Tagged articles
206 articles
Page 1 of 3
Linux Tech Enthusiast
Linux Tech Enthusiast
May 15, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake

The article explains HTTP’s plaintext nature and its susceptibility to man‑in‑the‑middle attacks, then details how HTTPS (TLS) uses asymmetric key exchange, certificates, and a trusted CA hierarchy to establish encrypted communication and prevent such attacks.

AESCACertificate
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS Handshake
Architect's Guide
Architect's Guide
Apr 24, 2026 · Backend Development

A Powerful Open‑Source Nginx Visual Management Platform with One‑Click Docker Deployment

This article introduces an out‑of‑the‑box Nginx visual management platform that can be deployed with a single Docker‑Compose command, offering a web UI for configuring reverse proxies, SSL termination, advanced settings, and includes step‑by‑step setup, Docker network tips, health‑check configuration, and a link to the GitHub repository.

DockerDocker ComposeNGINX
0 likes · 5 min read
A Powerful Open‑Source Nginx Visual Management Platform with One‑Click Docker Deployment
MaGe Linux Operations
MaGe Linux Operations
Apr 3, 2026 · Operations

Mastering Nginx: Deep Dive into Process Model and Performance Tuning

This comprehensive guide explains Nginx’s multi‑process architecture, worker process mechanics, CPU affinity, connection handling, and key directives such as worker_processes, worker_connections, and worker_rlimit_nofile, then details load‑balancing methods, proxy buffering, caching, compression, SSL/TLS optimization, system tuning, validation, and troubleshooting for high‑performance deployments.

ConfigurationNGINXSSL
0 likes · 34 min read
Mastering Nginx: Deep Dive into Process Model and Performance Tuning
Ops Community
Ops Community
Mar 27, 2026 · Backend Development

Master Nginx Reverse Proxy on Ubuntu 24.04 & Rocky Linux 9.4 – From Installation to Monitoring

This comprehensive guide walks you through installing Nginx 1.27 on Ubuntu 24.04 LTS and Rocky Linux 9.4, configuring reverse proxy, load balancing, SSL/TLS, WebSocket and gRPC support, tuning kernel and Nginx parameters, setting up health checks, high‑availability with Keepalived, and monitoring with Prometheus and Grafana, all with ready‑to‑use code snippets and scripts.

NGINXSSLhigh availability
0 likes · 59 min read
Master Nginx Reverse Proxy on Ubuntu 24.04 & Rocky Linux 9.4 – From Installation to Monitoring
Su San Talks Tech
Su San Talks Tech
Mar 2, 2026 · Operations

How to Deploy and Manage Nginx with the Visual Nginx UI Tool

This guide introduces Nginx UI, a visual management tool for Nginx, and walks through installing it via Docker, configuring server metrics, SSL certificates, static and dynamic proxy settings, and deploying a sample e‑commerce project, demonstrating dashboard use, site and location setup, and user management.

DockerProxySSL
0 likes · 7 min read
How to Deploy and Manage Nginx with the Visual Nginx UI Tool
Linux Tech Enthusiast
Linux Tech Enthusiast
Feb 27, 2026 · Information Security

Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust

HTTPS secures web communication by replacing plaintext HTTP with TLS encryption, using asymmetric key exchange to protect symmetric keys, and relying on a hierarchical CA certificate chain to verify server identities, thereby preventing man‑in‑the‑middle attacks that exploit HTTP’s unencrypted traffic.

AESCertificate AuthorityHTTPS
0 likes · 10 min read
Why HTTPS Is Secure: From HTTP Vulnerabilities to TLS and CA Trust
Xiao Liu Lab
Xiao Liu Lab
Dec 30, 2025 · Information Security

Why Our New SSL Certificate Caused Handshake Errors and How We Fixed It

After updating a core API's SSL certificate, a partner reported repeated SSLHandshakeException errors, mistakenly labeling the cert as a development version; thorough verification revealed the issue stemmed from an outdated Java trust store lacking the new Sectigo root, leading to a set of concrete remediation steps and best‑practice lessons.

