Skip to main content

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred.

SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection.

TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL.

HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing authority and the corporate name of the website owner, can be viewed by clicking on the lock symbol on the browser bar.

Popular posts from this blog

Share: Artificial Intelligence, The Pros And Cons

Artificial Intelligence (A.I.) has become a major part of everyday life. From search engines and voice assistants to recommendation systems and smart tools, A.I. has changed how people learn, work, and communicate. While it brings many benefits, A.I. also has limitations and risks. Understanding both sides helps us use A.I. wisely and responsibly. Pros of A.I. 1. Increases Efficiency and Productivity A.I. can complete tasks faster than humans, especially repetitive or data-heavy work. Businesses use A.I. to automate routine processes, saving time and reducing mistakes. For students, A.I. tools can help summarise information, organise notes, or check grammar, making learning more efficient. 2. Enhances Learning and Creativity A.I. makes learning more personalised. Students can get instant explanations, examples, and feedback on almost any topic. Creative tools also allow people to design images, write stories, brainstorm ideas, and explore new possibilities that might be difficult to ac...

Share: PHP

PHP is a widely-used, open-source scripting language especially suited for web development. Here's a breakdown of key aspects: 1. Core Concepts: Server-Side Scripting: PHP code is executed on the server, generating HTML (or other output) that is then sent to the user's browser. This distinguishes it from client-side languages like JavaScript, which run in the browser. Embedding in HTML: PHP code can be directly embedded within HTML, making it easy to create dynamic web pages. Dynamic Content: PHP allows you to generate content that changes based on user input, database information, or other factors. Database Interaction: PHP readily connects to various databases (like MySQL, PostgreSQL), enabling you to store and retrieve data. 2. Key Features and Characteristics: Open Source: PHP is free to use and distribute. Cross-Platform: It runs on various operating systems (Windows, Linux, macOS). Large Community: A vast community provides support, resources, and libraries. Web Framework...

How-To: Google Authenticator: Guide to Setup, Backup, and Safe Usage

What is Google Authenticator? Google Authenticator is a free security app from Google that provides two-factor authentication (2FA) codes. Instead of just entering a password, you’ll also need to input a time-based code from the app. This extra step greatly reduces the risk of your account being hacked, even if someone knows your password. Unlike SMS codes, which can be intercepted, Google Authenticator works offline and generates unique codes every 30 seconds directly on your device. Why Use Google Authenticator? Stronger security: Protects against password leaks or phishing. Offline usage: Works without mobile data or Wi-Fi. Multi-account support: You can store codes for multiple accounts (Google, Facebook, Instagram, banking apps, etc.). Free and lightweight: No subscription fees, minimal storage needed. How to Set Up Google Authenticator Step 1: Install the App Download Google Authenticator from:  Google Play Store (Android) Apple App Store (iOS) Step 2: Enable 2FA on Your Acco...