Search

Help

Page 7 of 15. Showing 149 results (0.122 seconds)

  1. Entrust PKI

    . Security Manager Security Manager is the CA (Certificate Authority). The main functions of the Security Manager are to, Create certificates for all public keys. Create encryption key pairs for users. Manage a secure database of information that allows for recovery of users' encryption key pairs Enforce defined security
    www.bonsaiframework.comAug 29, 2011
  2. Re: 1.3 Minimal Ubuntu Linux Security Checklist

    The steps to unblocking a user from DenyHosts http://denyhosts.sourceforge.net/faq.html319 seems to be a bith lengthy. My initial impression is would cause quite a bit of problems for newbies. If this is to be recommended for the uninitiated it needs more documentation and should be used in conjunction with key based
  3. Self Signing a SSL Certificate

    between the web server and the web client (the browser). SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). With public key cryptography, two keys are created, one public, one private. Anything encrypted with either key can only be decrypted with its
    www.bonsaiframework.comJun 14, 2013
  4. 4.5 Apache Renewing SSL Certificate

    Backup Files Before attempting renew an SSL certificate, back up all your private and public keys to a secure folder. Generate a New CSR With Apache … . Private Key You can use your existing private key to generate the CSR or create a new one. There is no clear consensus on whether creating a new or using an old
    www.bonsaiframework.comMay 25, 2012
  5. Adobe AEM on AWS.pdf

    summarizes some of the key benefits of using AEM on AWS, and highlights how Advanced AWS Partner Network (APN) Consulting Partner Razorfish uses AEM on AWS. We then briefly describe some of the key components of AEM, providing the foundation for the discussion of AEM on AWS implementation best practices. Amazon Web Services
  6. 5.x WordPress v.128

    is completely hardened. When the setup steps required using the browser, I use ssh tunnelling to access 80 securely. A writeup of using ssh tunnelling should … . Directories seem to be fine though. March 13, 2013 Notice that the mask also changed from rx to rwx. This might be the key. Actually more test shows a copy of some
    www.bonsaiframework.comMar 29, 2013
  7. CIS_Apache_HTTP_Server_Benchmark_v3.0.0.pdf

    trusted certificate (Level 1, Scorable) ................................................. 56 1.7.3 Protect the Servers Private Key (Level 1, Scorable
  8. 5.4 Docker in Relation to LXC (Linux Container)

    Docker over LXC which to me is much more flexible and I don't lose ssh access. However, interestingly enough as I used LXC more, I started to appreciate … : Ephemeral Being stateless you build must externalize the right things (logs, application property files) from day 1. Single Process as Best Practice I lose SSH access
    www.bonsaiframework.comMay 21, 2023
  9. Certificate File Formats

    certificates in. The extension can be, crt cer cert pem key The file is also Base64 encoded ASCII and with general certificates contains "BEGIN CERTIFICATE" and "END CERTIFICATE". The following certificates can be stored as PEM, Server Certificates (this the CA signed public key certificate) Intermediate Certificates Private
    www.bonsaiframework.comAug 20, 2015
  10. Re: Web Based Security Store

    Wanted to add my thoughts on this wrt to what we discussed. To me, an interesting flow would be something along the lines of: 1. User registers via a website and enters a series of name / value pairs 2. Website generates a unique key for the user that is user to encrypt their passwords 3. User then sends either