APICertificateJava
0 likes · 15 min read
Why Our New SSL Certificate Caused Handshake Errors and How We Fixed It
IT Services Circle
IT Services Circle
Dec 13, 2025 · Information Security

Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data

This article explains how HTTPS upgrades plain HTTP by adding authentication, encryption, and integrity checks, walks through its three security layers, traces the protocol’s evolution from SSL 2.0 to TLS 1.3, and discusses the practical benefits, costs, and adoption challenges of securing web traffic.

HTTPSSSLTLS
0 likes · 16 min read
Why HTTPS Is the Digital “Privacy Screen” Protecting Your Data
NiuNiu MaTe
NiuNiu MaTe
Dec 3, 2025 · Information Security

How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption

This article explains why HTTPS is essential for secure web communication, detailing how it upgrades plain HTTP by adding certificate‑based identity verification, TLS handshake negotiation, and AES‑GCM encryption with MAC verification to protect against eavesdropping, tampering, and phishing attacks.

CertificateHTTPSSSL
0 likes · 16 min read
How HTTPS Shields Your Data: From Handshake to End‑to‑End Encryption
21CTO
21CTO
Dec 2, 2025 · Information Security

What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup

Let’s Encrypt will shorten default TLS/SSL certificate lifetimes from 90 to 45 days and reduce domain‑validation reuse windows to seven hours, rolling out a trial in May 2026, a default change in July 2027, and full enforcement in August 2028, while also introducing a persistent DNS‑TXT validation method.

ACMELet’s EncryptSSL
0 likes · 4 min read
What Let’s Encrypt’s New Certificate Validity Rules Mean for Your SSL Setup
Raymond Ops
Raymond Ops
Nov 21, 2025 · Information Security

Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This article explains the fundamentals of SSL/TLS, why transport‑layer encryption is essential, and provides a hands‑on guide to using OpenSSL on Linux for symmetric and asymmetric encryption, hashing, password generation, random number creation, and base64 encoding with clear command‑line examples.

Command-lineLinuxOpenSSL
0 likes · 12 min read
Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
Xiao Liu Lab
Xiao Liu Lab
Oct 29, 2025 · Information Security

Secure MySQL 8 in 30 Minutes with 6 Production‑Ready Scripts

Learn how to transform a vulnerable MySQL 8 instance into a militarized, audit‑ready database in just half an hour by applying six ready‑to‑run shell and SQL scripts that disable high‑risk accounts, enable enterprise audit logging, enforce SSL, prune privileges, rotate root passwords, and generate compliance reports.

Audit loggingAutomationSSL
0 likes · 7 min read
Secure MySQL 8 in 30 Minutes with 6 Production‑Ready Scripts
Xiao Liu Lab
Xiao Liu Lab
Oct 29, 2025 · Databases

5 Underrated MySQL Security Settings That Block 90% of Attacks

Even if your database appears functional and backed up, a single SQL injection can expose all data; this article reveals five often‑overlooked MySQL security configurations—disabling remote root login, turning off dangerous functions, enabling audit logs, enforcing SSL, and cleaning ghost accounts—to dramatically harden your database in under 30 minutes.

Database SecuritySQL injectionSSL
0 likes · 6 min read
5 Underrated MySQL Security Settings That Block 90% of Attacks
Ops Community
Ops Community
Oct 23, 2025 · Operations

Zero‑Downtime Nginx Load Balancing: Build a 99.99% HA Architecture

This guide walks through designing and implementing a highly available Nginx load‑balancing solution—covering applicable scenarios, prerequisites, environment matrix, step‑by‑step configuration of Nginx, Keepalived, SSL termination, health checks, monitoring, performance tuning, security hardening, troubleshooting, and a concise list of best‑practice recommendations.

SSLhigh availabilitykeepalived
0 likes · 29 min read
Zero‑Downtime Nginx Load Balancing: Build a 99.99% HA Architecture
Selected Java Interview Questions
Selected Java Interview Questions
Oct 22, 2025 · Backend Development

How to Seamlessly Migrate a Spring Boot 3.0 App from HTTP to HTTPS

This comprehensive guide walks you through migrating a Spring Boot 3.0 JavaWeb application from HTTP to HTTPS, covering certificate acquisition (including Let’s Encrypt), conversion to Java keystore, Spring Boot and reverse‑proxy configuration, application adjustments, automated renewal, testing, rollback, and ongoing monitoring.

