Explore >> Select a destination


You are here

blog.bityard.net
| | www.cesarsotovalero.net
3.0 parsecs away

Travel
| | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet.
| | dadrian.io
2.7 parsecs away

Travel
| | This post is about HTTPS (X.509) certificates used on the web1. It has two parts: Certificates explained without cryptography Certificates explained with cryptography The explanation with cryptography depends on the explanation without cryptography, so you'll want to either read both, or only read Part 1. Certificates and certification authorities, explained without cryptography Websites use certificates to prove that they're the "real" website2, and not an imposter. The certificate is used to bootstrap ...
| | squanderingti.me
2.6 parsecs away

Travel
| | A handy explanation for the fields in a digital certificate.
| | kersed.net
17.1 parsecs away

Travel
| [AI summary] The user has provided a comprehensive guide on setting up a self-hosted server, including steps for configuring SSH, securing the server, installing software, setting up domain names, and obtaining TLS/SSL certificates. The guide is detailed and covers various aspects of server management and self-hosting. The user is likely looking for a summary or a structured overview of the guide's content.