Our accreditations and awards:
30 days guarantee
Cookies
0 items Total £0.00

PEM

PEM (Privacy Enhanced Mail) is an internet standard for encrypting/signing e-mail. It provides confidentiality, authentication and message integrity using various encryption methods.

Pharming

Pharming is an attempt to defraud internet surfers by hijacking a website's domain name or URL, and redirecting users to an imposter website where fraudulent requests for information are made. To inspire more trust and provide assurance to your customers, make sure your site is secure by

Phishing

Phishing is an e-mail/browser fraud method in which the perpetrator sends out legitimate-looking emails or sets up legitimate-looking sites in an attempt to gather personal and financial information (such as social security numbers, bank account numbers, passwords…) from recipients/ visitors. To inspire more trust and provide assurance to your customers, make sure your site is secure by choosing one of our SSL certificates

PKCS #12

PKCS #12 is aRSA standard that describes the syntax for storing a user's public keys, private keys, certificates, and other related cryptographic information. The aim is to standardise a single key file for use among a variety of different applications.

PKCS #7

PKCS #7 is a cryptographic message syntax standard from RSA . It describes general syntax for data compatible with PEM format that may have cryptography applied to it, such as digital signatures and digital envelopes.

PKCS (Public-Key Cryptography Standards)

A series of cryptographic standards of public keys issues, published by RSA Laboratories.

PKI (Public Key Infrastructure)

PKI (Public Key Infrastructure) is a computerised form of message encryption using two keys: one is public and used by the sender to encrypt the message, the other is private and used by the recipient to decrypt the message. Find out more about private keys and public keys.

Platinum Partner

Platinum Partner is the highest level of partnership. SSL247 has been a Platinum Partner of the biggest Certification Authorities, since 2007, for Symantec, Thawte, GlobalSign and GeoTrust; the first SSL provider to be so.

Private IP Address

A private IP address is usually used on local networks. An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private uses by Internet Standard groups like RIPE. Example internal/private IP ranges: 10.0.0.0 / 10.255.255.255 / 172.16.0.0 / 172.31.255.255 / 192.168.0.0 / 192.168.255.255

Private Key

Your half of the key pair, the other being the public keys. It is associated with your SSL certificate. When you create a CSR (Code Signing Request), you create a private key at the same time. Keep your private key private! Do not email it, share it, or make it public - you do not need to provide it during your enrolment, or at any other time.

Public Key

This part of the key is available publicly on your SSL certificate viewable on your website. It matches your private keys. Remember that if you delete your private key, your public key becomes useless.
Was this information Useful?
Comments

Privacy Policy