CertbotDeploymentHTTPS
0 likes · 13 min read
How to Seamlessly Migrate a Spring Boot 3.0 App from HTTP to HTTPS
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Oct 8, 2025 · Operations

Step‑by‑Step Logstash Migration from Elasticsearch 9.0 to Easysearch with Zero Downtime

This guide walks through a zero‑downtime migration from Elasticsearch 9.0 to the Easysearch compatible branch using Logstash, covering project goals, solution selection, detailed input/filter/output configurations, SSL handling, batch tuning, execution steps, and verification to ensure data integrity and ID consistency.

Data MigrationEasysearchElasticsearch
0 likes · 6 min read
Step‑by‑Step Logstash Migration from Elasticsearch 9.0 to Easysearch with Zero Downtime
Architect Chen
Architect Chen
Sep 21, 2025 · Backend Development

Mastering Nginx: Essential Directives, Server Blocks, and Performance Tweaks

This guide explains Nginx's core configuration concepts—including directives, contexts, server and location blocks—provides practical examples for setting up virtual hosts, reverse proxies, load balancing, SSL/TLS, gzip compression, and custom error pages, and offers performance‑optimisation tips for production environments.

ConfigurationSSLserver block
0 likes · 8 min read
Mastering Nginx: Essential Directives, Server Blocks, and Performance Tweaks
Mingyi World Elasticsearch
Mingyi World Elasticsearch
Jul 11, 2025 · Operations

Logstash 9.x vs Earlier Versions: Key Differences, Common Errors, and Fixes

This article compares Logstash 9.x with previous releases, shows a working 9.x configuration, explains why root execution is blocked, details the deprecation of the cacert setting in favor of ssl_certificate_authorities, and provides step‑by‑step troubleshooting tips—including permission checks and the --config.test_and_exit flag—to resolve typical startup and data‑ingestion issues.

ConfigurationElasticsearchLogstash
0 likes · 8 min read
Logstash 9.x vs Earlier Versions: Key Differences, Common Errors, and Fixes
MaGe Linux Operations
MaGe Linux Operations
Jun 22, 2025 · Information Security

Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands

This guide explains the fundamentals of SSL/TLS, why encryption occurs at the transport layer, and provides comprehensive OpenSSL command‑line examples for symmetric encryption/decryption, asymmetric key generation, hashing, password creation, and random number generation, illustrating each operation with clear syntax and usage notes.

OpenSSLSSLTLS
0 likes · 14 min read
Mastering OpenSSL: From SSL/TLS Basics to Practical Encryption Commands
MaGe Linux Operations
MaGe Linux Operations
Jun 17, 2025 · Operations

Master Nginx: Essential Configurations and Real‑World Examples

This comprehensive guide walks you through Nginx's core features, configuration syntax, and practical modules such as server blocks, load balancing, SSL, gzip compression, CORS handling, access control, and caching, complete with clear code snippets and real‑world deployment examples.

NGINXSSLload balancing
0 likes · 32 min read
Master Nginx: Essential Configurations and Real‑World Examples
Java Architect Essentials
Java Architect Essentials
Jun 7, 2025 · Information Security

How to Instantly Generate Trusted Local SSL Certificates with mkcert

This guide explains what mkcert is, its key features, and provides step‑by‑step instructions for installing the tool, generating trusted local SSL/TLS certificates for multiple domains and IPs, and configuring Nginx to enable HTTPS in a local development environment across Windows, macOS, and Linux.

CertificateHTTPSLocal Development
0 likes · 6 min read
How to Instantly Generate Trusted Local SSL Certificates with mkcert
Java One
Java One
May 25, 2025 · Information Security

How to Implement Mutual SSL Authentication in Spring Boot (HTTPS)

This guide explains the difference between one‑way and two‑way SSL/TLS authentication, shows how to generate self‑signed and CA certificates with keytool, configures Spring Boot for mutual authentication, and demonstrates testing the setup using Postman, including detailed steps, code snippets, and troubleshooting tips.

