security

HTTP vs. HTTPS : What is the difference?

Target audience This article is geared toward a general reader with a basic understanding of how the Internet works. Introduction When you surf the Internet, most web pages are delivered to your compu...

What Is the Logjam Vulnerability?

Overview of Logjam On May 20, 2015, a team of researchers announced a new vulnerability in the protocol that allows web servers to establish secure (HTTPS) connections to web browsers. Calling this ex...

Shared Key Exchange (How VPNs Work, Part 3)

This article in the “How VPNs Work” series describes how a shared key exchange works. If you’re already lost, don’t panic! This series of articles is written to explain the con...

Public Key Cryptography (How VPNs Work, Part 2)

This article in the “How VPNs Work” series describes how public key cryptography (asymmetric encryption) works. If you’re already lost, don’t panic! This series of articles is ...

What Is a VPN?

So what is a VPN? Maybe you’ve heard some of your tech-savvy friends or co-workers talk about a VPN. Perhaps you even use one and want to know a little bit about what a VPN is and how it works. ...

What is an SSL Certificate?

An SSL is an acronym for Secure Sockets Layer.  SSL is the standard security technology for establishing an encrypted link between a cloud server and a browser. This link ensures that all data passe...

Stay Connected With Us