Security logoConvert PEM File Format to Java Keystore

DateModifiedViewsCategory

There are two major ways to convert PEM file into Java keystore one. The fist way is very easy because it is used a tool which is capable of direct conversion of those files. As a tool, for example, you can use KeyStore Explorer. The second way is not trivial …

more ...

Python logoStore Sensitive Data Locally in Windows Using Python

Some applications request to key in sensitive information each time when you run it. For example, a password to access MySql server. You can store it in a file or in a database, but it might violate your company security policy or it might add a level of complexity. Majority …

more ...

Alpine logoCreate Let's Encrypt Certificate in Alpine for Nginx

Securing Web sites with HTTPS protocol gives many advantages along with increasing rankings in search engine optimization (SEO). There are many Certificate Authority which provides SSL/TLS certificates. Some of them are free. Let's Encrypt is a reputable non-profit certificate authority providing certificates at no charge. Let's Encrypt is supported …

more ...

Dbeaver logoCreate SSH Key in DBeaver CE

SSH keys are widely used to secure access to sensitive information. They provide both relatively easy implementation and better security than passwords. Generating of SSH keys can be done with different tools. In some cases, the process is complicated and requests manual interaction. DBeaver Community Edition (CE) utilizes SSH keys …

more ...

Security logoExport TLS/SSL Server Certificate from Internet Browser

DateModifiedViewsCategory

To securely browse the Web, HTTPS protocol is established. The secure protocol requests public certificate which is freely transmitted from a Web site to a client. The public certificate can be exported from Internet browser in Privacy-Enhanced Mail (PEM) format. If a certificate is exported from PKCS #12 or other …

more ...

Security logoConvert Java Keystore to PEM File Format

Java keystore (JKS) file includes public certificates and cryptography keys. It is secured by a password and used in java applications. Other consumers of public certificates and cryptography keys, for example, tools or software libraries might not accept JKS format. In that case, Java keystore file can be converted into …

more ...

Trino logoHide Passwords and Sensitive Data in Trino Configuration Files

Trino configuration files contain passwords and sensitive data in plain text. Corporation security policies are not tolerant with it. That kind of information must be hidden from users who are not authorized to have access to it. As a rule of thumb, DevOps and security teams are responsible to set …

more ...

Security logoRemove Private Key from Java Keystore

Java keystore (JKS) is a file secured by a password. Java keystore repository can contain public key certificates with corresponding private keys. The keys are used to encrypt communication over network. If JKS file is distributed, private keys should be removed from the repository. keytool tool is aimed to manipulate …

more ...