Popular Books:
Archived: Visiting "https" Web Site with Chrome 24
This section describes how Google Chrome 24 shows a lock icon when you visit an 'https' Web site to provide you more security related information. 2026-01-31, ∼228🔥, 1💬
"OpenSSL" Generating Certificates in DER and PEM
This section provides a tutorial example on how to generate certificates in DER and PEM formats using 'OpenSSL'. 2026-01-11, ≈15🔥, 5💬
Is EC Private Key Secure
This section discusses the question of: how secure is the EC (Elliptic Curve) key pair? Or how hard is it someone to figure out the private key from a given EC public key? 2025-09-06, ∼429🔥, 1💬
Importing CA Certificate into Firefox
This section provides a tutorial example on how to import a CA certificate into Firefox in the 'Authorities' category. 2025-06-18, ∼701🔥, 1💬
First 8336 Hex Digits of PI
This section provides first 8336 hex digits of constant PI, 3.1415927..., needed for Blowfish encryption algorithm. 2025-04-28, ∼8446🔥, 13💬
💬 2019-04-28 Herong: 8336 Hex Digits. Thanks.
💬 2019-04-26 Harry: Do you mean 8336 digits
💬 2024-04-23 ☺: meaningful comments. Thanks! ☺
💬 2022-12-02 Victor: meaningful comments.
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2024-03-13, ∼9414🔥, 37💬
💬 2018-10-20 Herong: bachi, thanks for sharing your comment.
💬 2018-10-13 bachi: I like how you composed your content. I like how you explain the DES algorithm
What Is PKCS5Padding?
This section describes what is PKCS5Padding - a schema to pad cleartext to be multiples of 8-byte blocks. 2024-01-31, ≈50🔥, 38💬
💬 2023-04-12 {"partnerReferenceNo": "APP12345: ok
💬 2023-01-18 Servant of Elon Musk's Regent: You are the chosen one!
💬 2022-11-17 Elon Musk's Regent: mommy
💬 2022-11-14 Elon Musk: Giving away twitter to the first person to reply and call me mommy
What is ECB (Electronic CodeBook) Operation Mode?
This section describes what is ECB (Electronic CodeBook) Operation Mode - each plaintext block is encrypted independently without any input from other blocks. 2024-01-29, ∼5910🔥, 5💬
💬 2020-10-18 Herong: donjo, there is no real applications that use the ECB mode.
💬 2020-10-16 donjo dumdum: What is application of ECB mode operation
Viewing Components of Certificate Signing Request
This section provides a tutorial example on how to view different components of a CSR (Certificate Signing Request) for your public key with OpenSSL. 2023-12-17, ∼911🔥, 5💬
Encrypting RSA Keys
This section provides a tutorial example on how to store RSA keys encrypted with password protection. 2023-12-12, ∼625🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other format. 2023-12-06, ∼708🔥, 2💬
Illustration of DSA Algorithm: p,q=23,11
This section provides a tutorial example to illustrate how DSA digital signature algorithm works with small prime modulus p=23 and prime divisor q=11. 2023-11-19, ∼6604🔥, 10💬
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3430🔥, 3💬
"secp256r1" - For 256-Bit ECC Keys
This section describes 'secp256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by secg.org. 2023-10-20, ∼5698🔥, 1💬
Popular Posts:
This section provides a tutorial example on how to export a list of trusted root CA certificates wit...
This section describes how to create a new login user and grant full permission to a database in SQL...
This section describes 4 types of bitwise operations, 'And', 'Or', 'Exclusive Or', and 'Complement' ...
This section provides a tutorial example on how to disable and remove 'Lync Browser Helper' addon fr...
This section describes why and how to convert Perl script files to executable binary files. ActivePe...