|
You are here |
neilmadden.blog | ||
| | | | |
www.cesarsotovalero.net
|
|
| | | | | This article delves into symmetric and asymmetric encryption, as the building blocks of Public Key Infrastructure (PKI). It describes how PKI allows safeguarding the authenticity and security of digital communications across the internet. | |
| | | | |
blog.wesleyac.com
|
|
| | | | | ||
| | | | |
david.nepozitek.cz
|
|
| | | | | I've reversed-engineered the X Android app to find out whether it is as secure as claimed. It is not. | |
| | | | |
jan.wildeboer.net
|
|
| | | 0. The Journey - The basics and outlook (on the series, not the Microsoft mail client ;) 1. Postfix - the in and out, so to say. The robust, battle-hardened connection point for other mail servers on the internet to send emails to and receive emails from your domain(s). Also known as the MTA, the Mail Transfer Agent. 2. Dovecot - where you and your users talk to to get emails to their mail client, be it your smartphone, a mail client on your computer or just even the command line. It's the IMAP server. 3. DKIM/DMARC/SPF - Just having postfix and dovecot up and running isn't enough. We will also look at user authentication, letsencrypt certificates, DKIM, DMARC, SPF and the daily checks to make sure everything is humming along nicely. 4. The final stuff - How... | ||