Комментарии:
Hello this one opens me , can you help me regarding self signed Cert for EFI?
ОтветитьGreat video! Do you have a guide or video which details how to produce a self singed cert for internal browsing for example?
ОтветитьThis is a truly didactic explanation. Thank you for making videos!
Ответитьgreat video, thank you, now my understanding of CA is clear. Is there a video to understand cipher suites?
ОтветитьA great clarification about "Secure". Thanks
ОтветитьSo amazing!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
ОтветитьThere is also a free alternative to third party certificates: "Let's Encrypt". Google it.
"Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG)."
This is what I wanted to know, Great Explanation in simple manner. Thanks
ОтветитьMr. Sunny, I want to thank you again for this lecture specially the series about PKI. I passed my Security+ exam. Last week and this lecture is monumental in my success. Thank you so much. More power to your channel Mr. Sunny and do take care.
ОтветитьGreat video!! Very easy to understand, thank you.
ОтветитьHey sunny.. i like ur videos and the way you explain.. can you touch base on the topics keytool and openssl with examples
Ответитьsuper
ОтветитьYou are the best as always.
ОтветитьAdobe Reader HAHAHA
ОтветитьA great explanation, Sunny. Seriously, very clear. Special thanks for the clarification in the end about the difference of a commercial and self-signed certificates.
Ответитьfantastic video! simplified what i thought was complicated. thanks for sharing.
ОтветитьExactly the explanation I was looking for. Simple, to the point. Thank you.
ОтветитьThanks Mr. Sunny for this very simple explanation about self signed certificate. Actually I have a question here: How to check the revocation status of the self signed certificate? Who revoke the self signed certificate? thanks
ОтветитьHoly smokes!!! What a great video and the best breakdown I've heard on this subject. Thank you.
ОтветитьThat is a great explanation. Thank you
Ответитьmaking this so easy peasy ! love this
ОтветитьHow the self signed certificate is verified by client ? or it is not verified by client at all ?
ОтветитьOne Doubt - Why self signed certificates are feasible for only few people
Ответитьgreat video!!
Ответитьgreat video!! way to go :)
Ответитьwhat is pki ,what is its purpose can u brief it
ОтветитьThis is just bad - self signed certificates force the user to trust you implicitly. The whole point of the root CA is that their private keys are safeguarded, and therefore the chain of trust can be trusted. For a self signed cert, all bets are off. If the private key of the cert is compromised, then anyone can impersonate the certificate owner, and issue new certificates that are now trusted by the end user. The only valid use for a self signed cert is to encrypt communications between two (backend) systems that you own yourself, and definitely not on public web.
ОтветитьThere are surprisingly few good explanations of this coming high in the search ratings, I hope this gets views.
ОтветитьHi Sunny .. I have seen all of your videos .. subscribed too 😊 .. just amazing .. could you please make videos on setting up a lab and show the concepts practically?? If possible?? ThQ
Ответить