SSL Support Team
eSigner CKA (Cloud Key Adapter) is a Windows based application that uses the CNG interface (KSP Key Service Provider) to allow various tools to use
Read More »
Authenticating Users and IoT Devices with Mutual TLS
Learn how to implement mutual TLS (mTLS) authentication for securing user and IoT device connections. Includes step-by-step certificate setup, server configuration, client implementation, and troubleshooting guidelines.
Read More »
Pharming Explained: How to Prevent DNS-Based Cyber Attacks
Pharming is a sophisticated cyberattack that exploits DNS vulnerabilities to redirect users to fraudulent websites. Learn how to recognize, prevent, and respond to these DNS-based threats.
Read More »
What Is the ACME Protocol?
Learn about the ACME protocol – an automated method for managing SSL/TLS certificate lifecycles. Discover how it streamlines certificate issuance, renewal, and improves website security through standardized automation.
Read More »
SSL.com to Deprecate Domain Contact-Based Email Domain Control Validation on December 2, 2024
Starting December 2, 2024, the WHOIS-based email domain control validation (DCV) method to obtain SSL/TLS certificates will no longer be accepted by SSL.com. It has
Read More »
How to Digitally Sign .app Files using eSigner CKA
A .app file is essentially a macOS application bundle. It’s a directory that contains all the necessary files for a macOS application to run, such
Read More »
How to Digitally Sign a Hardware Lab Kit (HLK) file using eSigner CKA
Hardware Lab Kit is a tool to test and prepare a kernel mode driver for submission to Microsoft. Currently eSigner CKA also requires the HLKSigntool
Read More »
How to Digitally Sign VBA Macros using eSigner CKA
eSigner CKA (Cloud Key Adapter) is a Windows application leveraging the CNG interface (KSP Key Service Provider), enabling tools like certutil.exe and signtool.exe to access
Read More »
How to Digitally Sign vsix files using eSigner CKA
Securing your VSIX package with a digital signature enhances its security and deters unauthorized modifications. When installing, the VSIX installer shows the digital signature and
Read More »
Private vs Public PKI: Building an Effective Plan
Learn how to build an effective private or public PKI plan, incorporating trends like post-quantum cryptography, PKI automation, and industry-specific considerations.
Read More »
Digitally Sign a PDF on Adobe Acrobat Reader using eSigner CKA
Unlock seamless and secure digital document signing with the eSigner Cloud Key Adapter (CKA), an innovative Windows application designed to work effortlessly with leading platforms
Read More »
Add Digital Signatures to Microsoft Office 365 Documents using eSigner CKA
Experience seamless and secure document signing with the eSigner Cloud Key Adapter (CKA), a powerful Windows application designed to integrate effortlessly with Microsoft-based programs. eSigner
Read More »
How Simple Passwords and Employees Put Cybersecurity at Risk
Discover how simple passwords and employee negligence can jeopardize your organization’s cybersecurity, and learn practical steps to strengthen your defenses against cyber threats.
Read More »
Comparing ECDSA vs RSA: A Simple Guide
Compare ECDSA and RSA cryptographic algorithms: key features, security, performance, and use cases. Learn when to choose each for digital signatures and encryption.
Read More »
S/MIME Certificate Management with Microsoft Intune using SSL.com Azure Integration Tool
Introduction Microsoft Intune allows for the integration of imported PFX certificates, which are often used for S/MIME encryption in email profiles. Intune supports the import
Read More »
Avoid Common HTTPS Errors: A Simple Guide
Quick guide to fixing common HTTPS errors. Learn to identify and resolve SSL/TLS issues for secure browsing and website management.
Read More »
What is Elliptic Curve Cryptography (ECC)?
Elliptic Curve Cryptography explained: Efficient public-key encryption for modern cybersecurity, from web security to cryptocurrencies.
Read More »
What is a Cryptographic Protocol?
Discover cryptographic protocols—rules ensuring secure communication and data protection online, including SSL/TLS, SSH, and more.
Read More »
What is Public-Key Cryptography?
Learn about public-key cryptography, its applications in SSL/TLS, and how it secures digital communications. Explore algorithms, benefits, and future trends in online security.
Read More »
What is HTTP Strict Transport Security (HSTS)?
HSTS is a web security mechanism that forces browsers to use HTTPS connections with a website, protecting against downgrade attacks and enhancing overall security.
Read More »
Bulk Certificate Enrollment for S/MIME and ClientAuth Certificates
SSL.com provides an efficient way to order a high volume of digital certificates through the bulk order tool. The bulk order tool is capable of
Read More »
Code Signing Certificates, Cloud Signing Options and Signing Operations Integration
What is a Code Signing Certificate? A code signing certificate is a digital certificate that provides a globally accepted proof of identity of a software
Read More »
How to Reconfigure your Thales SafeNet Token Password
This article provides instructions for Thales SafeNet token users who want to change their token password and for those who need to regain access to
Read More »
Send a Secure Email using S/MIME Certificate in the new Outlook for Mac
This guide provides MacBook users instructions on how to enable an SSL.com S/MIME certificate on the new Outlook for Mac and use it to digitally
Read More »
What is a Code Signing Certificate?
A code signing certificate is a type of digital certificate used by software developers to sign applications, drivers, executables, and software programs.
Read More »