Tag

digital certificates

0 views collected around this technical thread.

Raymond Ops
Raymond Ops
Mar 18, 2025 · Information Security

Master OpenSSL: From Symmetric Encryption to Digital Certificates

This comprehensive guide explains OpenSSL’s role in cryptography, covering symmetric and asymmetric encryption, hashing, key generation, certificate creation, and practical command‑line examples for encrypting files, managing keys, signing data, and configuring TLS servers, empowering readers to master secure communications.

EncryptionOpenSSLcommand line
0 likes · 24 min read
Master OpenSSL: From Symmetric Encryption to Digital Certificates
DevOps Engineer
DevOps Engineer
Apr 29, 2024 · Information Security

Understanding Code Signing: Importance, Process, and Tool Comparison

This article explains what code signing is, why it is essential for software integrity and trust, outlines the signing process, compares traditional code signing certificates with the GaraSign cloud service, and offers guidance on choosing the right solution based on cost, scalability, and compliance needs.

Software Securitycode signingdigital certificates
0 likes · 7 min read
Understanding Code Signing: Importance, Process, and Tool Comparison
ZhongAn Tech Team
ZhongAn Tech Team
Oct 9, 2023 · Information Security

Network Security Communication: Principles, Protocols, and Implementation in the ZA App

This article explains the fundamentals of symmetric and asymmetric encryption, one‑way and trapdoor functions, forward secrecy, TLS handshake, and how the ZA financial app applies a multi‑layered secure communication protocol—including certificate verification, replay protection, payload encryption, and request signing—to achieve robust, high‑performance network security across iOS, Android, and web platforms.

EncryptionNetwork SecurityTLS
0 likes · 21 min read
Network Security Communication: Principles, Protocols, and Implementation in the ZA App
Ops Development Stories
Ops Development Stories
Aug 21, 2023 · Information Security

Mastering HTTPS: From Digital Certificates to One‑Way & Two‑Way Auth in Kubernetes

This tutorial explains digital certificate fundamentals, common formats, the principles of one‑way and two‑way HTTPS authentication, and provides step‑by‑step Kubernetes configurations—including secret creation and Ingress setup—to implement secure TLS communication.

AuthenticationHTTPSIngress
0 likes · 15 min read
Mastering HTTPS: From Digital Certificates to One‑Way & Two‑Way Auth in Kubernetes
Sanyou's Java Diary
Sanyou's Java Diary
Feb 2, 2023 · Information Security

Why HTTPS Beats HTTP: Encryption, Handshakes, and Digital Certificates Explained

This article explains why HTTP is insecure, how HTTPS uses encryption, integrity checks, digital certificates, and a hybrid of symmetric and asymmetric cryptography, and details the SSL/TLS handshake process that secures data transmission over the web.

EncryptionHTTPSNetwork Security
0 likes · 18 min read
Why HTTPS Beats HTTP: Encryption, Handshakes, and Digital Certificates Explained
37 Mobile Game Tech Team
37 Mobile Game Tech Team
Apr 8, 2021 · Information Security

Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes

HTTPS enhances web security over HTTP by encrypting data, authenticating parties with digital certificates, and employing a combined symmetric‑asymmetric handshake using SSL/TLS, which ensures confidentiality, integrity, and trust through certificate chains, hash functions, and secure key exchange mechanisms.

EncryptionHTTPSNetwork Security
0 likes · 18 min read
Why HTTPS Beats HTTP: Inside SSL/TLS, Certificates & Secure Handshakes
JD Retail Technology
JD Retail Technology
Dec 19, 2019 · Mobile Development

Understanding iOS App Signing Mechanism and Its Underlying Cryptography

This article explains the iOS app signing process, covering symmetric encryption, public‑key cryptography, hybrid cryptosystems, digital signatures, certificates, and how Apple verifies app packages during distribution and on‑device installation, providing both beginner and advanced insights.

App DistributionMobile Securitycode signing
0 likes · 13 min read
Understanding iOS App Signing Mechanism and Its Underlying Cryptography
Efficient Ops
Efficient Ops
Nov 12, 2019 · Information Security

Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)

This article walks through the design of HTTPS, showing how symmetric encryption secures data while asymmetric encryption safely negotiates keys, and explains the role of digital certificates and certificate authorities in preventing man‑in‑the‑middle attacks.

EncryptionHTTPSTLS
0 likes · 13 min read
Why HTTPS Needs Both Symmetric and Asymmetric Encryption (Explained)
Efficient Ops
Efficient Ops
Feb 28, 2016 · Information Security

How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics

This article breaks down the monthly expenses hackers incur for tools, services, and infrastructure, then reveals how much they can earn through ransomware, malicious certificates, fake antivirus, IP reputation abuse, web shells, and user data trading, highlighting the lucrative yet risky nature of cybercrime.

cybersecuritydata theftdigital certificates
0 likes · 9 min read
How Much Do Hackers Spend and Earn? A Deep Dive into Cybercrime Economics