HTTPSMutual TLSPostman
0 likes · 10 min read
How to Implement Mutual SSL Authentication in Spring Boot (HTTPS)
MaGe Linux Operations
MaGe Linux Operations
May 24, 2025 · Information Security

Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know

This article presents the ten most frequently asked SSL/TLS questions, covering protocol differences, handshake mechanics, certificate structure, PKI, common vulnerabilities, perfect forward secrecy, cipher suites, revocation methods, certificate pinning, and the improvements introduced in TLS 1.3, while also highlighting why mastering these concepts is essential for security professionals.

PKISSLTLS
0 likes · 23 min read
Top 10 SSL/TLS Interview Questions Every Security Engineer Must Know
Java One
Java One
May 24, 2025 · Backend Development

How to Secure Your Spring Boot Application with HTTPS: A Step‑by‑Step Guide

This tutorial walks you through obtaining or generating SSL certificates, configuring Spring Boot to use JKS or PKCS12 keystores, redirecting HTTP to HTTPS, and distributing the certificate to clients, with complete command‑line examples and code snippets for a production‑ready setup.

HTTPSJavaSSL
0 likes · 13 min read
How to Secure Your Spring Boot Application with HTTPS: A Step‑by‑Step Guide
MaGe Linux Operations
MaGe Linux Operations
May 19, 2025 · Operations

Simplify Domain and SSL Certificate Management with a Unified Platform

This article outlines common challenges in multi‑platform domain and HTTPS certificate management, introduces a unified management platform with features like automated syncing, Let’s Encrypt integration, and multi‑channel alerts, provides a step‑by‑step Docker deployment guide, and shares a curated collection of popular open‑source monitoring tools.

Docker deploymentOperationsSSL
0 likes · 7 min read
Simplify Domain and SSL Certificate Management with a Unified Platform
Liangxu Linux
Liangxu Linux
Apr 12, 2025 · Information Security

Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates

mkcert, an open‑source tool by Filippo Valsorda, lets developers quickly create and trust local SSL/TLS certificates across Linux, macOS, and Windows without manual configuration, offering zero‑setup installation, multi‑domain support, advanced features, and simple Nginx integration for secure local testing.

CertificateHTTPSLocal Development
0 likes · 5 min read
Why mkcert Is the Easiest Way to Generate Trusted Local SSL Certificates
Top Architect
Top Architect
Apr 6, 2025 · Backend Development

Quickly Generate Trusted Local SSL/TLS Certificates with mkcert – Installation, Usage, and Nginx Configuration

This article introduces the open‑source mkcert tool for effortlessly creating locally trusted SSL/TLS certificates, provides step‑by‑step installation and usage commands for multiple platforms, shows how to configure Nginx with the generated files, and then promotes related AI and ChatGPT community offers and paid resources.

HTTPSLocal DevelopmentNGINX
0 likes · 9 min read
Quickly Generate Trusted Local SSL/TLS Certificates with mkcert – Installation, Usage, and Nginx Configuration
Practical DevOps Architecture
Practical DevOps Architecture
Mar 27, 2025 · Backend Development

Resolving 502 Bad Gateway Errors in Nginx Reverse Proxy Caused by Missing SNI Configuration

This article explains why Nginx reverse‑proxying to an HTTPS upstream can return a 502 Bad Gateway error when SNI is not sent, shows the relevant SSL handshake log, and provides a complete configuration example—including enabling proxy_ssl_server_name—to fix the issue and avoid reload‑related socket problems.

502 Bad GatewayConfigurationSNI
0 likes · 4 min read
Resolving 502 Bad Gateway Errors in Nginx Reverse Proxy Caused by Missing SNI Configuration
Linux Ops Smart Journey
Linux Ops Smart Journey
Feb 27, 2025 · Information Security

Build Military‑Grade Kafka Security in Four Easy Steps

This guide walks you through four progressive stages—basic configuration, SSL encryption, SCRAM authentication, and combined SSL+SASL—showing how to harden Kafka with certificates, keystores, and client settings to achieve financial‑level protection.

