Tags: Internet

lock-1920.jpg

lets encrypt
Unencrypted HTTP sessions are wide open to abuse; lock them down with Let's Encrypt.

Protect Your Websites with Let's Encrypt

Learn how to use Let's Encrypt in this tutorial from our archives. Back in the bad old days, setting up basic HTTPS with a certificate authority cost as much as several hundred dollars per year, and the process was difficult and error-prone to set up. Now we have Let's Encrypt for free, and the...
Read 1 Comments

Tim Berners-Lee Introduces "Solid" Decentralized Identity Platform

​Solid is a new decentralized identity platform from WWW Creator Tim Berners-Lee which provides a mechanism for users to own and better control the usage of their data. With several large companies trusted with large amounts of user data, and with several high profile data breaches and misuses of...
Read 0 Comments

Around 62 Percent of All Internet Sites Will Run an Unsupported PHP Version in 10 Weeks

The highly popular PHP 5.x branch will stop receiving security updates at the end of the year. According to statistics from W3Techs, roughly 78.9 percent of all Internet sites today run on PHP.  But on December 31, 2018, security support for PHP 5.6.x will officially cease, marking the end of all...
Read 0 Comments

ICANN Sets Plan to Reinforce Internet DNS Security

Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the internet’s address book – the Domain Name System (DNS).  The ICANN Board at its meeting in Belgium this week, decided to proceed with its...
Read 0 Comments

Wi-Fi Security Is Starting to Get its Biggest Upgrade in Over a Decade

Wi-Fi devices have been using the same security protocol for over a decade. But today, that’ll begin to change: the Wi-Fi Alliance, which oversees adoption of the Wi-Fi standard, is beginning to certify products that support WPA3, the successor to the WPA2 security protocol that’s been in use since...
Read 0 Comments

6 RFCs for Understanding How the Internet Works

Reading the source is an important part of open source software. It means users have the ability to look at the code and see what it does. But "read the source" doesn't apply only to code. Understanding the standards the code implements can be just as important. These standards are codified in...
Read 0 Comments

Tencent Becomes a Linux Foundation Platinum Member to Increase its Focus on Open Source

Tencent, the $500-billion Chinese internet giant, is increasing its focus on open source after it became a platinum member of the Linux Foundation. The company has long been associated with the foundation and Linux generally, it is a founding member of the Linux Foundation’s deep learning program...
Read 0 Comments

Spanning the Tree: Dr. Radia Perlman & Untangling Networks

As computer networks get bigger, it becomes increasingly hard to keep track of the flow of data over this network. How do you route data, making sure that the data is spread to all parts of the network? You use an algorithm called the spanning tree protocol — just one of the contributions to...
Read 0 Comments

​ICANN Makes Last Minute WHOIS Changes to Address GDPR Requirements

The Board of Directors of the Internet Corporation for Assigned Names and Numbers (ICANN) struggled and sweated and with days left came up with a way to make the Domain Name System (DNS) and WHOIS, the master database of who owns what website name, compliant with the European Union (EU)'s General...
Read 0 Comments

Introduction to Security and TLS

IoT (Internet of Things) is all about connecting to the internet and even more about security. Without security and encrypted communication, everyone can possibly see what I send or receive. And this is especially bad if passwords or user names are sent in an unencrypted way. So, encryption and...
Read 0 Comments

Pages

Click Here!