Lindevs
Programming tutorials, blogs & resources
Menu
  • Home ×
  • Tutorials
    • Programming Language
      • Python
      • PHP
      • Java
      • C
      • C++
      • JavaScript
    • Machine Learning
      • TensorFlow 2
      • PyTorch
    • Computer Vision
      • OpenCV
    • Embedded System
      • Raspberry Pi
      • Arduino
      • ESP8266
      • XIAO SAMD21
    • Home Automation
      • Tasmota
    • Mobile App Development
      • Android
      • Flutter
    • Game Development
      • Unity
    • Framework
      • Laravel
      • Symfony
    • Operating System
      • Linux
        • Ubuntu
      • Windows
    • Database
      • MySQL
    • DevOps
      • Command Line
      • Web Server
      • Grafana
      • Networking
      • Security
      • Containerization
  • Code Snippets
  • Electronics
    • Circuits
  • Questions
    • PHP
  • Contact
    • Sign In

Security

Convert PKCS#8 Format Public Key to PKCS#1 using OpenSSL

Convert PKCS#8 Format Public Key to PKCS#1 using OpenSSL

  • December 31, 2023
  • Security
  • 0 Comments
  • 366 Views
OpenSSL is a powerful and widely used tool for managing cryptographic functions in various applications. One common scenario involves the need to convert public key formats, especially when dealing with...
Convert PEM-Encoded CSR to DER-Encoded using OpenSSL

Convert PEM-Encoded CSR to DER-Encoded using OpenSSL

  • December 30, 2023
  • Security
  • 0 Comments
  • 355 Views
In the realm of digital security, Certificate Signing Request (CSR) play an important role in obtaining digital certificate. However, different systems and applications may require certificates in different formats. One...
Convert PEM-Encoded SSL Certificate to DER-Encoded using OpenSSL

Convert PEM-Encoded SSL Certificate to DER-Encoded using OpenSSL

  • December 29, 2023
  • Security
  • 0 Comments
  • 373 Views
SSL certificates play an important role in securing web communications by encrypting data exchanged between servers and clients. These certificates come in various formats, with PEM and DER being two...
Convert PEM-Encoded Private Key to DER-Encoded using OpenSSL

Convert PEM-Encoded Private Key to DER-Encoded using OpenSSL

  • December 28, 2023
  • Security
  • 0 Comments
  • 879 Views
In the realm of secure communication and cryptography, the format in which cryptographic keys are stored can vary. One common format is PEM, which is a Base64-encoded format often used...
Convert PEM-Encoded Public Key to DER-Encoded using OpenSSL

Convert PEM-Encoded Public Key to DER-Encoded using OpenSSL

  • December 27, 2023
  • Security
  • 0 Comments
  • 555 Views
In the world of cryptography, different systems and applications may require public keys to be encoded in specific formats. One common format is PEM, while another is DER. PEM is...
Get Certificate Chain From Server using OpenSSL

Get Certificate Chain From Server using OpenSSL

  • December 26, 2023
  • Security
  • 0 Comments
  • 821 Views
Securing communication over the internet is crucial in today's digital age, and one fundamental aspect of this security is the use of SSL/TLS certificates. One common task is obtaining the...
Generate Password Hash using OpenSSL

Generate Password Hash using OpenSSL

  • September 16, 2022
  • Security
  • 0 Comments
  • 7410 Views
OpenSSL can be used to generate SSL certificates, encrypt and decrypt data, generate hashes or perform other operations related with cryptography. This tutorial shows how to generate a password hash...
Generate Hash of File using OpenSSL

Generate Hash of File using OpenSSL

  • September 8, 2022
  • Security
  • 0 Comments
  • 7199 Views
Cryptographic hash functions can be used for verifying file integrity. For example, to check that the file has not been altered during transfer over the network. This tutorial explains how...
Sign and Verify File Signature with Public and Private Key using OpenSSL

Sign and Verify File Signature with Public and Private Key using OpenSSL

  • September 1, 2022 (November 5, 2022)
  • Security
  • 2 Comments
  • 4111 Views
Asymmetric cryptography (also known as public key cryptography) is a cryptographic system that uses a public and private key pair. Private key can be used for message signing and public...
Encrypt and Decrypt Files with Public and Private Key using OpenSSL

Encrypt and Decrypt Files with Public and Private Key using OpenSSL

  • August 31, 2022
  • Security
  • 0 Comments
  • 7780 Views
Asymmetric cryptography (also known as public key cryptography) is a cryptographic system that uses a public and private key pair. Public key can be used for data encryption and private...
  • «
  • 1
  • 2
  • 3
  • 4
  • »
Buy Me a Coffee

Recent Posts

  • Install Microsoft Edit on Ubuntu 24.04
  • Install WebStorm on Ubuntu 24.04
  • Install IntelliJ IDEA on Ubuntu 24.04
  • Install Tealdeer on Ubuntu 24.04
  • Install bpftop on Ubuntu 24.04

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
Copyright © 2020 - 2025 · lindevs.com · All Rights Reserved