Tags » Private-key

Securing Communications for Java Processes

There are often situations when two processes need to establish a secure connection, like for example when one JVM calls another JVM using HTTP/HTTPS protocol. For providing encrypted communication channel HTTPS protocol is often used because of its widespread availabilty and firm foundation on public-private key big brother encryption systems, the big brother being the Certification Authorities (Like Versign etc.). 679 more words

Programming

How encryption works the really short version.

Encryption is essential for many of the things we do on the internet. There are two primary types of encryption.  Symmetric, in which the same key is used to encrypt and decrypt data, and public key in which the person receiving the encrypted information gives out a key that anyone can see, but once data is encrypted with that key only the private key can unlock it.   565 more words

Internet

Private key encryption: The Ultimate Cloud Protection

Privacy is in the headlines again, but this time it’s not spy agencies that have been snooping on phones, but opportunistic hackers. Over the last few days, a large number of celebrity photo leaks have resulted in one of the most public instances of privacy violation. 244 more words

IDrive Blog

SSL Part 2 - HTTPS - What is java truststore and identity store

In Part 1 we covered the basics of SSL, PKI. CA. Before we move to Part 3, it is important to understand the difference between trust store and identity store. 251 more words

Technical

SSH Login without Password

Your aim

You want to use Linux and OpenSSH to automate your tasks. Therefore you need an automatic login from host A / user a to Host B / user b. 276 more words

Linux

SSL Part 1 - Basic of SSL, PKI and HTTPS

This is very basic. This will help in case you are just starting with SSL. I have kept things simple to make it easy to understand. 601 more words

Technical