In the last post we talked about encryption. Specifically we addressed symmetrical and asymmetrical encryption, along with PGP public/private keys. But we did not really get into the math, which can be quite complicated. (more…)
I decided to revisit some of the stuff I have done in the past related to certificates and computer security. In the process I took the time to review some current articles on the subject. One thing I noticed, while specific topics are covered I did not see any really broad overviews of the subject from beginning to end (more…)
Today we will start theĀ discussion about encryption, which has been around as long as as there have been people interested in things that are none of their business (aka prying eyes). Encryption has been one of the tools to keep these snoops at bay. (more…)