Blog Archives

GoToMyPC Saved My Day

I have been working at home now for almost eleven years.  When my job first started, it was the first time that a software developer worked remotely in my company.  There were many barriers before this time but luckily my

Posted in Angst, GoToMyPC

Certificate Public Key Usage

Public keys that reside inside certificates are only meant to be used for certain things.  This is indicated by the Key Usage and Extended Key Usage extensions. The first stop is documentation from OpenSSL. Key usage supported names: digitalSignature nonRepudiation

Tagged with: , ,
Posted in Certificates, PKI

Certificate Authority Trust Model

There are many different kinds of certificate authorities available.  A description from Windows 2000 Server documentation helps to clarify.  The different players are: Root CA Subordinate CA Intermediate CA Issuing CA The CA hierarchies are very flexible based on simple

Posted in Uncategorized

SSL Handshake

How do you exchange secrets without knowing the codes to use?  Typically it is a recursive kind of problem.  With the classic mode of symmetric encryption keys, it is necessary to magically transport the key to the other side.  This

Tagged with:
Posted in SSL

Digital Certificates (part 2 of 2)

Part two continues on the topic of digital certificates.    One of the keys is private and the other is public. Below are some useful examples and explanations from Novell: But, how does this work on the Internet for transactions?

Tagged with: ,
Posted in Certificates, PKI

Digital Certificates (part 1 of 2)

This post will explore digital certificates.  Consider this as a result of a need to learn more detail about how certificates work. Start here: VeriSign: Introduction to Digital Certificates VeriSign: Introduction to Public Key Cryptography Paraphrasing: Cryptography solves many key

Tagged with: , ,
Posted in Certificates, Security, SSL

ADFS 2.0 Master Page

Active Directory Federation Server (ADFS) runs on IIS web server. At first it appeared to be a bit mysterious how this was laid out but it is now obvious that it follows the rules of a typical Microsoft ASP.NET web

Posted in ADFS, ASP.NET

One line XML files

XML can be hard to read without any formatting. The computer could care less but human eyes cannot easily see the patterns. This recently became obvious with the FedUtil program that comes with Windows Identity Foundation. All the XML ends

Tagged with:
Posted in Uncategorized

Working From Home 2010

Have you ever wondered what it would be like to work from home?  Do images of stuffing envelopes or selling catalog items on the party plan come to mind? Ten years ago I signed a contract to work for Citrix.

Posted in Work From Home

Ego-less Genius

A few years ago, I participated in a seminar about creativity.  Since then there have been several email updates about creativity in the business world.  From the latest email, there was a link to a speech from Elizabeth Gilbert.  You

Posted in Ideas, Observations, Video
Archives
Categories
Follow Red Circle Blog on WordPress.com