Similar Articles |
|
JavaWorld January 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 1 Public-key cryptography's importance to network security must not be overlooked. However, trust issues challenge public-key cryptography's usage in enterprise-scale settings... |
JavaWorld February 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 2 Although it's not the only runner in the certificate race, the X.509 certificate standard is so far ahead that its eventual victory is all but guaranteed. A description of X.509 certificates and introduction to the classes -- a standard part of the Java 2 platform -- that support them. |
JavaWorld March 2001 Todd Sundsted |
Construct secure networked applications with certificates, Part 3 Certificates and public-key cryptography are great when private keys remain private. When a private key is exposed, either accidentally or maliciously, the security provided by public-key cryptography ends. Enter the certificate revocation list (CRL), an essential component of a public-key infrastructure (PKI) and the mechanism by which certificates terminate before their time. |
JavaWorld December 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 5 This article introduces J2SE (Java 2 Platform, Standard Edition) 1.4's new security packages for certificate chain manipulation, along with Generic Security Services, which includes a single sign-on framework over the network. |
PC World March 22, 2001 Cameron Crouch |
Microsoft, VeriSign Warn of Security Hole Windows users risk infection if fooled by bogus digital certificates... |
Information Today September 29, 2015 Abby Clobridge |
'Let's Encrypt' the Internet: From HTTP to HTTPS In November 2014, Electronic Frontier Foundation announced the Let's Encrypt initiative, which is designed to help transition the internet from using HTTP to using an encrypted HTTPS environment. |
JavaWorld August 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 3 A secure networked Java applications solution depends upon an understanding of the network environment, the skills of the application's users (and abusers), and the impact application and virtual machine flaws might have on security... |
Bank Systems & Technology January 1, 2007 Maria Bruno-Britz |
The Missing Link in the Financial Supply Chain As banks enter the financial supply chain management space, they must keep the security of transactions in mind. This goes beyond simple encryption to the actual authentication of the parties involved in a transaction. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
InternetNews December 15, 2004 Michael Singer |
RosettaNet Fights Fraud With New Certificates E-business standards consortium RosettaNet said it has a new tool in the fight against online fraud. The fraud prevention algorithms are designed for all e-business applications and messaging standards. |
Popular Mechanics February 2007 Joel Johnson |
Secure Sockets Layer Explained: Tech Clinic What Secure Sockets Layer (SSL) is and how it works to secure Internet transactions. |
JavaWorld May 2001 Todd Sundsted |
Build secure network applications with SSL and the JSSE API SSL (Secure Socket Layer) is the de facto standard for securing a communication channel between two applications that converse over the Internet. Sun's JSSE (Java Secure Socket Extension) provides SSL support for Java applications... |
InternetNews December 16, 2005 Sean Michael Kerner |
Who is The SSL Certification Leader? GeoTrust said this week that it is growing faster than anyone else. And then VeriSign said it is the undisputed leader in the SSL certificate market. |
InternetNews July 9, 2004 Sean Michael Kerner |
GeoTrust vs. VeriSign: An SSL Controversy Survey results ignite debate over who has the biggest chops in the SSL certificate arena. |
Fast Company Glenn Fleishman |
The Worst Thing About Lenovo's Adware Isn't The Adware Full understanding of what happened requires further explanation by Lenovo. But even the least alarming scenario is a great big deal. |
InternetNews December 31, 2003 Susan Kuchinskas |
Some Microsoft IE Digital Certificates Near Expiration Is the discovery a harmless oversight or a sign that browser development and security are not high priorities in Redmond? |
PC World August 19, 2002 John Fontana |
Debate Flares Over Microsoft's SSL Glitch Software giant says flaw would be difficult to exploit, but some security experts disagree. |
InternetNews July 30, 2009 |
Kaminsky Warns of SSL Vulnerabilities Security researcher Dan Kaminsky made waves last year with his dramatic DNS security flaw that could have undermined the security of the Internet. This year at Black Hat, he's back with another critical issue affecting the security certificates that secure Web sites. |
InternetNews February 15, 2006 Erin Joyce |
Sparks of Life (and Green) in Smart Cards More than 60 vendors - hardware, software and everything in between - are promising to line up better identity protection and authentication tools for businesses and consumers. |
JavaWorld October 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 2 Introduction to XML Digital Signature, a standard that handles a document's integrity, including how to write XML Signature code using an implementation currently available: IBM XML Security Suite. |
InternetNews June 28, 2010 |
Millions of SSL Certificates Invalid: Study Are widely-used SSL security certificates being configured correctly? |
CIO October 15, 2000 J. Brown |
Emerging Technology Digitally signed documents could streamline business processes... |
