Goal of this article is to describe the process behind changing the passphrase used to generate ssh key pair (private and public) due to security policies or other scenarios where…

As lots of system administrators have been in situation where they misplaced their root passwords or confused Girlfriend’s birthday with it… Well, to some of us at least 🙂 Anyhow, just…

SSH is a protocol for safe remote connection and safe communication over an unprotected network infrastructure. It can replace telnet, remote shell (rsh), remote copy (rcp). Other than that, it’s…

For SSL/TLS negotiation server needs to have private key and certificate. Handshake is done in 6 steps roughly generalizing: Client nack or Client Hello Indication that server needs to respond…

I wanted to share interesting approach to storing sensitive data in DB where the same has to be encrypted and decrypted gracefully. I’d like to point out that there is…