of HTTP, demonstrates how its plaintext nature enables man‑in‑the‑middle attacks, explores symmetric and asymmetric encryption attempts to mitigate the risk, and shows how HTTPS—through TLS handshakes, certificate validation, and a trusted CA hierarchy—provides robust protection.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
Top Architect
Top Architect
May 30, 2022 · Information Security

Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL

This article explains how to secure cross‑data‑center traffic by applying TLS principles, setting up a private Certificate Authority, generating self‑signed certificates with OpenSSL, configuring mutual TLS (mTLS) on Nginx proxies for both HTTP and TCP streams, and verifying the setup with curl and redis‑cli commands.

Certificate AuthorityNginxOpenSSL
0 likes · 24 min read
Implementing Transparent Encrypted Communication with mTLS Using Nginx and OpenSSL
Architect
Architect
May 13, 2022 · Information Security

Implementing Transparent Encrypted Communication with mTLS Using Nginx and Self‑Signed Certificates

This article explains how to secure cross‑data‑center traffic by encrypting it with TLS/mTLS, covering the principles of TLS, certificate authority roles, generating self‑signed certificates with OpenSSL, and configuring Nginx proxies for both HTTP and TCP streams to provide transparent encrypted channels without modifying applications.

Certificate AuthorityNginxOpenSSL
0 likes · 26 min read
Implementing Transparent Encrypted Communication with mTLS Using Nginx and Self‑Signed Certificates
ELab Team
ELab Team
Apr 29, 2022 · Information Security

Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS

This article explains the evolution from HTTP to HTTPS, detailing HTTP’s history, its security shortcomings, the principles of symmetric and asymmetric encryption, digital signatures, certificate authorities, and the complete HTTPS handshake process, helping readers understand how secure web communication works.

Certificate AuthorityHTTPSTLS
0 likes · 16 min read
Why HTTPS Is Essential: A Deep Dive into HTTP, Encryption, and SSL/TLS
Efficient Ops
Efficient Ops
May 16, 2021 · Information Security

Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough

This article reconstructs the design of HTTPS step by step, explaining why both symmetric and asymmetric encryption are required, how key negotiation works, the role of digital certificates and certificate authorities, and the underlying security mechanisms that protect client‑server communication.

Certificate AuthorityHTTPSTLS
0 likes · 13 min read
Why HTTPS Combines Symmetric and Asymmetric Encryption: A Deep Design Walkthrough
Programmer DD
Programmer DD
Apr 4, 2021 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article reviews the fundamentals of the HTTP protocol, explains why its plaintext transmission makes it vulnerable to man‑in‑the‑middle attacks, and details how HTTPS—through SSL/TLS, asymmetric key exchange, and CA certificate verification—protects data integrity and confidentiality.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
Java Backend Technology
Java Backend Technology
Feb 28, 2021 · Information Security

Why HTTP Is Unsafe and How HTTPS Secures Your Data

This article examines the vulnerabilities of HTTP, illustrates man‑in‑the‑middle attacks, and explains how HTTPS—through SSL/TLS handshakes, certificate authorities, and asymmetric encryption—protects communications, providing a comprehensive understanding of web security fundamentals for developers and users alike.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Unsafe and How HTTPS Secures Your Data
Python Programming Learning Circle
Python Programming Learning Circle
Jan 12, 2021 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

The article explains the vulnerabilities of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and describes the evolution of security mechanisms—including symmetric and asymmetric encryption, TLS handshakes, and certificate authority verification—that together make HTTPS a robust solution for protecting web communications.

Certificate AuthorityHTTPHTTPS
0 likes · 8 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
Java Interview Crash Guide
Java Interview Crash Guide
Jan 1, 2021 · Information Security

How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, details the role of Certificate Authorities, illustrates the handshake process, and clarifies common misconceptions about its safety and vulnerability to packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
How HTTPS Secures Your Web Traffic: Deep Dive into Protocols, Certificates, and Risks
Top Architect
Top Architect
Dec 17, 2020 · Information Security

Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, demonstrates how its plaintext transmission enables man‑in‑the‑middle attacks, and then details how HTTPS (TLS/SSL) with certificate authority verification and asymmetric key exchange secures web communication against such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How They Prevent Man‑in‑the‑Middle Attacks
Efficient Ops
Efficient Ops
Oct 8, 2020 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks

This article explains the inherent insecurity of plain HTTP, demonstrates how man‑in‑the‑middle attacks can intercept and modify traffic, and shows how HTTPS—through SSL/TLS handshakes, RSA key exchange, and a trusted CA hierarchy—protects communications from such threats.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Why HTTP Is Insecure and How HTTPS Stops Man‑in‑the‑Middle Attacks
Open Source Linux
Open Source Linux
Jul 21, 2020 · Information Security

Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide

This article explains why traditional password and key logins are vulnerable, introduces SSH certificate authentication using a Certificate Authority, and provides detailed commands and procedures for generating CA keys, issuing server and user certificates, configuring both server and client, and revoking certificates when needed.

