DEV Community

Jessica howe profile picture

Jessica howe

I am Jessica Howe, a Cyber Security Consultant for financial institutions and banks. I voluntarily write blogs on Cyber Security, Encryption, and Programming languages.

Joined Joined on  twitter website

Education

Chicago, IL

Work

Freelance Cyber Security Consultant

Methods to Install SSL Certificate on WordPress

Methods to Install SSL Certificate on WordPress

Comments
6 min read

Want to connect with Jessica howe?

Create an account to connect with Jessica howe. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Difference Between Digital Signature vs Digital Certificate

Difference Between Digital Signature vs Digital Certificate

Comments
7 min read
5 Steps for a Quick and Effective Transition to 90-Day TLS/SSL Certificates

5 Steps for a Quick and Effective Transition to 90-Day TLS/SSL Certificates

Comments
3 min read
What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

What is Post-Quantum Cryptography (PQC) Migration and How to Secure Data Against Quantum Threats

Comments
3 min read
Learn Everything about WordPress Multisite SSL Certificate

Learn Everything about WordPress Multisite SSL Certificate

Comments 1
6 min read
Encryption Vs. Decryption: What’s the Difference?

Encryption Vs. Decryption: What’s the Difference?

Comments
4 min read
What is a Digital Signature Algorithm (DSA)?

What is a Digital Signature Algorithm (DSA)?

Comments
7 min read
Major Difference to Know Between Asymmetric Encryption and Digital Signature

Major Difference to Know Between Asymmetric Encryption and Digital Signature

Comments
4 min read
How to Resolve SEC_ERROR_UNKNOWN_ISSUER Error in Firefox?

How to Resolve SEC_ERROR_UNKNOWN_ISSUER Error in Firefox?

Comments
6 min read
HTTP to HTTPS Migration – The Complete Guide

HTTP to HTTPS Migration – The Complete Guide

Comments
10 min read
Major Difference to Know Between Port 80 (HTTP) vs. Port 443 (HTTPS)

Major Difference to Know Between Port 80 (HTTP) vs. Port 443 (HTTPS)

Comments
7 min read
Top 10 Most Cheapest Wildcard SSL Certificates for Your Website and Business

Top 10 Most Cheapest Wildcard SSL Certificates for Your Website and Business

Comments
2 min read
A Comprehensive Guide to Wildcard SSL Certificate

A Comprehensive Guide to Wildcard SSL Certificate

Comments
1 min read
SSL/TLS Handshake Explained: Process, Work and Importance

SSL/TLS Handshake Explained: Process, Work and Importance

Comments
2 min read
Performance and Differences Between HTTP and HTTPS

Performance and Differences Between HTTP and HTTPS

Comments
4 min read
What is SSL Inspection and How Does It Function?

What is SSL Inspection and How Does It Function?

Comments
4 min read
How to Fix “Secure Connection Failed” Error in Firefox

How to Fix “Secure Connection Failed” Error in Firefox

Comments
6 min read
Fixing the “pr_connect_reset_error” in Firefox?

Fixing the “pr_connect_reset_error” in Firefox?

Comments
4 min read
What is HSTS Certificate and How to Enable It?

What is HSTS Certificate and How to Enable It?

Comments 1
4 min read
How to Fix NET ERR_CERT_WEAK_SIGNATURE_ALGORITHM Error

How to Fix NET ERR_CERT_WEAK_SIGNATURE_ALGORITHM Error

Comments
5 min read
How to Create a Self-Signed SSL Certificate in Powershell

How to Create a Self-Signed SSL Certificate in Powershell

1
Comments
4 min read
HTTPS Port 443 – Technical Guide on HTTPS Port

HTTPS Port 443 – Technical Guide on HTTPS Port

Comments
5 min read
What is Spyware? Examples of Spyware Types Explained

What is Spyware? Examples of Spyware Types Explained

Comments
7 min read
Block Cipher Vs Stream Cipher – the Difference Explained

Block Cipher Vs Stream Cipher – the Difference Explained

Comments
6 min read
A Complete Guide to SSL Cipher Suites

A Complete Guide to SSL Cipher Suites

1
Comments
6 min read
Decoding the Differences Between TLS, SSL, and HTTPS

Decoding the Differences Between TLS, SSL, and HTTPS

3
Comments
6 min read
A Comprehensive Study of the Hash Function in Cryptography

A Comprehensive Study of the Hash Function in Cryptography

4
Comments
6 min read
Secure Shell Protocol – Everything you need to know

Secure Shell Protocol – Everything you need to know

3
Comments
6 min read
What is PKI Certificate? [A Detailed Guide]

What is PKI Certificate? [A Detailed Guide]

7
Comments
4 min read
What is Asymmetric Encryption, and How Does It Work?

What is Asymmetric Encryption, and How Does It Work?

5
Comments
6 min read
loading...