what is the difference between the root CA certificate and the intermediate CSR certificate

I tried to search online for the difference between both CSR certificate and a certificate but I couldn’t find a concrete asnwer.
I am doing my own lab using this tutorial https://www.golinuxcloud.com/openssl-create-certificate-chain-linux… Continue reading what is the difference between the root CA certificate and the intermediate CSR certificate

.exe with Digital Signature, showing SHA1 but the Certificate is SHA384, is it secure?

For this file it shows SHA1:

But going into details the certificate looks like this:

I know SHA1 is an outdated algorithm but I’m not sure about this nested construction. Is this insecure? Which of the two parts matter, does it matter th… Continue reading .exe with Digital Signature, showing SHA1 but the Certificate is SHA384, is it secure?

Can you use AD CS to generate certificates for service users with the computer name in the certificate details?

I am working on seeing if Active Directory Certificate Services can be used to manage the trust infrastructure for a data center environment. I have a series of different services that are run on web hosts using various different service … Continue reading Can you use AD CS to generate certificates for service users with the computer name in the certificate details?

What prevents certificate authorities from issuing fraudulent TLS certificates?

There have been reports of attacks against certificate authorities resulting in the issuance of fraudulent TLS certificates for sites such as google.com, yahoo.com, and skype.com. These attacks seem to be a thing of the past though, and I … Continue reading What prevents certificate authorities from issuing fraudulent TLS certificates?