Certificate AuthenticationCertificate AuthorityLinux
0 likes · 12 min read
Master SSH Certificate Authentication: A Step‑by‑Step Secure Login Guide
Programmer DD
Programmer DD
Jun 19, 2020 · Information Security

Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication

This article explains why HTTPS is essential for protecting privacy, ensuring data integrity, and authenticating servers, describes the evolution of SSL/TLS, and walks through the handshake process that combines asymmetric and symmetric encryption to secure web traffic.

Certificate AuthorityHTTPSSSL
0 likes · 14 min read
Why HTTPS Matters: Understanding SSL/TLS and Secure Web Communication
Architecture Digest
Architecture Digest
May 23, 2020 · Information Security

Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions

This article explains how HTTPS works by detailing the certificate verification and data transmission phases, the use of asymmetric and symmetric encryption, the role of Certificate Authorities, potential man‑in‑the‑middle attacks, browser validation steps, and why HTTPS does not fully prevent packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 11 min read
Understanding HTTPS: Principles, Security Mechanisms, and Common Misconceptions
Efficient Ops
Efficient Ops
Jan 6, 2020 · Information Security

Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls

This article thoroughly explains how HTTPS ensures secure communication by detailing its certificate verification, the use of asymmetric encryption for authentication and symmetric encryption for data transfer, the role of Certificate Authorities, common attacks like man‑in‑the‑middle, and why HTTPS alone cannot prevent all forms of packet sniffing.

Certificate AuthorityHTTPSTLS
0 likes · 12 min read
Why HTTPS Is Truly Secure: Deep Dive into Its Principles and Pitfalls
Java Captain
Java Captain
Dec 9, 2019 · Information Security

Understanding the Principles and Security of HTTPS

This article explains how HTTPS secures web communication by combining asymmetric certificate verification with symmetric data encryption, describes the role of Certificate Authorities, outlines the handshake process, discusses man‑in‑the‑middle attacks, and clarifies the limits of HTTPS against packet capture.

Certificate AuthorityHTTPSMan-in-the-Middle
0 likes · 10 min read
Understanding the Principles and Security of HTTPS
360 Tech Engineering
360 Tech Engineering
Jan 21, 2019 · Frontend Development

How to Quickly Set Up a Local HTTPS Development Environment

This guide explains why HTTPS is required for local web development, demonstrates how to create a self‑signed root CA and a wildcard domain certificate with OpenSSL, shows how to trust the root certificate on macOS, and provides example Webpack devServer and hosts file configurations for a secure local workflow.

Certificate AuthorityHTTPSLocal Development
0 likes · 6 min read
How to Quickly Set Up a Local HTTPS Development Environment
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Jul 21, 2016 · Information Security

How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential

This article explains how DNS hijacking injects unwanted ads by exploiting HTTP's lack of encryption, identity verification, and integrity checks, and demonstrates how HTTPS, with SSL/TLS encryption, certificates, and integrity validation, protects users from such attacks while also discussing performance impacts.

Certificate AuthorityDNS hijackingHTTPS
0 likes · 15 min read
How DNS Hijacking Exploits HTTP Weaknesses and Why HTTPS Is Essential
Tencent TDS Service
Tencent TDS Service
May 26, 2016 · Information Security

Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained

This article explains the fundamentals of HTTPS by comparing web communication to passing notes in a classroom, covering symmetric and asymmetric encryption, RSA key exchange, the role of Certificate Authorities, and how these mechanisms together protect against man‑in‑the‑middle attacks.

Certificate AuthorityHTTPSSSL
0 likes · 10 min read
Why HTTPS Secures Your Web Traffic: A Classroom Analogy Explained
DevOps
DevOps
Apr 17, 2016 · Information Security

Understanding HTTPS and RSA Encryption Through a Browser Dialogue

This article uses a playful conversation between browsers and a reporter to explain how HTTPS secures web traffic by employing RSA public‑key encryption, digital signatures, certificate authorities, and the challenges of performance and man‑in‑the‑middle attacks, ultimately showing why modern browsers adopted HTTPS by default.

Browser SecurityCertificate AuthorityHTTPS
0 likes · 8 min read
Understanding HTTPS and RSA Encryption Through a Browser Dialogue
MaGe Linux Operations
MaGe Linux Operations
Jun 5, 2015 · Information Security

Mastering SSL and OpenSSL: From Encryption Basics to Private CA Setup

This article explains SSL fundamentals, encryption types, PKI components, and provides step‑by‑step Linux OpenSSL commands for symmetric/asymmetric encryption, hashing, password handling, key generation, private CA creation, certificate signing, and revocation, enabling secure data transmission over networks.

Certificate AuthorityLinuxOpenSSL
0 likes · 14 min read
Mastering SSL and OpenSSL: From Encryption Basics to Private CA Setup
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2015 · Information Security

How to Build a Private CA with OpenSSL: Step‑by‑Step Guide

This article explains why encrypting network traffic is essential, introduces OpenSSL’s cryptographic components, and provides a detailed, command‑line tutorial for creating a private Certificate Authority, issuing certificates, and handling revocation within a LAN environment.

Certificate AuthorityOpenSSLPrivate CA
0 likes · 8 min read
How to Build a Private CA with OpenSSL: Step‑by‑Step Guide