Tag

Certificates

0 views collected around this technical thread.

Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 7, 2022 · Information Security

Understanding TLS/SSL and Encrypted Connections in MySQL

This article explains the differences between TLS and SSL, details the TLS handshake and certificate mechanisms, and provides step‑by‑step guidance for configuring encrypted connections on MySQL servers, clients, and JDBC drivers.

CertificatesJDBCSSL
0 likes · 16 min read
Understanding TLS/SSL and Encrypted Connections in MySQL
Ops Development Stories
Ops Development Stories
Jan 6, 2021 · Cloud Native

Step-by-Step Guide to Upgrade a Kubernetes Cluster from v1.17.9 to v1.18.9

This tutorial explains how to safely back up a kubeadm‑managed Kubernetes cluster, upgrade the control‑plane from version 1.17.9 to 1.18.9, update master and worker nodes, verify the upgrade, and handle certificate renewal and recovery in case of failures.

BackupCertificatescluster upgrade
0 likes · 17 min read
Step-by-Step Guide to Upgrade a Kubernetes Cluster from v1.17.9 to v1.18.9
macrozheng
macrozheng
Aug 12, 2020 · Information Security

How to Secure Docker’s Remote API (Port 2375) with TLS and OpenSSL

Learn how to protect Docker’s exposed remote management port 2375 by generating CA, server, and client certificates with OpenSSL, configuring Docker daemon for TLS verification, and adjusting docker-maven-plugin settings to safely build and push images without exposing insecure endpoints.

CertificatesDockerOpenSSL
0 likes · 11 min read
How to Secure Docker’s Remote API (Port 2375) with TLS and OpenSSL
Ops Development Stories
Ops Development Stories
Mar 16, 2020 · Cloud Native

Step‑by‑Step Guide to Deploy a High‑Availability Kubernetes Cluster on CentOS

This tutorial walks through building a production‑grade Kubernetes cluster on CentOS by provisioning five virtual machines, configuring networking and DNS, generating TLS certificates with cfssl, installing Docker, setting up a private Harbor registry, and deploying core Kubernetes components such as etcd, kube‑apiserver, controller‑manager, scheduler, kubelet and kube‑proxy with full supervision and health checks.

CentOSCertificatesCluster Setup
0 likes · 63 min read
Step‑by‑Step Guide to Deploy a High‑Availability Kubernetes Cluster on CentOS
360 Tech Engineering
360 Tech Engineering
Jul 17, 2019 · Information Security

Practical SSL/TLS and Cryptography Guide Using Go and kubeadm

This article provides a comprehensive walkthrough of using Go's crypto library for hashing, symmetric and asymmetric encryption, certificate generation, and TLS/HTTPS server and client implementation, illustrating how these techniques are applied in kubeadm to simplify Kubernetes cluster security.

CertificatesGoTLS
0 likes · 18 min read
Practical SSL/TLS and Cryptography Guide Using Go and kubeadm
360 Quality & Efficiency
360 Quality & Efficiency
Feb 22, 2019 · Information Security

Understanding HTTPS, Certificate Trust Chains, and Fiddler Decryption Techniques

This article explains the HTTPS handshake, the role of CA and root certificates, how trust chains work, and provides a step‑by‑step guide to using Fiddler for HTTPS decryption on Android, including OpenSSL commands for extracting public keys.

CertificatesFiddlerHTTPS
0 likes · 7 min read
Understanding HTTPS, Certificate Trust Chains, and Fiddler Decryption Techniques
UC Tech Team
UC Tech Team
Nov 27, 2018 · Information Security

Introduction to HTTPS: Principles, TLS Handshake, Certificate Management, and Cipher Suites

This article explains what HTTPS is, why it is needed, how TLS handshakes secure communication using asymmetric and symmetric encryption, the role of digital certificates and trust chains, methods of certificate revocation, and how to choose appropriate cipher suites for optimal security and performance.

CertificatesHTTPSTLS
0 likes · 9 min read
Introduction to HTTPS: Principles, TLS Handshake, Certificate Management, and Cipher Suites
Baidu Intelligent Testing
Baidu Intelligent Testing
Oct 17, 2017 · Mobile Development

Understanding iOS Code Signing, Certificates, Provisioning Profiles, and Re‑signing

This article explains the iOS code‑signing process for developers, covering Apple developer account enrollment, certificate creation, private key generation, provisioning profile types, automatic signing in Xcode, and step‑by‑step re‑signing of IPA files using the codesign tool.

CertificatesMobile DevelopmentProvisioning Profile
0 likes · 7 min read
Understanding iOS Code Signing, Certificates, Provisioning Profiles, and Re‑signing
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 22, 2016 · Information Security

Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices

This article explains the fundamentals of server certificates, private keys, and certificate authorities, classifies DV/OV/EV certificates, describes how to generate and inspect them, outlines CA history and notable incidents, and discusses PKI security measures such as HPKP and Certificate Transparency.

CACertificatesHTTPS
0 likes · 12 min read
Understanding SSL/TLS Certificates, CAs, and PKI: Types, Generation, History, and Security Practices
Architect
Architect
Dec 16, 2015 · Information Security

Understanding HTTPS Certificates, Trust Chains, and Security Practices

This article explains how HTTPS certificates are trusted, the role of Certificate Authorities, how browsers verify signatures, common pitfalls such as compromised root certificates, and practical measures like CSP and gradual rollout strategies to ensure secure web deployments across different regions and devices.

CSPCertificatesHTTPS
0 likes · 8 min read
Understanding HTTPS Certificates, Trust Chains, and Security Practices