How to Redirect HTTP to HTTPS on Apache — The Ultimate Guide
Installing an SSL certificate on your Apache server is not the end of the process of securing your website. In fact it’s really only the beginning. Your website is still
What is SSL or TLS Perfect Forward Secrecy?
A look at perfect forward secrecy in SSL with TLS 1.3 If you’re here because you want to understand what “forward secrecy SSL” or “SSL perfect forward secrecy” means, then
What is an Exchange SSL Certificate?
What Exchange server certificates are how they’re used Microsoft Exchange and Microsoft Communications Servers are notorious for being difficult to install SSL certificates on. Or rather, they were difficult before
The Difference Between Public Key and Private Key Explained
What is the difference between private key vs public key encryption? It may not be what you think “SSL Public Keys and SSL Private Keys are like ebony and ivory,
Free SSL vs Paid SSL
The difference between free SSL and paid SSL, and why it matters Ah, the free SSL vs paid SSL question. Since you’re here, it likely means you’ve likely heard about
What is a GeoTrust RSA CA Certificate?
A breakdown of this intermediate certificate and how it’s used The GeoTrust RSA CA certificate is an intermediate root in the GeoTrust public key infrastructure (PKI) that is sometimes required
What is the SSL Certificate Chain? Explained by a Certificate Authority
A look at the SSL certificate chain order and the role it plays in the trust model There are tons of different kinds of chains: gold chains, bike chains, evolutionary
TLS vs SSL vs HTTPS
A primer on what each of these encryption terms entails and their impact on website security TLS vs SSL vs HTTPS. So many acronyms, so little time. All of these
What is Standard UCC SSL and How Does It Protect Multiple Domains?
What to know about the type of SSL certificate that protects multiple domains on multiple servers Unified communication certificates, or UCCs, are one of the most misunderstood certificate types in
What is an SSL Stripping Attack — Explained by SSL Experts
How cybercriminals strip use this form of Man-in-the-Middle attack and what you can do to stop them SSL stripping attacks make sense on an intuitive level as soon as you