Key management | Public key infrastructure

Domain-validated certificate

A domain validated certificate (DV) is an X.509 public key certificate typically used for Transport Layer Security (TLS) where the domain name of the applicant is validated by proving some control over a DNS domain. Domain validated certificates were first distributed by GeoTrust in 2002 before becoming a widely accepted method. (Wikipedia).

Domain-validated certificate
Video thumbnail

Certificates - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Can You Validate These Emails?

Email Validation is a procedure that verifies if an email address is deliverable and valid. Can you validate these emails?

From playlist Fun

Video thumbnail

Certificates Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Signature Validation - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Certificate Details - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Certificate Services: Stand-alone Certificate Authority

Certificate Services: Stand-alone Certificate Authority, CA

From playlist Cryptography, Security

Video thumbnail

Signature Validation Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Interesting Certificate Chains - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Stream Archive: Creating a certificate with Pulumi (2022-05-19)

Yew Component Library Code: [https://github.com/brooks-builds/yew_component_library](https://github.com/brooks-builds/yew_component_library) Yew.rs Playground Code: [https://github.com/brooks-builds/yewrs_playground](https://github.com/brooks-builds/yewrs_playground) Axum Playground

From playlist Brooks Builds Platform

Video thumbnail

Stream archive: Configuring AWS using Pulumi (2022-06-30)

We set up Pulumi to create a certificate for brooksbuilds.com, and attach it to the Cloudfront distribution. ### Project The Brooks Builds Platform is going to be a webapp that will host my courses, live-streams, and other content. It's still in the early phases so the features I w

From playlist Brooks Builds Platform

Video thumbnail

27c3: Is the SSLiverse a safe place? (en)

Speakers: Jesse ,Peter Eckersley An update on EFF's SSL Observatory project The EFF SSL Observatory has collected a dataset of all TLS/HTTPS certificates visible on the public web. We discuss this dataset - what we have learned from it, how you can use it, and how intend to offer a live,

From playlist 27C3: We come in peace

Video thumbnail

OWASP AppSec EU 2013: Qualitative Comparison of SSL Validation Alternatives

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speakers: Michael Brenner | Sascha Fahl | Sascha Fahl | Matthew Smith Although SSL/TLS is in widespread use today, certificate validation currently suf

From playlist OWASP AppSec EU 2013

Video thumbnail

Black Hat USA 2010: Black Ops of Fundamental Defense: Web Edition 5/6

Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all thei

From playlist BH USA 2010 - INFRASTRUCTURE

Video thumbnail

OWASP AppSec 2010: How to Render SSL Useless 2/3

Clip 2/3 Speaker: Ivan Ristic, Feisty Duck SSL is the technology that secures the Internet, but it is effective only when deployed properly. While the SSL protocol itself is very robust and easy to use, the same cannot be said for the usability of the complete ecosystem, which includes s

From playlist OWASP AppSec 2010

Video thumbnail

Convincing - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

OWASP AppSec USA 2010: State of SSL on the Internet: 2010 Survey Results and Conclusions 2/3

Speaker: Ivan Ristic, Qualys More information can be found on the OWASP website: http://bit.ly/hY4bqh Source: http://bit.ly/owasp_appsec_us_2010

From playlist OWASP AppSec USA 2010

Video thumbnail

DEFCON 17: More Tricks For Defeating SSL

Speaker: Moxie Marlinspike This talk aims to pick up where SSL stripping left off. While sslstrip ultimately remains quite deadly in practice, this talk will demonstrate some new tricks for defeating SSL/TLS in places where sslstrip does not reach. Cautious users, for example, have been a

From playlist DEFCON 17

Video thumbnail

DEFCON 18: Black Ops Of Fundamental Defense: Web Edition 4/4

Speaker: Dan Kaminsky Lets be honest: Year in, year out, we keep finding the same bugs in the same places, and wondering: Why don't they learn? Why don't developers use these beautiful tools we provide them -- parameterized queries, XSRF tokens, X.509 certificates, and escapes in all th

From playlist DEFCON 18-1

Video thumbnail

Signing Certificates - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

CyberSecurity Certifications | CyberSecurity Career | CyberSecurity Certification Training | Edureka

🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN 🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl This Edureka video on "Cybersecurity Certifications" talks about some of the major cybersecurity certifications required to get into the security indust

From playlist Cyber Security Training for Beginners | Edureka

Related pages

Extended Validation Certificate | GeoTrust | Let's Encrypt | Cryptographic nonce | X.509 | Public key certificate