Protect yourself from malicious PKI administrator

Protect Yourself From Malicious PKI Administrator – Role Separation In PKI

Let’s start with some theoretical background about public key role separation. An important step in designing and implementing our public infrastructure is that reminding the groups or users who will manage it, and here, I would like to point out that we should always use active directory groups when we are talking about security managing certification authorities that are a member of active directory, because it is much easier from the management perspective. This design step determines the security of your public infrastructure, so please don’t treat it lightly.

Read more
remote desktop connection

Is Remote Desktop Connection Secure?

If I were to pick my favorite network protocol, RDP for sure would be one of my candidates. It is relatively safe and well-documented, which is kind of a surprise, and it’s working very well in terms of performance, even on poor connections. The definition of the protocol is quite long, as it contains over 400 pages, and, additionally, we have a couple of extensions.

Read more
Load more