0 comments on “Configuring SSH Key Authentication on Linux”

Configuring SSH Key Authentication on Linux


Now Days it is very convenient to use Remote Desktop Protocol(RDP) for accessing remote system over Internet, specially server systems(either client to server or server to server), although it is very convenient and easy way to access remote systems but…

1 comment on “Knolx – Intoduction to AWS IAM”

Knolx – Intoduction to AWS IAM


Hi all, Knoldus has organized a 30 min session on 3rd March 2017 at 4:50 PM. The topic was Introduction to AWS IAM. Many people have joined and enjoyed the session. I am going to share the slides here. Please let…

4 comments on “Handling HTTPS requests with Akka-HTTPS Server”

Handling HTTPS requests with Akka-HTTPS Server


Hi guys, In my last blogs I explained how one can create a self-signed certificate and KeyStore in PKCS12. You can go through the previous blog, as we'll be needing certificate and keystore  for handling HTTPS requests. https://blog.knoldus.com/2016/10/18/create-a-self-signed-ssl-certificate-using-openssl/ https://blog.knoldus.com/2016/10/26/how-to-create-a-keystore-in-pkcs12-format/ Akka-HTTP provides both Server-Side and…

7 comments on “How to create a KeyStore in PKCS12 Format.”

How to create a KeyStore in PKCS12 Format.


In my last blog I explained how to create a self-signed SSL certificate. You can go through the previous blog and generate the certificate and private key as we'll be needing it for creating a KeyStore. Create a self-signed SSL…

0 comments on “How to build secure Web Application”

How to build secure Web Application


We all use web applications everyday whether we consciously know it or not. That is, all of us who browse the web. Now a days we have seen a significant surge in the amount of web application specific vulnerabilities that are disclosed to…