<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security on Janik von Rotz</title>
    <link>https://janikvonrotz.ch/categories/security/</link>
    <description>Recent content in Security on Janik von Rotz</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Mon, 13 Apr 2026 08:26:08 +0200</lastBuildDate>
    <atom:link href="https://janikvonrotz.ch/categories/security/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Migrate From Pass to KeepassXC</title>
      <link>https://janikvonrotz.ch/2026/04/13/migrate-from-pass-to-keepassxc/</link>
      <pubDate>Mon, 13 Apr 2026 08:26:08 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2026/04/13/migrate-from-pass-to-keepassxc/</guid>
      <description>&lt;p&gt;In 2017 I &lt;a href=&#34;https://janikvonrotz.ch/2017/07/24/migrate-keepass-to-pass/&#34;&gt;migrated from KeePass to Pass&lt;/a&gt; and now migrated back to KeePassXC. For almost 9 years I was a happy &lt;a href=&#34;https://www.passwordstore.org/&#34;&gt;pass&lt;/a&gt; user. It still does a very good job and keeping password management simple. But setting up pass on a new device was always a bit difficult.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store Passkeys in KeePassXC</title>
      <link>https://janikvonrotz.ch/2025/07/04/store-passkeys-keepassxc/</link>
      <pubDate>Fri, 04 Jul 2025 08:04:42 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2025/07/04/store-passkeys-keepassxc/</guid>
      <description>&lt;hr&gt;&#xA;&lt;p&gt;The goal of Passkeys is to replace passwords.&lt;/p&gt;&#xA;&lt;p&gt;The idea is that instead of remembering a password and entering it to access your account, you own a device that generates a password for you.&lt;/p&gt;&#xA;&lt;p&gt;Remembering is replaced with Owning.&lt;/p&gt;&#xA;&lt;p&gt;In this post, I&amp;rsquo;ll give an example of such a device and how you can create and store a Passkey securely.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Store and load SSH keys in KeePass</title>
      <link>https://janikvonrotz.ch/2024/10/18/store-and-load-ssh-keys-in-keepass/</link>
      <pubDate>Fri, 18 Oct 2024 11:03:41 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2024/10/18/store-and-load-ssh-keys-in-keepass/</guid>
      <description>&lt;p&gt;I learned about this KeePass feature way too late. With KeePass you can store and load your SSH keys in a secure and encrypted way. No more worrying about your SSH private key being exposed or accessed on your local machine.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Die nicht ganz normale Bank - Kommentar</title>
      <link>https://janikvonrotz.ch/2022/03/07/die-nicht-ganz-normale-bank-kommentar/</link>
      <pubDate>Mon, 07 Mar 2022 10:40:54 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2022/03/07/die-nicht-ganz-normale-bank-kommentar/</guid>
      <description>&lt;p&gt;Dieser BlogPost basiert auf meinem Kommentar zum Artikel: &lt;a href=&#34;https://www.republik.ch/2022/02/24/die-nicht-ganz-normale-bank&#34;&gt;Republik - Die nicht ganz normale Bank&lt;/a&gt;. Der Header des Artikels ist:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;Eine Sicherheitslücke bei der Postfinance ermöglichte Einblick in die Daten von Kunden. Möglicherweise wurde dabei auch das Bankgeheimnis verletzt.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;Hier folgt mein Kommentar:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nginx WAF with ModSecurity and OWASP CRS</title>
      <link>https://janikvonrotz.ch/2020/02/26/nginx-waf-with-modsecurity-and-owasp-crs/</link>
      <pubDate>Wed, 26 Feb 2020 08:57:31 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2020/02/26/nginx-waf-with-modsecurity-and-owasp-crs/</guid>
      <description>&lt;p&gt;This tutorial explains how to enable and test the Open Web Application Security Project Core Rule Set (OWASP CRS) for use with the Nginx and ModSecurity. We are going to setup a Docker Compose project and deploy a ModSecurity enabled Nginx container with the CRS. Everything will be done using Open Source tools only.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Do not use VPN services</title>
      <link>https://janikvonrotz.ch/2019/10/23/do-not-use-vpn-services/</link>
      <pubDate>Wed, 23 Oct 2019 00:05:42 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2019/10/23/do-not-use-vpn-services/</guid>
