∑:22  Sort:Date

Ways to Use Certificate to Authentication
What are the ways to use certificate for authentication? Can certificates be used to secure Web sites, secure network servers, secure client machines and secure user log in access? Authentication is crucial to secure and reliable communication. Each party to a communication must be able to prove the...
2017-08-21, 11437🔥, 6💬

💬 2017-08-15 FYIcenter.com: @Kawa, expired certificates are useless. You should ask owners to send you newer ones to replace them.

💬 2017-08-13 Kawa: Hi. Found certificates wich arenot valid annymore. Some are valid until 2015 or before. Do i need them?

💬 2014-02-21 FYIcenter.com: Hi Jacinta, you don't need to have your own certificate on your phone to protect you using Websites. The server will have certif...

(More comments ...)

What Is getacert.com
What is getacert.com? Can I use it to generate a PKI certificate? Is it free? getaCert is a free service which provides a fast and simple way to create or view the details of a SSL digital certificate. Digital certificates issued on this site can be used for encrypting emails and/or web sites. Creat...
2013-09-29, 10597🔥, 0💬

What Are Certificate File Name Extensions
What are file name extensions used for certificates? I see .cer files on my Windows computer. Most commonly used file name extensions for X.509 certificates are: .cer - Used for certificate files in binary DER format. Could also be used for certificate files in text PEM format. .crt - Used for certi...
2012-07-25, 6187🔥, 0💬

What Is the Usage of Certificates
What is the usage of certificates? Can certificates be used for authentication, privacy protection, encryption, and digital signature? Certificates can be used for: Authentication, which verifies the identity of someone or something. Privacy, which ensures that information is only available to the i...
2012-07-13, 5846🔥, 0💬

What Is PKCS #7
What is PKCS (Public-Key Cryptography Standards) #7? What is it used for? PKCS (Public-Key Cryptography Standards) #7 is a standard, RFC 2315, from the PKCS series; defines a syntax for data that may have cryptography applied to it, such as for digital signatures and digital envelopes. PKCS #7 can b...
2013-12-30, 5761🔥, 0💬

What Is Certificate
What is an Internet security certificate? What is a public key certificate? What is an X.509 certificate? What is a digital certificate? What is a certificate? Are they all the same thing? A public key certificate, usually just called a certificate, is a digitally signed statement that binds the val...
2012-07-13, 5706🔥, 0💬

Certificate File Formats Supported on Windows
What are certificate file formats supported on Windows? Are PKCS#12, PKCS#7, DER are PEM are valid certificate file formats on Windows? Certificate import and export operations support four file formats on Windows systems. Choose the format that meets your specific requirements. Personal Information...
2012-07-19, 5579🔥, 0💬

Example of X.509 Certificate Data Structure
Can you show me an example of X.509 certificate data structure? Here is an example of X.509 Version 3 certificate data structure: Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc, O...
2012-07-24, 5570🔥, 0💬

Ways to Use Certificate for Encryption
What are the ways to use certificate for encryption? Can certificates be used to secure data submitted to Web sites, secure data received from Web sites, secure emails, and secure files stored on computers? Communications over a network, such as the Internet, are subject to possible monitoring by un...
2012-07-21, 5553🔥, 0💬

What Is the Digital Signature on a Certificate
What is the digital signature on a certificate? Who signs a certificate? What can be validated on a certificate? Digital certificates are electronic credentials that are used to certify the identities of individuals, computers, and other entities on a network. Digital certificates function similarly...
2012-07-13, 5474🔥, 0💬

What Is PKCS #12
What is PKCS (Public-Key Cryptography Standards) #12? What is it used for? PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. A PKCS #...
2013-12-25, 5437🔥, 0💬

What Is the Structure of Certificates
What is the structure of certificates? What types of values are recorded in a certificate? The structure of an X.509 Version 3 certificate is defined in RFC 5280 - "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile". It contains the following values: ...
2012-07-24, 5362🔥, 0💬

What Are Distinguished Names
What are distinguished names on certificates? I see "CN=..." on in many certificates. Distinguished Names are used in X.509 certificates to identify entities, such as those used in the subject and issuer (signer) fields. The X.509 standard defines the following fields for Distinguished Names: CN - C...
2012-07-25, 4984🔥, 0💬

What Are Public and Private Keys
What are public and private keys? Are they related to each other? In public key encryption, two different keys are used to encrypt and decrypt information. The private key is a key that is known only to its owner, while the public key can be made known and available to other entities on the network....
2012-07-19, 4776🔥, 0💬

What Is PKI (Public-Key Infrastructure)
What is PKI (Public-Key Infrastructure)? Public-Key Infrastructure (PKI) is a public-key cryptography system that enables users to securely communicate on an insecure public network, and reliably verify the identity of a user via digital signatures. The main function of the a PKI system is for the c...
2012-07-25, 4700🔥, 0💬

What Is SHA-1
What is SHA-1 (Secure Hash Algorithm 1)? SHA-1 (Secure Hash Algorithm 1) is a hash function, developed by the US National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). SHA-1 or Secure Hash Algorithm 1 is a cryptographic hash function which takes an...
2021-11-30, 1145🔥, 0💬

"What Is" - Certificate Related Terminologies
Where to find descriptions of Certificate Related Terms and Abbreviations? Here is a list of Certificate Related Terms and Abbreviations and their descriptions compiled by FYIcenter.com team: Terminologies on Basic Concepts What Is Certificate What Is the Usage of Certificates What Is the Digital Si...
2021-06-05, 1143🔥, 0💬

Terminologies on Advanced Concepts
Where to find descriptions of Terminologies on Advanced Concepts related to certificates? Here is a collection of descriptions of Terminologies on Advanced Concepts related to certificates compiled by FYIcenter.com team. What Is PKI (Public-Key Infrastructure) What Is PKCS #12 What Is PKCS #7 What I...
2021-06-05, 1026🔥, 0💬

What Is SHA-256
What is SHA-256 (Secure Hash Algorithm 2 - 256 bit)? SHA-256 (Secure Hash Algorithm 2 - 256 bits) is a hash function, developed by the US National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). SHA-256 is of the two SHA-2 (Secure Hash Algorithm 2) h...
2021-11-30, 851🔥, 0💬

Terminologies on Basic Concepts
Where to find descriptions of Terminologies on Basic Concepts related to certificates? Here is a collection of descriptions of Terminologies on Basic Concepts related to certificates compiled by FYIcenter.com team. What Is Certificate What Is the Usage of Certificates What Is the Digital Signature o...
2021-06-05, 757🔥, 0💬

What Is SHA-256 Certificate
What is SHA-256 (Secure Hash Algorithm 2 - 256 bits) Certificate? SHASHA-256 (Secure Hash Algorithm 2 - 256 bits) Certificate is a X.509 certificate that uses SHA-1 hash function to generate the hash of the public key provided by the certificate subject. Here is an example of a SHA-1 certificate: fy...
2021-11-30, 700🔥, 0💬

What Is SHA-1 Certificate
What is SHA-1 (Secure Hash Algorithm 1) Certificate? SHA-1 (Secure Hash Algorithm 1) Certificate is a X.509 certificate that uses SHA-256 hash function to generate the hash of the public key provided by the certificate subject. Here is an example of a SHA-256 certificate: fyicenter$ openssl x509 -in...
2021-11-30, 679🔥, 0💬

  ∑:22  Sort:Date