Both SSL and TLS protocols aim to protect sensitive information used during transactions such as payment processing that requires authentication to prove the identity of our server to the users. TLS 1.3 is the latest version of the TLS protocol. It is a descendent of SSL and is regarded to be more powerful and effective. …
David Cao
The port number for SSH is 22 by default. Whenever we run a command through default SSH port number 22, a connection is established between client and server. Every connection initializes through this port. This tutorial explains why and how to change the default SSH port in Linux. Why should we change the default SSH …
SSH (Secure Shell) is a widely used network protocol to securely log onto remote systems. One of its features is /SSH Port Forwarding/ (or SSH tunneling). This functionality forwards encrypted connections between a local and a remote computer. There are 3 types of port forwarding: local port forwarding Reverse port forwarding dynamic port forwarding The …
A self-signed certificate is a security certificate that is not signed by a certificate authority (CA). These certificates are easy to make and do not cost money. The Self-signed SSL certificate is mainly used for non-production applications or other experiments. In this article, we will cover 2 ways to create a self-signed certificate. Is a …
If you need to generate a CSR (certificate signing request) for your website, you can do so using the OpenSSL command. In this blog post, we will discuss two methods that you can use to create a CSR using OpenSSL. We will also provide instructions on how to use each method. Let’s get started! What …
X.509 is a standard format for public key certificates, digital documents that securely associate cryptographic key pairs with identities such as websites, individuals, or organizations. It can be used for authenticated and encrypted web browsing, signed and encrypted email etc. X509 Certificate Version X.509 Version 1 has been available since 1988, is widely deployed, and …
OpenSSL is an open-source command-line tool that is commonly used to generate private keys, create CSRs, install our SSL/TLS certificate, and identify certificate information. This quick reference can help us understand the most common OpenSSL commands and how to use them. How to get an SSL Certificate generate a key pair use this key pair …
The Linux find command is a powerful tool that enables system administrators to locate and manage files and directories based on a wide range of search criteria. It can find directories and files by their name, their type, or extension, size, permissions, etc. Find Command Syntax The general syntax for the find command is as …
The best way to find files by name in Linux is using the find command with the “-name” option. This command will search through the directories for files that have the specific word in their name. This can be very useful when you need to find a specific file and don’t know where it is …
Grep is a Linux / Unix command-line tool used to search for a string of characters in a specified file. When it finds a match, it prints the line with the result. The grep command is handy when searching through large log files. Grep lets us enter a pattern of text and then it searches …