      <description>&lt;p&gt;On my latest &lt;a href=&#34;https://news.ycombinator.com&#34;&gt;Hacker News&lt;/a&gt; trip I came along &lt;a href=&#34;https://news.ycombinator.com/item?id=21326484&#34;&gt;this fine post&lt;/a&gt;. I already told many people that they must avoid using VPN services if possible. In most cases there is no need and this post describes it very well.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Create pkcs12 key- and truststore with keytool and openssl</title>
      <link>https://janikvonrotz.ch/2019/01/22/create-pkcs12-key-and-truststore-with-keytool-and-openssl/</link>
      <pubDate>Tue, 22 Jan 2019 14:05:15 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/22/create-pkcs12-key-and-truststore-with-keytool-and-openssl/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/&#34;&gt;last post&lt;/a&gt; I&amp;rsquo;ve showed you how to create a custom certificate authority and sign a server cert using openssl without user interaction.&lt;/p&gt;&#xA;&lt;p&gt;For this post I assume that we want to set up a webservice that requires a &lt;a href=&#34;https://en.wikipedia.org/wiki/PKCS_12&#34;&gt;pkcs12&lt;/a&gt; keystore. Using openssl and the java keytool we are going to create a pkcs12 store and add our ca cert, server cert and server key. Further, we assume that the application also requires a truststore containing the ca cert only.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Create a certificate authority and sign server certificates without prompting using openssl</title>
      <link>https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/</link>
      <pubDate>Mon, 21 Jan 2019 16:20:35 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/21/create-a-certificate-authority-ca-and-sign-server-certificates-without-prompting-using-openssl/</guid>
      <description>&lt;p&gt;Most of the times people want to get a certificate for the hostname &lt;em&gt;localhost&lt;/em&gt;, &lt;a href=&#34;https://letsencrypt.org/docs/certificates-for-localhost/&#34;&gt;let&amp;rsquo;s encrypt wrote a nice post&lt;/a&gt; about this, but sometimes people want a certificate for any hostname. And further, signed by a custom CA and if possible should the key material be generated without user interaction. In this post I have covered the less likely case.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Future of Authentication</title>
      <link>https://janikvonrotz.ch/2019/01/07/the-future-of-authentication/</link>
      <pubDate>Mon, 07 Jan 2019 09:06:27 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/07/the-future-of-authentication/</guid>
      <description>&lt;p&gt;The world is changing and so does it in 2019. Time to make so predictions for the new year.&lt;/p&gt;&#xA;&lt;p&gt;I firmly believe that we will see huge progress in the field of secure user authentication. As you might know the current state of authentication is fundamentally flawed. Users set weak passwords, 2-factor authentication is a usability mess and &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;accounts are compromised on a daily basis&lt;/a&gt;. These problems are well known and big tech companies have tried to tackle them on their own.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Using pass in teams</title>
      <link>https://janikvonrotz.ch/2018/04/03/using-pass-in-teams/</link>
      <pubDate>Tue, 03 Apr 2018 08:29:22 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2018/04/03/using-pass-in-teams/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://www.passwordstore.org/&#34;&gt;Pass&lt;/a&gt; is the standard password manager for Unix systems. It follows the &lt;a href=&#34;http://en.wikipedia.org/wiki/Unix_philosophy&#34;&gt;Unix philosophy&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;Pass saves passwords in text files and encrypts them using a gpg key. The folder structure containing the encrypted files is the pass store. Sharing a pass store without handing over the gpg key requires a gpg key exchange. Git is integrated into the pass &lt;a href=&#34;https://en.wikipedia.org/wiki/Command-line_interface&#34;&gt;cli&lt;/a&gt; and is used as version control system.&lt;/p&gt;&#xA;&lt;p&gt;This document is a guideline for users which require access to a shared pass store and is also a documentation of how to set up a shared pass store. The first part elaborates the process of creating a shared pass store and the second part shows how collaboration from the perspective of a user looks like.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Migrate KeePass to Pass</title>
      <link>https://janikvonrotz.ch/2017/07/24/migrate-keepass-to-pass/</link>
      <pubDate>Mon, 24 Jul 2017 10:05:46 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2017/07/24/migrate-keepass-to-pass/</guid>
