Notices tagged with ssl
-
http://status.hackerposse.com/url/13390 - renewed certificate Hello, I've renewed the SSL certificate of my server. Here are the details of the new one... Subject *.libranet.de Fingerprint SHA1: 373cb6dc7372427bfb3fc1dc7f5740c282deb658 Common names *.libranet.de Alternative names *.libranet.de http://status.hackerposse.com/url/13391 Valid from Fri, 16 Dec 2016 22:02:11 UTC Valid u…
-
So, next milestone in !selfhost (and I think this one will open many doors): #SSL Certificate in #NetbookServer so that I can sling #HTTPS
-
More #FREAK #SSL vuln info: more than 28,000 hosts in #IPv4 space use the same short #RSA key http://url.federati.net/Kk6gR !security // Unbelievably lazy and stupid
-
Deploying #TLS the hard way from @ttaubert: https://timtaubert.de/blog/2014/10/deploying-tls-the-hard-way/
!crypto #SSL
-
Nochmal für die Morgenschicht: So könnt ihr euren Browser für #SSL richtig einstellen: http://qttr.at/e8v
#SSLv3 !crypto #POODLE
-
My blog post on how to securely use #SSL in your browser is still valid: http://qttr.at/e8u
#SSLv3 #POODLE !crypto
-
Do Government Websites Care About HTTPS? Not in 2010, wonder if it is better now? #ssl #tls !crypto #infosec https://t.co/id4ViuvhFk
-
seems the #SN clients I tried fail to connect when the #ssl certificate is self-signed :-( I wnder which SN client could work?
-
I just got a free wildcard domain #SSL cert for #hummstrumm from GlobalSign because we're Free/Open Source. Wonderful that I don't have to spend $850 for it. !crypto
-
goto fail; Apple #SSL bug test site - "Your browser aborted loading the test image upon seeing an invalid ServerKeyExchange message. This means your browser is not vulnerable to the bug, however if you're on an #Apple device make sure you test #Safari." gotofail.com cc @question
-
Die Liste ist wieder ein wenig länger: http://qttr.at/c2x #SSL !crypto
-
How does the compromise of an #x509 / #SSL CA have "no consequences on the overall network !security"? http://status.hackerposse.com/url/5196
-
Vielen Dank an die fleißigen Pad-Schreiben. Die Liste ist wieder ein wenig länger: http://kubieziel.de/computer/ssl-tls.html #SSL !crypto
-
Mein #Firefix mag keine Verbindung zu @FSecure aufnehmen: http://kubieziel.de/img/f-secure-tls.png !crypto #ssl #negotation /cc @mikko
-
Heute neu ohne TLS1.1/1.2: @linuxplumbers und @torproject (Gitweb). https://kubieziel.de/computer/ssl-tls.html !crypto #ssl #tls
-
Ich habe in meinem Beitrag auf das Wiki von Kai Raven verwiesen. Er hat weitere sinnvolle Hinweise: http://t.co/iqHGWbuTdB #SSL #TLS !crypto
-
Using #SSL #TLS securly in your browser: http://kubieziel.de/blog/archives/1564-Using-SSL-securly-in-your-browser.html !security !crypto
-
Wie man #SSL #TLS im Browser einstellt: https://kubieziel.de/blog/archives/1563-SSL-im-Browser-sicher-verwenden.html !security !crypto
-
Until #xabber goes #fs, i'll be using #beem. Supports !otr, #sasl, #ssl / #tls, and a number of other features. !xmpp