Jake HoweringGetting your VM Name, IP and FQDN from your AWS Organization Should be Simple!Oct 6, 2022Oct 6, 2022
Jake HoweringTLS in 250 words or lessDigital Certificates are used to maintain the integrity of a message and verify the identity of the sender. But, what if the sender is not…Apr 14, 2022Apr 14, 2022
Jake HoweringDigital Certificates in 250 words or lessDigital Signatures provide non-repudiation and integrity. Non-repudiation means that the sender cannot deny that they sent it. But, who is…Apr 11, 2022Apr 11, 2022
Jake HoweringDigital Signatures in 250 words or lessRecently, I posted about message signing. Message signing validates the sender’s authenticity — meaning that the receiver of the message…Mar 10, 2022Mar 10, 2022
Jake HoweringMessage Signing in 250 words or lessLet’s say you are electronically communicating with someone else via email. How do you actually know that the email you receive was…Mar 9, 2022Mar 9, 2022
Jake HoweringRSA Encryption in 250 words or lessThe RSA Algorithm, created in the 1970’s, is the predominant asymmetric encryption system used globally.Mar 8, 2022Mar 8, 2022
Jake HoweringAsymmetric Encryption in 250 words or lessLet’s say two users want to securely share information with one another. They could use symmetric encryption, but consider it to be too…Mar 4, 2022Mar 4, 2022