In my line of work I get to work with a lot of security devices which run self-signed certificates. Those certificates are most of the time generated when the device / appliance is installed, or configured for the very first time. When you connect to one of those devices with a web browser, you tend to see the warnings displayed by the browser that the connection is not to be trusted.

In Firefox, you can add an exception in the browser. When you've done that, the next time you go to the website, the browsers treats the website as trusted.
Last weekend we had our yearly spring trip with the camera club. Somehow the word' spring' didn't come in mind on that day. When I left home, the sun tried to break through, so with luck, it could be a nice day for photography..... Luck was nowhere to be found. The whole day, nothing but drizzle, wind, rain, drizzle, and rain (at least in the vicinity of ' s Hertogenbosch.)
I went a bit early, and when I arrived, I was the only person there, so I was able to shoot some photos without having to worry about other people showing up in my photos.
The Moerputten is an old trainbridge that runs through a patch of protected nature. It's basically just a bridge now. No trains run over it.
When you install a Perfect Server based on Centos and ISPConfig v3.x, the system / 'installer' creates for the components self-signed certificates. All these certificates will generate different warnings in your browser, mail clients etc. So time to eliminate those warnings.
First I needed to find out where all those certificates are located, and what there formats are. In my case, there are three services that use SSL/TLS in some form;
- Postfix SMTP service
- Courier IMAP service
- http / Apache2 webservice
Checking the configuration files will reveal their locations.
My employer decided to give its employees new smartphones. Mostly because we've been begging for them the last couple of years. Unfortunately, not the one(s) we (or perhaps I) have been asking for.
In my line of work I come across customers with wireless networks that need (some sort of) security in place. The only real question I get during those projects is; "Will it work with an iPhone or an iPad?" In my entire career, I haven't had a single question of that kind regarding Android or Windows Mobile phones.... There's no denying it; the iOS devices from Apple are huge. Even in the corporate market.
So, no corporate iOS device for me. Instead, they shipped the Samsung Galaxy S2 (listed as iPhone look-a-like) to me.