|
You are here |
blog.bityard.net | ||
| | | | |
www.cesarsotovalero.net
|
|
| | | | | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet. | |
| | | | |
dadrian.io
|
|
| | | | | This post is about HTTPS (X.509) certificates used on the web1. It has two parts: Certificates explained without cryptography Certificates explained with cryptography The explanation with cryptography depends on the explanation without cryptography, so you'll want to either read both, or only read Part 1. Certificates and certification authorities, explained without cryptography Websites use certificates to prove that they're the "real" website2, and not an imposter. The certificate is used to bootstrap ... | |
| | | | |
squanderingti.me
|
|
| | | | | A handy explanation for the fields in a digital certificate. | |
| | | | |
kersed.net
|
|
| | | [AI summary] The user has provided a comprehensive guide on setting up a self-hosted server, including steps for configuring SSH, securing the server, installing software, setting up domain names, and obtaining TLS/SSL certificates. The guide is detailed and covers various aspects of server management and self-hosting. The user is likely looking for a summary or a structured overview of the guide's content. | ||