Jason Joseph Nathangeekist.co·Dec 20, 2024Wildcard SSL and BeyondThis is the third article in the Taming Nginx series, where we explore creative ways to configure Nginx. In this article, we focus on securing your web server with SSL, wildcard certificates, and we touch on mutual SSL. So far, we've covered: Smarte...mutual-ssl
Syed Mahmood Alisyedmahmoodali.hashnode.dev·Dec 11, 2024Kubernetes and TLS: A Symphonic IntegrationToday, I'll demonstrate the process of issuing and approving a certificate for a new user in a Kubernetes cluster. STEP 1: Generate a private key using the following command openssl genrsa -out myuser.key 2048 STEP 2: Generate a CSR (certificate sig...Kubernetes
Denishdenish.hashnode.dev·Nov 26, 2024Boost Your Web Security with Reverse Proxies and SSL Certificates!Hello friends, gadget freaks? ✌ Now let me share with you something rather important for any Web application nowadays – security. As it seen, hackers are always coming up with new strategies and methods of penetrating through a particular system; the...proxy
Syed Mahmood Alisyedmahmoodali.hashnode.dev·Nov 19, 2024Comprehensive Guide to SSL/TLSIn today’s digital world, ensuring the security of online communications has never been more important. Every day, millions of people send personal information across the internet, from credit card numbers to social security details, and it is crucia...1 likeKubernetes
Romman Sabbirrommansabbir.com·Nov 11, 2024Network Security in Android: A Comprehensive Guide [PART 4]Network security is critical for protecting the communication between your Android app and remote servers. Without proper security measures, sensitive data like user credentials, personal information, or financial details can be intercepted, altered,...51 readsAndroid : Security, Encryption and Secure Practicescertificatepinning
Yarelys Riveracyberyara.com·Nov 4, 2024How Secure Web Traffic Happens: Step-by-Step GuideWe've all experienced that sense of relief when we see the lock icon or “your connection is secure”. But have you ever wondered what's happening behind the scenes to make that possible? Secure web traffic is essential for protecting sensitive data tr...Secure Web Traffic
Sai Keerthan Kasulakeerthankasula.hashnode.dev·Oct 27, 2024The Client-Server Communication - SSL/TLS Handshake ProcessPrologue In this article, we’ll explore the communication process between the client (browser) and server, focusing on how they exchange data and validate each other to ensure that only the intended parties are involved and that the data remains secu...SSL/TLS
tommaso borgatotommasoborgato.hashnode.dev·Oct 25, 2024WildFly to Infinispan EncryptionIntroduction When using Infinispan as an external cache for WildFly, we might want to: Encrypt communication Use a client certificate to authenticate to Infinispan Generate Keystores The first thing we need is keys and certificates to: encrypt com...infinispan
Riya Sanderriyasander.hashnode.dev·Oct 22, 2024How ACME Protocol FunctionsEveryone knows that secure communication between web servers and clients is not an easy task. The ACME protocol helps to make it easier to get and manage digital certificates. It simplifies and automates the entire process, enabling it to secure HTTP...encryption
Max Skybincloud-k8s-o11y.hashnode.dev·Oct 21, 2024Easy Installation of MicroK8s on Hetzner ServersAmong the many Kubernetes distributions I work with daily, Canonical's MicroK8s offers a lightweight and straightforward way to run clusters. When combined with Hetzner's affordable and robust cloud infrastructure, it becomes one of my favorite solut...385 readsKubernetes