Distributed MessagingKafkaSASL
0 likes · 9 min read
Build Military‑Grade Kafka Security in Four Easy Steps
Liangxu Linux
Liangxu Linux
Feb 19, 2025 · Information Security

How to Harden Nginx: Essential Security Configurations and Best Practices

This comprehensive guide walks system administrators and developers through essential Nginx hardening steps—including hiding version info, restricting sensitive directories, custom error pages, CSP, HTTPS, SSL tuning, file permissions, security headers, rate limiting, IP whitelisting, and logging—to dramatically improve web server security.

CSPHardeningNGINX
0 likes · 31 min read
How to Harden Nginx: Essential Security Configurations and Best Practices
MaGe Linux Operations
MaGe Linux Operations
Feb 14, 2025 · Information Security

How to Harden Nginx: Essential Security Practices for Safer Web Servers

This guide provides a comprehensive, step‑by‑step hardening roadmap for Nginx, covering version hiding, directory protection, HTTPS enablement, custom error pages, CSP, file permissions, security headers, connection limits, IP whitelisting, SSL optimization, secure file uploads, common attack mitigations, logging best practices, and additional hardening measures to protect web services from a wide range of threats.

CSPHTTPSNGINX
0 likes · 31 min read
How to Harden Nginx: Essential Security Practices for Safer Web Servers
Open Source Linux
Open Source Linux
Feb 13, 2025 · Information Security

Simplify Local HTTPS with mkcert: Fast, Trusted SSL/TLS Certificates

This guide introduces mkcert, a free open‑source tool that quickly creates locally trusted SSL/TLS certificates, outlines its key features, provides step‑by‑step installation and usage instructions—including Nginx configuration—and explains how it streamlines secure development environments.

HTTPSLocal DevelopmentSSL
0 likes · 5 min read
Simplify Local HTTPS with mkcert: Fast, Trusted SSL/TLS Certificates
Raymond Ops
Raymond Ops
Jan 12, 2025 · Information Security

Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands

This guide explains common certificate formats (PEM, DER, CRT, CER), shows how to generate a CA key, CSR, and signed certificate with OpenSSL, demonstrates format conversions, and provides commands for inspecting and verifying certificates, all essential for secure operations.

CertificateDEROpenSSL
0 likes · 7 min read
Master SSL/TLS Certificates: Formats, Generation & OpenSSL Commands
Raymond Ops
Raymond Ops
Jan 4, 2025 · Information Security

Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It

SSL/TLS certificates secure data between browsers and servers, but while one‑way authentication verifies only the server, mutual (two‑way) authentication also validates the client using personal authentication certificates, requiring additional keys and CA roots, making it ideal for high‑security enterprise environments.

SSLTLSinformation security
0 likes · 8 min read
Understanding SSL Mutual Authentication vs One‑Way: When and Why to Use It
iKang Technology Team
iKang Technology Team
Dec 4, 2024 · Information Security

Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments

Enterprises should follow a six‑phase plan—inventorying domains, securing and installing SSL certificates, configuring servers, redirecting traffic, updating links and sitemaps, testing, and finally enforcing HTTPS‑only access—while monitoring performance impacts such as latency, bandwidth, CPU load, and handshake overhead.

EnterpriseHTTPSSSL
0 likes · 9 min read
Best Practices for Upgrading HTTP to HTTPS in Enterprise Environments
Top Architect
Top Architect
Nov 13, 2024 · Backend Development

Using mkcert to Quickly Generate Trusted Local SSL/TLS Certificates

This article introduces the open‑source tool mkcert, explains its features, shows how to install it on various operating systems, generate multi‑domain certificates, and configure Nginx for HTTPS, while also noting additional community resources and promotional offers.

HTTPSLocal DevelopmentSSL
0 likes · 8 min read
Using mkcert to Quickly Generate Trusted Local SSL/TLS Certificates
php Courses
php Courses
Sep 9, 2024 · Information Security

What Is ServBay Local CA and How to Manage It

This guide explains what ServBay Local CA is, how to locate it using macOS Keychain Access, and provides step‑by‑step instructions for reinstalling or deleting the certificate to resolve HTTPS errors during local development.

