should I treated the let’s encrypt fullchain.pem as a public key

I am using let’s encrypt to generate a certificate. It contains ‘fullchain.pem’ and ‘privkey.pem’. should I treated the let’s encrypt fullchain.pem as a public key? I find the public key certificate format as same with the fullchain.pem. … Continue reading should I treated the let’s encrypt fullchain.pem as a public key

should I treated the let’s encrypt fullchain.pem as a public key

I am using let’s encrypt to generate a certificate. It contains ‘fullchain.pem’ and ‘privkey.pem’. should I treated the let’s encrypt fullchain.pem as a public key? I find the public key certificate format as same with the fullchain.pem. … Continue reading should I treated the let’s encrypt fullchain.pem as a public key

What are the ways to browse the web without exposing a a manually operated computer’s IP address?

I figure these as the ways to browse the web without exposing a manually operated computer’s IP address:

Proxy (such as "download from us" proxy)
VPN
TOR
Using a remote GUI operating system (via, say, TeamViewer).

There might b… Continue reading What are the ways to browse the web without exposing a a manually operated computer’s IP address?

Consider a Fraudulent bank website, would it violate all the aspects of the CIA triad or any one? [closed]

I believe it would violate all the three aspects due to following reasons:

Confidentiality: Since the website is obviously a scam, in case any person/user registers it, the data of the user would not be confidential or would be up for sal… Continue reading Consider a Fraudulent bank website, would it violate all the aspects of the CIA triad or any one? [closed]

From a modular development standpoint, should a "firewall" do anything else than filtering ports?

From a modular development standpoint, should a "firewall" do anything else than filtering ports?
This leads me to further ask, have there been attempts to reform the terminology from "firewall" to "port filterer&q… Continue reading From a modular development standpoint, should a "firewall" do anything else than filtering ports?