Search

Tag: http

View:
Oleg Onischuk
  • Oleg Onischuk
  • July 13, 2023

How to Replace Your Default ESXi SSL Certificate With a Self-Signed Certificate: a 101 Introduction

Everybody knows that SSL certificates are a must-have for every safe network. However, anybody who has ever worked with ESXi hosts has sometimes had to deal with untrusted certificates, which can become quite tedious. Fortunately, there is a sure fix.
Read more
Didier Van Hoye
  • Didier Van Hoye
  • June 30, 2021

QUIC, HURRY UP!

Windows Server 2022 will see various novelties. Among others, it will push its QUIC, TLS 1.3, HTTP/3, and SMB 3.1.1 protocols as new standards. QUIC, specifically, is presented as an alternative to TCP and is often dubbed “TCP/2.” But are these protocols worth being standardized? And what are the challenges?
Read more
Florent Appointaire
  • Florent Appointaire
  • September 26, 2019

[Azure] Deploy an Application Gateway to protect your Web Apps

In times when computing technology is moving by leaps and bounds, cloud migration happens quite often. While completely common, this process carries some dangers, such as web applications safety. It becomes an issue since you expose your sites publicly. However, if you move your servers to Azure, this won’t be a problem!
Read more
Gary Williams
  • Gary Williams
  • March 15, 2018

Demystifying HTTPS

This blog is going to be all about the secure certificate side of things, by setting these headers you reduce the chances of certain types of probes and attacks from being successful. The server itself and whatever applications you are running on it still need to be upgraded and configured to reduce the chances of someone gaining unauthorised access to your systems.
Read more
Oksana Zybinskaya
  • Oksana Zybinskaya
  • June 21, 2016

BadTunnel Bug, which Hijacks Network Traffic and Affects All Windows Versions, has been patched by Microsoft

The works of Yang Yu, founder of Tencent’s Xuanwu Lab, have helped Microsoft to patch a significant security issue in its implementation of the NetBIOS protocol that affected all Windows existing versions. It was found out that the attacker can exploit this vulnerability to pass as a WPAD or ISATAP server and redirect all the victim’s network traffic through a point controlled by the attacker. Network traffic here means not just Web HTTP and HTTPS, but also OS updates, software upgrades, Certificate Revocation List updates via Microsoft’s Crypto API, and other OS maintenance operations.
Read more