      <description>&lt;p&gt;I&amp;rsquo;m using &lt;a href=&#34;http://keepass.info/&#34;&gt;KeePass&lt;/a&gt; for a few years now. It always has been the password manager of my choice.&#xA;Currently I&amp;rsquo;m using KeePass on my Mac and Windows connected to the same database file. The KeePass database file is stored in a OneDrive folder, encrypted with a password and keyfile, which is stored in the &lt;a href=&#34;https://keybase.io&#34;&gt;Keybase&lt;/a&gt; filesystem. This setup gives me maximum security and portability. However, it makes it impossible to use KeePass on my mobile device. Also I miss the possibility to use KeePass in my browser or on the command line. I&amp;rsquo;ve looked for an alternative solution, which doesn&amp;rsquo;t compromise on security and gives me the same level of portability.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Install Let’s Encrypt and create a free SSL certificate</title>
      <link>https://janikvonrotz.ch/2015/12/04/install-lets-encrypt-and-create-a-free-ssl-certificate/</link>
      <pubDate>Fri, 04 Dec 2015 11:23:57 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/12/04/install-lets-encrypt-and-create-a-free-ssl-certificate/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/2e0ee4cf7e04bb75742d&#34;&gt;https://gist.github.com/2e0ee4cf7e04bb75742d&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let’s Encrypt&lt;/a&gt; is a free, automated, and open certificate authority (CA), run for the public’s benefit. Let’s Encrypt is a service provided by the Internet Security Research Group (ISRG). This guide shows you how you can obtain a free SSL certificate.&lt;/p&gt;</description>
    </item>
    <item>
      <title>free SSL for everybody</title>
      <link>https://janikvonrotz.ch/2015/03/23/free-ssl-for-everybody/</link>
      <pubDate>Mon, 23 Mar 2015 09:09:11 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/03/23/free-ssl-for-everybody/</guid>
      <description>&lt;p&gt;&lt;a href=&#34;https://letsencrypt.org/&#34;&gt;Let&amp;rsquo;s Encrypt&lt;/a&gt; is the latest initiative by the &lt;a href=&#34;https://letsencrypt.org/about/&#34;&gt;Internet Security Research Group (ISRG)&lt;/a&gt;.&#xA;Their goal is simple, every site on the internet has to be SSL secured.&lt;/p&gt;&#xA;&lt;p&gt;They want to achieve that by serving an open certificate authority (CA) and also provide a tool to set up a secured site the easiest way possible.&lt;/p&gt;&#xA;&lt;p&gt;And now the big deal about this, their service is free of charge!&lt;/p&gt;&#xA;&lt;p&gt;If this is really a thing, it will be a disaster for the SSL economy. As you might know SSL certificates are everything else than cheap. So good luck to every company that relays on selling SSL certificates as their core competence.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Say Goodbye to TrueCrypt</title>
      <link>https://janikvonrotz.ch/2014/05/30/say-goodbye-to-truecrypt/</link>
      <pubDate>Fri, 30 May 2014 07:21:00 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/05/30/say-goodbye-to-truecrypt/</guid>
      <description>&lt;p&gt;Apparently the developer of TrueCrypt threw in the towel this week.&lt;/p&gt;&#xA;&lt;p&gt;The official site &lt;a href=&#34;http://truecrypt.org&#34;&gt;http://truecrypt.org&lt;/a&gt; redirects to &lt;a href=&#34;http://truecrypt.sourceforge.net/&#34;&gt;http://truecrypt.sourceforge.net/&lt;/a&gt; where you&amp;rsquo;ll find instructions to migrate you TrueCrypt disk to Microsofts built-in solution Bitlocker.&lt;/p&gt;&#xA;&lt;p&gt;The reason for all this is obvious, TrueCrypt can&amp;rsquo;t compete against Microsofts Bitlocker as their software comes with every Windows 8 version (withWindows 7 you had to have an enterprise license in order to use Bitlocker).&lt;/p&gt;</description>
    </item>
    <item>
      <title>Redesign of DuckDuckGo</title>
      <link>https://janikvonrotz.ch/2014/05/20/redesign-of-duckduckgo/</link>
      <pubDate>Tue, 20 May 2014 14:17:15 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/05/20/redesign-of-duckduckgo/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://duckduckgo.com/&#34;&gt;DuckDuckGo search engine&lt;/a&gt; website has been redesigned. Hurray!&lt;/p&gt;&#xA;&lt;p&gt;It grew up from a crappy students project to a respectable Google competitor.&lt;/p&gt;&#xA;&lt;p&gt;Compared to other search engines DuckDuckGo doesn&amp;rsquo;t intrude your privacy.&lt;/p&gt;&#xA;&lt;p&gt;What? You want to know why you should care about your privacy?&#xA;I&amp;rsquo;ll let the real pros answer this question: &lt;a href=&#34;https://duckduckgo.com/privacy&#34;&gt;https://duckduckgo.com/privacy&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Netwars Project - Today’s IT threads well explained</title>