PC World August 15, 2002 John Fontana |
Microsoft: SSL Flaw in Windows, Not IE Researchers said browser was insecure, but now software giant says it's the OS that must be patched. |
U.S. CPSC November 12, 2008 |
CPSC Clarifies Certification Requirements: Agency Staff to Focus on Compliance with Safety Rules The U.S. Consumer Product Safety Commission issued a final rule by unanimous vote, addressing the conformity certification required for consumer products subject to safety rules under CPSC jurisdiction. |
PC World August 13, 2002 David Legard |
Severe Security Flaw Found in IE Microsoft acknowledges potential SSL vulnerability, uncovered by security researcher. |
InternetNews December 31, 2008 Richard Adhikari |
Mozilla, Microsoft Move to Nix Web Security Flaw Industry rushes to address vulnerability found at the heart of some digital certificate services. |
InternetNews March 3, 2006 Erin Joyce |
Neal Creighton, CEO, GeoTrust Digital certificate authority Neal Creighton sees a busy year dawning. The co-founder of GeoTrust explains why. |
PC Magazine May 18, 2004 Bill Machrone |
Secure Instant Messaging Here's how to keep IM conversations safe at work. |
JavaWorld May 2001 Raghavan N. Srinivas |
Java security evolution and concepts, Part 4 This article details the optional, yet important, packages that enhance Java security. Bonus: A working applet to demonstrate this article's concepts. |
InternetNews December 30, 2008 Richard Adhikari |
Certificate Flaw May Threaten Secure Web Sites Researchers say they've found a weakness in a common cryptography technology used in the digital certificates that protect many secure online transactions. |
InternetNews March 24, 2011 |
Iran May Have Attacked the Web In an attack last week, valid security certificates that could have been used to mount attacks on users worldwide. |
InternetNews March 3, 2009 Sean Michael Kerner |
EV-SSL Turns Two. Are You Buying? Extended Validation SSL was supposed to make browsing more secure. Did it? |
New Architect August 2002 Al Williams |
Unsafe At Any Speed? C#'s relaxed security model may not be the best fit for your business. |
Linux Journal October 9, 2001 Eric Rescorla |
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... |
InternetNews June 19, 2009 Sean Michael Kerner |
EV-SSL Gains Adoption, May Boost Web Sales Can better security certificates increase business in a recession? VeriSign thinks so. |
PC World October 24, 2007 Erik Larkin |
How to Protect E-Mail From Prying Eyes Encrypting your messages isn't the easiest thing to do, but it will ensure your privacy. |
PC Magazine March 7, 2008 David Cardinal |
Secure Your E-Mail and IM Communications Are you concerned that anyone can intercept and read your e-mail and instant messages? You should be. |
PC Magazine September 18, 2008 Neil Randall |
Enhancing Vista Security with EFS With Vista, Microsoft finally fixes an encryption deal breaker. |
InternetNews July 20, 2009 |
How Did Symbian OK Mobile Phone Malware? The Symbian mobile OS is used by millions of phones globally and thanks to a (now corrected) oversight they could have potentially installed malware - with Symbian's approval. |
Bank Technology News September 2009 Rebecca Sausner |
SSL Comes Under Fire at Black Hat It's great to see signs of life in the corporate world, even if it's investment in the kind of defensive education that CISOs and their teams get when they travel to a security conference like Black Hat. |
Investment Advisor October 2010 Dan Skiles |
Server Rack -- Don't Forget Physical Security Make sure that your server is secure enough that someone can't walk in and carry it out without much work. |
InternetNews July 29, 2010 |
Researcher Warns Most Sites Get SSL Wrong At Black Hat, security researcher presents his latest work demonstrating the widespread misconfiguration of websites that implement SSL protection. |
PC Magazine October 5, 2004 Neil J. Rubenking |
Security Certificates Suddenly Invalid I have a glitch in Internet Explorer 6 that seems to have come out of nowhere. |
OCC Bulletin August 31, 2004 |
Tax Lien Certificates Description This document describes the risk management practices that the Office of the Comptroller of the Currency expects banks to exercise when purchasing tax lien certificates. |
Linux Journal July 2000 Wael A. Hassan |
Book Review: Security Technologies for the World Wide Web by Rolf Oppliger This book explains the different aspects of the Web, from both the user point of view and system administrator or network architect. It has plenty of references, web sites and pointers to where information can be found. Very well-written... |
InternetNews August 4, 2009 |
Mozilla Patches Firefox for Black Hat Flaws Firefox 3.5.2 and 3.0.13 fix issues new and old in the open source browser. |
The Motley Fool August 29, 2006 |
Taking a Tax Loss A silver lining for loser stocks: They can lower your tax bill. |
InternetNews November 8, 2007 Stuart J. Johnston |
Microsoft's 'Centro' Finally Gets a Name Microsoft revealed the official name of its 'Centro' server bundle for mid-sized businesses this week and also gave a shipping target date. |
Bank Technology News February 2007 Andrea Klein |
Losses Rise If Reputation is Compromised The banking industry has begun to recognize the true cost of a tarnished reputation. The next and more challenging step for many is mitigating reputational risk, especially as it relates to online security breaches. |
PC Magazine September 14, 2011 Samara Lynn |
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. |