HTTPSKeychain AccessLocal CA
0 likes · 4 min read
What Is ServBay Local CA and How to Manage It
Python Programming Learning Circle
Python Programming Learning Circle
Sep 6, 2024 · Information Security

Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks

This article explains the fundamentals of the HTTP protocol, illustrates its vulnerability to man‑in‑the‑middle attacks, demonstrates why plain HTTP is insecure, and shows how HTTPS, TLS/SSL, asymmetric encryption, and certificate authorities together protect communications from interception and tampering.

Certificate AuthorityHTTPHTTPS
0 likes · 9 min read
Understanding HTTP, HTTPS, and How to Prevent Man‑in‑the‑Middle Attacks
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Jul 28, 2024 · Backend Development

Master Spring Boot Web Server Configuration: Switch Servers, Ports, SSL, and More

This guide explains how to switch the embedded web server in Spring Boot 3.2.5, disable it, customize ports (including random and range ports), enable HTTP compression, configure SSL and HTTP/2, add servlets, filters, listeners, set up logging, and fine‑tune Tomcat and Undertow settings, all with practical code examples.

ConfigurationHTTP/2Jetty
0 likes · 14 min read
Master Spring Boot Web Server Configuration: Switch Servers, Ports, SSL, and More
MaGe Linux Operations
MaGe Linux Operations
Feb 19, 2024 · Databases

Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data

Learn how to secure MySQL 8 connections by enabling SSL, covering the protocol’s encryption and authentication principles, generating certificates, configuring server and client settings, and testing the encrypted connection with detailed commands and practical examples.

ConfigurationDatabase SecuritySSL
0 likes · 6 min read
Secure MySQL 8 with SSL: Step-by-Step Guide to Encrypt Your Data
Test Development Learning Exchange
Test Development Learning Exchange
Nov 3, 2023 · Cloud Native

Understanding Ingress Controllers: Converting Ingress Resources to Routing Rules, Configuring Load Balancers, and Enabling SSL

This article explains how an Ingress Controller automatically translates Ingress resources into routing rules, updates service routing tables, configures load balancers, and sets up SSL/TLS by providing clear examples and YAML manifests for Kubernetes environments.

Cloud NativeLoad BalancerSSL
0 likes · 4 min read
Understanding Ingress Controllers: Converting Ingress Resources to Routing Rules, Configuring Load Balancers, and Enabling SSL
dbaplus Community
dbaplus Community
Aug 23, 2023 · Information Security

Why APISIX TLS Handshakes Failed: Missing SNI and SSLv2 Pitfalls

During a migration from Nginx to APISIX, the team encountered TLS handshake failures caused by missing SNI fields and legacy SSLv2Hello usage, leading to a detailed investigation, protocol explanations, and configuration fixes to restore secure connections without modifying client code.

APISIXKubernetesSNI
0 likes · 11 min read
Why APISIX TLS Handshakes Failed: Missing SNI and SSLv2 Pitfalls
php Courses
php Courses
Aug 21, 2023 · Backend Development

Implementing HTTPS Communication in PHP with cURL

This article explains how to secure PHP communications using HTTPS by obtaining SSL certificates, configuring cURL options, creating requests, verifying server certificates, and handling SSL errors, with complete code examples for developers.

HTTPSSSLSecurity
0 likes · 5 min read
Implementing HTTPS Communication in PHP with cURL
Architect's Tech Stack
Architect's Tech Stack
Jun 11, 2023 · Operations

Guide to Upgrading HTTP Sites to HTTPS Using acme.sh

This article explains why and how to upgrade an HTTP website to HTTPS, introduces the differences between the protocols, compares paid and free CA certificates, and provides a step‑by‑step tutorial for installing, issuing, installing, and automatically renewing certificates with the acme.sh script.

AutomationCertificateHTTPS
0 likes · 8 min read
Guide to Upgrading HTTP Sites to HTTPS Using acme.sh
AI Cyberspace
AI Cyberspace
May 27, 2023 · Information Security

Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup

This comprehensive guide explains the CIAA security model for network transmission, details confidentiality, integrity, authentication, and availability, and walks through building a private CA with OpenSSL, configuring TLS 1.2/1.3, HTTPS authentication modes, SNI/ESNI extensions, and upgrading curl for HTTP/2 support.