      <link>https://janikvonrotz.ch/2014/05/01/newars-project-todays-it-threads-well-explained/</link>
      <pubDate>Thu, 01 May 2014 13:19:00 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/05/01/newars-project-todays-it-threads-well-explained/</guid>
      <description>&lt;p&gt;This time I want to tell you about the &lt;a href=&#34;http://www.netwars-project.com/&#34;&gt;netwars project&lt;/a&gt;. It&amp;rsquo;s a fact based cross platform experience exploring the impending threat of cyber warfare.&lt;/p&gt;&#xA;&lt;p&gt;There&amp;rsquo;s a web series, tv production, digital graphic novel and soon an audio book will be released.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Install WPScan</title>
      <link>https://janikvonrotz.ch/2014/04/29/install-wpscan/</link>
      <pubDate>Tue, 29 Apr 2014 07:10:57 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/29/install-wpscan/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/11214650&#34;&gt;https://gist.github.com/11214650&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;WPScan is a black box WordPress vulnerability scanner.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Prevent a lot of spam on your next php form with this simple trick</title>
      <link>https://janikvonrotz.ch/2014/04/28/prevent-a-lot-of-spam-on-your-next-php-form-with-this-simple-trick/</link>
      <pubDate>Mon, 28 Apr 2014 12:08:19 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/28/prevent-a-lot-of-spam-on-your-next-php-form-with-this-simple-trick/</guid>
      <description>&lt;p&gt;Spam bots were parsing websites html to code and searching for form patterns. What they luckily don&amp;rsquo;t do in most cases is running javascript or applying css code.&#xA;This behaviour is a good way to tell a human from a spambot apart.&lt;/p&gt;&#xA;&lt;p&gt;Here is a simple example of how to make use of this behaviour to prevent a lot of spam.&lt;/p&gt;</description>
    </item>
    <item>
      <title>How the Heartbleed bug works</title>
      <link>https://janikvonrotz.ch/2014/04/14/how-the-heartbleed-bug-works/</link>
      <pubDate>Mon, 14 Apr 2014 06:39:22 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/14/how-the-heartbleed-bug-works/</guid>
      <description>&lt;p&gt;This is the most accurate explanation I&amp;rsquo;ve found so far. Thanks to &lt;a href=&#34;http://xkcd.com/&#34;&gt;xkcd&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open SSL Heartbleed Bug</title>
      <link>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</link>
      <pubDate>Wed, 09 Apr 2014 15:25:47 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/09/open-ssl-heartbleed-bug/</guid>
      <description>&lt;p&gt;For those who missed it. The OpenSSL project has recently announced a security vulnerability in OpenSSL affecting versions 1.0.1 and 1.0.2 (CVE-2014-0160).&lt;/p&gt;&#xA;&lt;p&gt;Details of the bug are available here: &lt;a href=&#34;http://heartbleed.com/&#34;&gt;The Heartbleed Bug&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;You can check you website here: &lt;a href=&#34;http://filippo.io/Heartbleed/&#34;&gt;Heartbleed test&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;Details and update instructions from the websites of your Linux vendor of choice:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://aws.amazon.com/amazon-linux-ami/security-bulletins/ALAS-2014-320/&#34;&gt;Amazon Linux AMI&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://rhn.redhat.com/errata/RHSA-2014-0376.html&#34;&gt;Red Hat&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;http://www.ubuntu.com/usn/usn-2165-1/&#34;&gt;Ubuntu&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;On Ubuntu the update is simply done by executing these commands:&lt;/p&gt;&#xA;&lt;pre&gt;&lt;code&gt;sudo apt-get update&#xA;sudo apt-get upgrade&#xA;&lt;/code&gt;&lt;/pre&gt;&#xA;&lt;p&gt;The following command shows (after an upgrade) all services that need to be restarted.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Nginx SSL website</title>
      <link>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</link>
      <pubDate>Thu, 03 Apr 2014 07:54:04 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/04/03/nginx-ssl-website/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9408793&#34;&gt;https://gist.github.com/9408793&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;This best practice shows you the most advanced SSL configurations for your Nginx website.&#xA;For productive usage it&amp;rsquo;s recommended to use only public-signed certificates.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Convert SSL certificates</title>
