智能运维
-
How To Fix The CVE-2021-40444 A New 0-Day MSHTML Remote Code Execution Vulnerability Targeting Windows Users?
Microsoft disclosed a new 0-day vulnerability (CVE-2021-40444) which is being actively exploited in the wild. In the initial analysis, it said that the flaw could be used to hijack vulnerable Windows…
-
Step-By-Step Procedure To Install SSL/TLS Certificate On Nginx Web Server!
If you have a website that is running on unsecured HTTP protocol on an Nginx web server, and you want to connect your website through a secured HTTPS channel by installing an SSL/TLS certificate on t…
-
How To Generate A CSR For A Multi-Domain SSL Certificate Using OpenSSL?
In general, SSL certificates are used to validate a single domain. However, some practical requirements force you to think about securing multiple domains with a single certificate. If you are a begi…
-
How To Export A Private Key File From A Windows Machine?
It is easy to locate and export a private key file on non-windows platforms. Both public and private keys will be created and saved in a separate file in .key or .pem extensions on non-windows platfo…
-
Step-By-Step Procedure To Install OpenSSL On The Windows Platform
OpenSSL is a small but powerful open source cross-platform utility, which can be used in various digital PKI certificate activities. OpenSSL can be used to convert the digital certificates from one t…
-
What Is A PKI Certificate? What Are The Different Types Of PKI Certificates?
As security is essential in communications via electronic networks, there is a need to develop a structure that provides high levels of security. Public Key Infrastructure is a way to provide securit…
-
6 Best Network Security Devices For Home
As the world is moving towards digitization, more and more devices in our homes are connected to the Internet than ever before, such as smartphones, smart TVs, game consoles, and tablets. However, th…
-
Microsoft Published A List Of Phishing Domains Part Of New Credential Phishing Campaign
Microsoft unveils a new credential phishing campaign that leverages an open redirect mechanism to evade security systems. Microsoft has published a long list of phishing domains actively used in this…
-
What Is STARTTLS? How STARTTLS Vulnerabilities Affect Popular Email Clients?
Transport Layer Security (TLS) is one of the best-analyzed and most widely used encryption technologies. But for historical reasons, TLS for the email protocol is generally not used directly but nego…
-
How Does FMWhatsApp Hack Your SmartPhones? What You Should Do To Prevent It?
When users see the modified WhatsApp apps offering many more features with attractive color and animation, some of them will be amazed and can’t stop themselves from installing and play with it…