CertificateOpenSSLPKI
0 likes · 51 min read
Mastering SSL/TLS: From CIAA Security Model to OpenSSL CA Setup
IT Services Circle
IT Services Circle
May 10, 2023 · Backend Development

Debugging a .NET Login Hang Caused by MySQL SSL Connection Using WinDbg

An engineer troubleshoots a .NET application login freeze by capturing a dump with WinDbg, discovers the thread blocked in MySQL SSL handshake, verifies the MySQL driver version, and resolves the issue by disabling SSL via the connection string, illustrating effective debugging without source code or logs.

ConnectionStringDebuggingSSL
0 likes · 8 min read
Debugging a .NET Login Hang Caused by MySQL SSL Connection Using WinDbg
IT Xianyu
IT Xianyu
Apr 6, 2023 · Backend Development

Guide to Installing and Using Nginx Proxy Manager with Docker

This tutorial introduces Nginx Proxy Manager, a visual reverse‑proxy management interface, and provides step‑by‑step instructions for installing it via Docker‑Compose, configuring domains, setting up SSL with Let’s Encrypt, and managing proxy hosts through its web UI.

DockerDocker ComposeNGINX
0 likes · 6 min read
Guide to Installing and Using Nginx Proxy Manager with Docker
macrozheng
macrozheng
Mar 22, 2023 · Backend Development

Quickly Set Up Nginx Proxy Manager with Docker and Enable HTTPS

This guide walks you through installing Nginx Proxy Manager via Docker, configuring reverse proxy hosts, obtaining Let’s Encrypt SSL certificates, and securing access with HTTPS, all using a user‑friendly web interface suitable for beginners.

DockerSSLWeb UI
0 likes · 7 min read
Quickly Set Up Nginx Proxy Manager with Docker and Enable HTTPS
Architect's Guide
Architect's Guide
Mar 22, 2023 · Backend Development

Comprehensive Guide to Nginx: Installation, Configuration, and Performance Optimization

This extensive tutorial walks through Nginx concepts, environment setup, reverse‑proxy load balancing, static‑dynamic separation, resource compression, buffering, caching, IP whitelist/blacklist, CORS handling, anti‑hotlinking, large‑file configuration, SSL certificate setup, high‑availability with Keepalived, and key performance optimizations.

NGINXPerformance OptimizationSSL
0 likes · 41 min read
Comprehensive Guide to Nginx: Installation, Configuration, and Performance Optimization
Laravel Tech Community
Laravel Tech Community
Mar 1, 2023 · Operations

Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, and High‑Availability with Keepalived and LVS

This article provides a step‑by‑step tutorial on installing Nginx, setting up reverse proxy and various load‑balancing methods, configuring upstream directives, enabling SSL, and building high‑availability clusters using Keepalived and LVS with detailed command examples and configuration snippets.

LVSNGINXSSL
0 likes · 21 min read
Comprehensive Guide to Installing Nginx, Configuring Reverse Proxy, Load Balancing, SSL, and High‑Availability with Keepalived and LVS
MaGe Linux Operations
MaGe Linux Operations
Feb 25, 2023 · Information Security

Top 10 Website Security Threats & How to Defend Your Site

This article examines the ten most common website security attacks—from XSS and SQL injection to DDoS and phishing—explaining their motivations, mechanisms, and practical mitigation strategies such as WAF deployment, input sanitization, SSL encryption, and regular updates to help protect any online presence.

DDoSMitigationSSL
0 likes · 14 min read
Top 10 Website Security Threats & How to Defend Your Site
MaGe Linux Operations
MaGe Linux Operations
Feb 20, 2023 · Information Security

Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks

This article explains the fundamentals of HTTP, demonstrates how its plaintext nature enables man‑in‑the‑middle attacks, explores symmetric and asymmetric encryption attempts to mitigate the risk, and shows how HTTPS—through TLS handshakes, certificate validation, and a trusted CA hierarchy—provides robust protection.

