Blog Archives

Japanese researchers have developed a method of data encryption for smart home


Scientists from the Japanese Tohoku University have created a new method of encrypting information transmitted in smart home systems, and machine to machine. Now the possibility of such encryption is limited – as soon as the power supply unit is

Posted in Validation, What is an SSL-Certificate Tagged with: , , , , ,

Note: encrypted traffic can be a threat!


Without any sane strategy to manage encrypted traffic, you can be vulnerable to attacks and leakage of critical data. The use of SSL and TLS is growing rapidly. This is good because it allows you to protect the privacy of

Posted in Vulnerabilities Tagged with: , , , , , ,

HTTPS Proxying and its features


The HTTPS protocol, which is a combination of standard data web protocol HTTP and cryptographic protocol SSL is almost the same age as “World Wide Web” in the form in which we know it. Based on the capabilities of traditional

Posted in How to install SSL Certificate, What is an SSL-Certificate Tagged with: , , , , , , , , ,

What you should know about SSL


The growth of cyber-attacks and the widespread news about watching by governments has resulted to the fact that the network has become filled with massive calls for improving security. An important aspect of this approach – encrypt the traffic that

Posted in What is an SSL-Certificate Tagged with: , , , , ,

All about SSL

This site is dedicated to SSL-certificates. You will learn what is an SSL certificate, how to issue and reissue it. FAQ SSL will be useful for both novices and pros. SSL Knowledgebase contains sections on validation, trust logo, vulnerabilities, SSL-certificates differences by type (Wildcard, EV, DV, etc.), as well as many other things.