      <link>https://janikvonrotz.ch/2014/03/27/convert-ssl-certificates/</link>
      <pubDate>Thu, 27 Mar 2014 14:01:50 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/27/convert-ssl-certificates/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9413205&#34;&gt;https://gist.github.com/9413205&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;h1 id=&#34;requirements&#34;&gt;Requirements&lt;/h1&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/&#34;&gt;Get a free verified SSL certificate from StartSSL (optional)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h1 id=&#34;instructions&#34;&gt;Instructions&lt;/h1&gt;&#xA;&lt;p&gt;When buying a certificate from you CA (Certification Authority) e.g. a wildcard certificate for *.example.org, you have to convert this file to different formats in order to use them with your webserver installation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Get a free verified SSL certificate from StartSSL</title>
      <link>https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/</link>
      <pubDate>Wed, 26 Mar 2014 10:29:07 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/26/get-a-free-verified-ssl-certificate-from-startssl/</guid>
      <description>&lt;p&gt;&lt;em&gt;This post is part of my &lt;a href=&#34;https://janikvonrotz.ch/your-own-virtual-private-server-hosting-solution/&#34;&gt;Your own Virtual Private Server hosting solution&lt;/a&gt; project.&lt;/em&gt;&lt;br&gt;&#xA;&lt;em&gt;Get the latest version of this article here: &lt;a href=&#34;https://gist.github.com/9430791&#34;&gt;https://gist.github.com/9430791&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;SSL certificates aren&amp;rsquo;t cheap. You can create them on your own for private use.&#xA;However for internet use you have to get a verified certificate.&lt;/p&gt;&#xA;&lt;p&gt;Luckily there&amp;rsquo;s &lt;a href=&#34;https://www.startssl.com/&#34;&gt;https://www.startssl.com/&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;They offer you a class 1 SSL certificate for free. Their site might not look trustworthy, but I&amp;rsquo;m quite shure they do a great job.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Website Update SSL</title>
      <link>https://janikvonrotz.ch/2014/03/19/website-update-ssl/</link>
      <pubDate>Wed, 19 Mar 2014 15:15:21 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2014/03/19/website-update-ssl/</guid>
      <description>&lt;p&gt;Hi visiter,&lt;/p&gt;&#xA;&lt;p&gt;As you might have already seen, this websites is now  accessible over https.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://janikvonrotz.ch/wp-content/uploads/2014/03/Janik-von-Rotz-loves-SSL.jpg&#34; alt=&#34;Janik von Rotz loves SSL&#34;&gt;&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve moved this website to a new custom webserver run by &lt;a href=&#34;https://aws.amazon.com/de/ec2/&#34;&gt;Amazon AWS EC2&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;m still trying to fix some minor errors, so don&amp;rsquo;t be confused if the website is not reachable for a certain time.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Open a Windows Remote Connection using KeePass credentials</title>
      <link>https://janikvonrotz.ch/2013/11/13/open-a-windows-remote-connection-using-keepass-credentials/</link>
      <pubDate>Wed, 13 Nov 2013 15:15:16 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2013/11/13/open-a-windows-remote-connection-using-keepass-credentials/</guid>
      <description>&lt;p&gt;KeePass is a highly recommended Passwordsafe. Despite its supposed to be used mainly by private people it&amp;rsquo;s adaptable for business cases. In my company the KeePass password database is saved on a SharePoint folder and is encrypted with a password and a private key. The key has to be stored on the local machine.&lt;/p&gt;&#xA;&lt;p&gt;It could be difficult to force employees to store their passwords in the KeePass database as many won&amp;rsquo;t get along with it. They&amp;rsquo;ll more likely store their password in third party tools. &#xA;However storing a users password in another programm as KeePass f.e. microsoft remote desktop can be a security risk because the password is only encrypted in the user context.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
