Tagged articles
21 articles
Page 1 of 1
Ray's Galactic Tech
Ray's Galactic Tech
Dec 5, 2025 · Operations

How to Diagnose and Fix Expired Kubernetes Certificates with kubeadm

This guide walks SREs and DevOps engineers through the typical failures caused by expired kubeadm‑issued Kubernetes certificates, explains root causes, and provides a step‑by‑step, production‑ready process for checking expiration, backing up critical directories, renewing master and worker node certificates, and verifying cluster health, with long‑term maintenance recommendations.

certificatescloud-nativekubeadm
0 likes · 7 min read
How to Diagnose and Fix Expired Kubernetes Certificates with kubeadm
MaGe Linux Operations
MaGe Linux Operations
May 24, 2025 · Information Security

Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know

This article presents the ten most frequently asked SSL/TLS questions, covering protocol differences, handshake mechanics, certificate structure, PKI, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the improvements introduced in TLS 1.3, while also highlighting why mastering these concepts is essential for security professionals.

PKISSLTLS
0 likes · 23 min read
Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jun 29, 2024 · Information Security

Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates

This article provides a thorough walkthrough of OpenSSL, covering cryptographic standards, symmetric and asymmetric encryption commands, message digests, certificate creation and management, as well as useful utilities like random number generation and password hashing, all illustrated with practical command‑line examples.

OpenSSLcertificatescryptography
0 likes · 26 min read
Master OpenSSL: A Complete Guide to Encryption, Keys, and Certificates
macrozheng
macrozheng
Aug 12, 2020 · Information Security

How to Secure Docker’s Remote API (Port 2375) with TLS and OpenSSL

Learn how to protect Docker’s exposed remote management port 2375 by generating CA, server, and client certificates with OpenSSL, configuring Docker daemon for TLS verification, and adjusting docker-maven-plugin settings to safely build and push images without exposing insecure endpoints.

DockerOpenSSLTLS
0 likes · 11 min read
How to Secure Docker’s Remote API (Port 2375) with TLS and OpenSSL
Ops Development Stories
Ops Development Stories
Mar 16, 2020 · Cloud Native

Step‑by‑Step Guide to Deploy a High‑Availability Kubernetes Cluster on CentOS

This tutorial walks through building a production‑grade Kubernetes cluster on CentOS by provisioning five virtual machines, configuring networking and DNS, generating TLS certificates with cfssl, installing Docker, setting up a private Harbor registry, and deploying core Kubernetes components such as etcd, kube‑apiserver, controller‑manager, scheduler, kubelet and kube‑proxy with full supervision and health checks.

CentOSCluster SetupDocker
0 likes · 63 min read
Step‑by‑Step Guide to Deploy a High‑Availability Kubernetes Cluster on CentOS
Alibaba Cloud Native
Alibaba Cloud Native
Feb 14, 2020 · Cloud Native

How Kubernetes Schedules Pods and Secures API Access: A Hands‑On Deep Dive

This article walks through building a simple Go web service, containerizing it, pushing the image to a registry, and then exploring how Kubernetes API Server authenticates clients with mutual TLS and how the scheduler’s pre‑filter and scoring phases decide the optimal node for a pod, complete with code snippets and log analysis.

API ServerDockerGo
0 likes · 16 min read
How Kubernetes Schedules Pods and Secures API Access: A Hands‑On Deep Dive
MaGe Linux Operations
MaGe Linux Operations
Sep 9, 2019 · Information Security

Demystifying HTTPS: How Secure HTTP Protects Your Data

This article explains what HTTPS is, why it adds encryption to HTTP, how SSL/TLS, symmetric and asymmetric cryptography, certificates, and handshakes work together to ensure confidentiality, integrity, and authenticity, and discusses the performance impact of HTTPS connections.

HTTPSTLScertificates
0 likes · 11 min read
Demystifying HTTPS: How Secure HTTP Protects Your Data
360 Tech Engineering
360 Tech Engineering
Jul 17, 2019 · Information Security

Practical SSL/TLS and Cryptography Guide Using Go and kubeadm

This article provides a comprehensive walkthrough of using Go's crypto library for hashing, symmetric and asymmetric encryption, certificate generation, and TLS/HTTPS server and client implementation, illustrating how these techniques are applied in kubeadm to simplify Kubernetes cluster security.

GoHashingKubernetes
0 likes · 18 min read
Practical SSL/TLS and Cryptography Guide Using Go and kubeadm
ITFLY8 Architecture Home
ITFLY8 Architecture Home
Aug 1, 2018 · Information Security

Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More

This article dispels seven widespread HTTPS misconceptions—from caching and certificate costs to speed and IP requirements—explaining how browsers handle secure caching, affordable SSL options, wildcard certificates, migration steps, performance impacts, and why HTTPS is essential beyond login pages.

HTTPSSSLWeb Security
0 likes · 7 min read
Debunking 7 Common HTTPS Myths: Caching, Cost, Speed, and More
MaGe Linux Operations
MaGe Linux Operations
Nov 18, 2016 · Information Security

How to Set Up an OpenVPN Server on Linux: Step‑by‑Step Guide

This tutorial walks you through installing required packages, compiling LZO and OpenVPN, configuring environment variables, generating CA, server and client certificates, packaging client files, adjusting server and client configuration files, and finally starting the OpenVPN service on a Linux host.

LZOLinuxOpenVPN
0 likes · 8 min read
How to Set Up an OpenVPN Server on Linux: Step‑by‑Step Guide
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CAHTTPSPKI
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices
Architect
Architect
Dec 16, 2015 · Information Security

Understanding HTTPS Certificates, Trust Chains, and Security Practices

This article explains how HTTPS certificates are trusted, the role of Certificate Authorities, how browsers verify signatures, common pitfalls such as compromised root certificates, and practical measures like CSP and gradual rollout strategies to ensure secure web deployments across different regions and devices.

CSPHTTPSTLS
0 likes · 8 min read
Understanding HTTPS Certificates, Trust Chains, and Security Practices