Jake HoweringGetting your VM Name, IP and FQDN from your AWS Organization Should be Simple!2 min read·Oct 6, 2022----
Jake HoweringTLS in 250 words or lessDigital Certificates are used to maintain the integrity of a message and verify the identity of the sender. But, what if the sender is not…1 min read·Apr 14, 2022----
Jake HoweringDigital Certificates in 250 words or lessDigital Signatures provide non-repudiation and integrity. Non-repudiation means that the sender cannot deny that they sent it. But, who is…2 min read·Apr 11, 2022----
Jake HoweringDigital Signatures in 250 words or lessRecently, I posted about message signing. Message signing validates the sender’s authenticity — meaning that the receiver of the message…2 min read·Mar 10, 2022----
Jake HoweringMessage Signing in 250 words or lessLet’s say you are electronically communicating with someone else via email. How do you actually know that the email you receive was…2 min read·Mar 9, 2022----
Jake HoweringRSA Encryption in 250 words or lessThe RSA Algorithm, created in the 1970’s, is the predominant asymmetric encryption system used globally.2 min read·Mar 8, 2022----
Jake HoweringAsymmetric Encryption in 250 words or lessLet’s say two users want to securely share information with one another. They could use symmetric encryption, but consider it to be too…2 min read·Mar 4, 2022----