Certificate AuthorityHTTPHTTPS
0 likes · 10 min read
Why HTTP Is Insecure and How HTTPS Stops Man-in-the-Middle Attacks
Architect
Architect
Feb 15, 2023 · Backend Development

Comprehensive Nginx Guide: Installation, Configuration, Load Balancing, Caching, Security, and Performance Optimization

This extensive tutorial walks through Nginx fundamentals, environment setup, reverse‑proxy load balancing, static‑dynamic separation, resource compression, buffering, proxy caching, IP black‑white listing, anti‑hotlinking, large‑file handling, SSL configuration, high‑availability with Keepalived, and key performance‑tuning techniques for production deployments.

NGINXPerformance OptimizationSSL
0 likes · 44 min read
Comprehensive Nginx Guide: Installation, Configuration, Load Balancing, Caching, Security, and Performance Optimization
Java High-Performance Architecture
Java High-Performance Architecture
Jan 28, 2023 · Backend Development

Unlock Nginx Mastery: Load Balancing, Caching, SSL, and High‑Availability Explained

This comprehensive guide walks you through Nginx fundamentals, from installing and configuring load balancing, static asset handling, compression, buffering, caching, IP access control, cross‑origin support, anti‑hotlinking, large file handling, SSL setup, high‑availability with Keepalived, and performance tuning techniques for robust backend services.

BackendProxySSL
0 likes · 44 min read
Unlock Nginx Mastery: Load Balancing, Caching, SSL, and High‑Availability Explained
Top Architect
Top Architect
Jan 19, 2023 · Backend Development

Comprehensive Guide to Nginx: Installation, Configuration, and Performance Optimization

This extensive tutorial walks through installing Nginx from source, setting up environment, configuring reverse proxy load balancing, static resource handling, compression, buffering, caching, IP black‑white lists, anti‑hotlinking, large file transfer, SSL certificates, high availability with Keepalived, and advanced performance tuning techniques.

NGINXPerformance OptimizationSSL
0 likes · 44 min read
Comprehensive Guide to Nginx: Installation, Configuration, and Performance Optimization
Huolala Tech
Huolala Tech
Jan 10, 2023 · Information Security

Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide

This article explains the fundamentals of SSL certificates, details Android’s certificate verification process, walks through common pitfalls such as expired or mismatched certificates, and provides practical solutions—including custom TrustManager implementations, revocation checks, and debugging techniques—to ensure reliable secure communication in Android apps.

AndroidCertificateSSL
0 likes · 24 min read
Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide
Code Ape Tech Column
Code Ape Tech Column
Dec 31, 2022 · Operations

nginxWebUI: Graphical Management Tool for Nginx – Installation, Configuration, and Usage Guide

This article introduces nginxWebUI, a web‑based graphical interface for managing Nginx configurations, explains its technical architecture, provides step‑by‑step installation instructions for jar, Docker and systemd service on Linux, and demonstrates how to use the UI for HTTP, TCP, SSL, load‑balancing, and remote server management.

ConfigurationDockerLinux
0 likes · 10 min read
nginxWebUI: Graphical Management Tool for Nginx – Installation, Configuration, and Usage Guide
Java Architect Essentials
Java Architect Essentials
Dec 18, 2022 · Operations

Deploy and Manage Nginx with the Open‑Source nginxWebUI Tool

This guide provides a comprehensive walkthrough of nginxWebUI—a graphical web interface for configuring and controlling Nginx—including feature overview, installation via JAR or Docker, systemd service setup, command‑line options, SSL automation, backup management, API usage, and password recovery.

ConfigurationDockerJava
0 likes · 12 min read
Deploy and Manage Nginx with the Open‑Source nginxWebUI Tool
Top Architect
Top Architect
Oct 22, 2022 · Backend Development

High‑Performance Nginx HTTPS TLS Tuning to Reduce Request Latency by 30%

This article explains why reducing Nginx HTTPS latency is crucial for instant‑search services, describes how TLS handshakes add round‑trips, and provides concrete Nginx configuration tweaks—including enabling HTTP/2, optimizing cipher suites, activating OCSP stapling, adjusting ssl_buffer_size and SSL session cache—that together cut end‑to‑end request latency by roughly 30%.

HTTP/2SSLTLS
0 likes · 15 min read
High‑Performance Nginx HTTPS TLS Tuning to Reduce Request Latency by 30%