ransomware attack

How Do Ransomware Attacks Work?

|
How Do Ransomware Attacks Work? 97thfloor Fri, 09/09/2022 - 07:46 2 views How It Works While some ransomware attacks vary in the process, they normally all consist of these three parts: gaining access to the data, encrypting the data and demanding a ransom. Gaining Access to Data Cyber criminals use ... Read More
TLS/SSL offloading to improve pagespeed

What Is TLS/SSL Offloading?

|
What Is TLS/SSL Offloading? 97thfloor Fri, 09/02/2022 - 07:48 2 views TLS/SSL Offloading Definition A common misconception about TLS/SSL encryption is that a person’s computer connects directly with a web server and information is sent directly between the two. In reality, the information can be sent to a separate machine ... Read More
selecting TLS/SSL ports

What Is a TLS/SSL Port?

|
What Is a TLS/SSL Port? 97thfloor Fri, 08/26/2022 - 09:15 1 view   What TCP Ports Are Used Most Frequently? Managing TLS/SSL certificates means also having the right knowledge on hand when it comes to security and network connections. It may therefore be useful to know what some of the ... Read More
TLS/SSL private key

Finding the Private Key for a TLS/SSL Certificate

|
Finding the Private Key for a TLS/SSL Certificate 97thfloor Fri, 08/19/2022 - 08:03 4 views   What is a private key? TLS/SSL certificates require both a public key and private key to encrypt and decrypt data. The public key is embedded in the TLS/SSL certificate and is used to encrypt ... Read More
Avoiding SSL errors

How to Fix and Avoid TLS/SSL Errors

|
How to Fix and Avoid TLS/SSL Errors 97thfloor Mon, 06/06/2022 - 09:57 1 view What Is TLS/SSL? SSL stands for secure socket layers, and was first developed in 1994 by Netscape. SSL was originally created to secure connections between customers and online businesses, but later expanded for use in non-commercial ... Read More
ssh key

SSH Keys: Overview and Best Practices

|
SSH Keys: Overview and Best Practices 97thfloor Fri, 05/27/2022 - 09:43 1 view How Do SSH Keys Work? SSH stands for Secure Socket Shell which means its basic use is to enable secure access to remote servers and devices over an unsecured network. It is highly recommended to use SSH ... Read More
DNS spoofing attack

What Is DNS Spoofing and How Is It Prevented?

|
What Is DNS Spoofing and How Is It Prevented? 97thfloor Fri, 05/20/2022 - 09:37 3 views What Is the DNS and DNS Server?  To fully understand DNS spoofing, it’s important to understand DNS and DNS servers. To start, each computer and server has a unique Internet Protocol (IP) address that’s ... Read More
discovering types of encryption algorithms

Types of Encryption Algorithms

|
Types of Encryption Algorithms 97thfloor Fri, 05/13/2022 - 08:06 1 view How Do Encryption Algorithms Work? Encryption algorithms are mathematical formulas that transform plaintext into ciphertext. Plaintext is what the message looks like unaltered, but ciphertext scrambles the message to a point where it’s unreadable—unless you have the right authorization ... Read More
using a secure website

What Is a Digital Certificate?

|
What Is a Digital Certificate? 97thfloor Fri, 05/06/2022 - 08:56 4 views Types of Digital Certificates While the basics of digital certificates are the same, there are three different types of digital certificates to consider when working to secure your network.  TLS/SSL Certificate This type of digital certificate is on ... Read More
SSH keys

Where Are SSH Keys Stored?

|
Where Are SSH Keys Stored? 97thfloor Fri, 04/29/2022 - 07:16 4 views What are SSH keys? Secure Socket Shell (SSH) is a cryptographic network protocol that provides authentication between the server and the client to allow users to securely access network services over an unsecured network. SSH protects information by ... Read More