When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. mod_ssl - Wikipedia

    en.wikipedia.org/wiki/Mod_ssl

    After US export restrictions on cryptographic software were loosened, mod_ssl became part of the Apache HTTP Server with the release of Apache httpd 2. [2] As of October 10, 2009, the latest version released for mod_ssl in Apache 1.3 is mod_ssl v2.8.31-1.3.41 on February 8, 2008.

  3. List of Apache modules - Wikipedia

    en.wikipedia.org/wiki/List_of_Apache_modules

    SSL/TLS engine based on GnuTLS. Similar to mod_ssl in purpose, but it supports some features and protocols that mod_ssl does not, and it does not use OpenSSL. [61] mod_gosp: Version 2.4 and newer: Third-party module: Scott Pakin: BSD 3-Clause Clear License: Embed server-side Go code on web pages à la PHP. [62] mod_headers: Version 1.2 and ...

  4. HTTP Public Key Pinning - Wikipedia

    en.wikipedia.org/wiki/HTTP_Public_Key_Pinning

    Most browsers disable pinning for certificate chains with private root certificates to enable various corporate content inspection scanners [6] and web debugging tools (such as mitmproxy or Fiddler). The RFC 7469 standard recommends disabling pinning violation reports for "user-defined" root certificates, where it is "acceptable" for the ...

  5. Comparison of TLS implementations - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_TLS...

    Several versions of the TLS protocol exist. SSL 2.0 is a deprecated [27] protocol version with significant weaknesses. SSL 3.0 (1996) and TLS 1.0 (1999) are successors with two weaknesses in CBC-padding that were explained in 2001 by Serge Vaudenay. [28]

  6. wolfSSL - Wikipedia

    en.wikipedia.org/wiki/WolfSSL

    SSL 2.0 – SSL 2.0 was deprecated (prohibited) in 2011 by RFC 6176. wolfSSL does not support it. SSL 3.0 – SSL 3.0 was deprecated (prohibited) in 2015 by RFC 7568. In response to the POODLE attack , SSL 3.0 has been disabled by default since wolfSSL 3.6.6, but can be enabled with a compile-time option.

  7. HTTPS Everywhere - Wikipedia

    en.wikipedia.org/wiki/HTTPS_Everywhere

    HTTPS Everywhere was inspired by Google's increased use of HTTPS [8] and is designed to force the usage of HTTPS automatically whenever possible. [9] The code, in part, is based on NoScript's HTTP Strict Transport Security implementation, but HTTPS Everywhere is intended to be simpler to use than No Script's forced HTTPS functionality which requires the user to manually add websites to a list. [4]

  8. List of open-source codecs - Wikipedia

    en.wikipedia.org/wiki/List_of_open-source_codecs

    This is a listing of open-source codecs—that is, open-source software implementations of audio or video coding formats, audio codecs and video codecs respectively. Many of the codecs listed implement media formats that are restricted by patents and are hence not open formats.

  9. Java Secure Socket Extension - Wikipedia

    en.wikipedia.org/wiki/Java_Secure_Socket_Extension

    In computing, the Java Secure Socket Extension (JSSE) is a Java API and a provider implementation named SunJSSE that enable secure Internet communications in the Java Runtime Environment. It implements a Java technology version of the Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) protocols .