The Illustrated TLS Connection: Every Byte Explained
Every byte of a TLS connection explained and reproduced
5 weeks ago
« earlier      
abstruse_goose accessibility addons advertising ajax ama android anime anonymity ansible apache api apple arch article autonomous-vehicles aws bash bazel best-of-legal-advice bible bittorrent book books breach bugtracking builds business c c++ cad car career censorship centos china christianity chrome cli climbing clothing colors comics commitstrip copyright corruption cryptography css culture cyberwarfare dailywtf data deployment design devops dilbert distro diy django dnd dns docker documentation drumming economics education el_reg election-2016 email encryption f_minus facebook fashion feminism finance firefox fonts framework free freeware game-programming games gems git github google government government-surveillance gpg graphite gw harassment hark_a_vagrant hg hiring history hosting html5 ifixit immigration interesting interviewing iphone irc java javascript jinx jobs joel journalism jquery kde knives language law library licensing linux lol lua management manga markdown math mlp mobile monitoring movies music mysql nagios networking nginx nsa open-source osx packaging passwords patterns performance perl philosophy photo photo-processing photography photography-gear php piano politics post-mortem privacy productivity programming psychology python racism rails recipes reddit reference regex remote-work repair ruby russia salaries scala security security-research server shell shirts smbc social software_engineering spiked_math ssh ssl stackoverflow startup statistics symfony sysadmin templates terrorism tesla testing the_oatmeal thinkgeek threadless tmux tools tor torrents trumps-america tweaks twitter typography uber ubuntu uf usability varnish video videos vim voting wallpaper web-operations webdesign webwork windows wordpress wp writing xkcd zsh

Copy this bookmark: