Until the day TLS 1.3 becomes widely supported, web servers must rely on a fallback to TLS 1.2 with correctly configured server directives and strong cipher suites. Pick the wrong settings and you declare an open season on your server.

Cybersecurity in the Age of the Machine
Until the day TLS 1.3 becomes widely supported, web servers must rely on a fallback to TLS 1.2 with correctly configured server directives and strong cipher suites. Pick the wrong settings and you declare an open season on your server.
During the upcoming AWS re:INVENT 2017 conference in Las Vegas (Nov. 27th – Dec. 1st), Amazon is going to present a major change to its cloud offering, one with enormous ramifications! Yes, you read that right—and yes, that exclamation mark is fully justified.
Confused about SSL/TLS certificates? Here is a quick and dirty introduction to SSL/TLS encryption.
“You know, if you have something really important, write it out and have it delivered by courier, the old-fashioned way. Because I’ll tell you what: No computer is safe (…) I don’t care what they say.”
President-Elect Donald Trump
In the waning days of the fading Obama presidency, plenty of questions surfaced about Russia’s involvement with the hacks of the DNC and election systems. Electronic evidence can be easily manipulated.
There is more to it than just electronic evidence.
When using authentication based on keys (as opposed to a password), you have to create the key pair—a private key and a public key—on your local machine, then transfer the public key to the server and install it there. Here is how to do this on a Windows desktop for remote access to a Linux server.