![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/all/themes/custom_front/images/you_are_here_red.gif)
![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/default/files/beta-site.gif)
|
Demystifying PKI-Part 2
by Michele (Mike) Hjörleifsson
Jul, 2009 Issue
Article Synopsis
ast month we traveled the road of history reviewing where PKI came from, what it is and how it is used. This month, let's dive into what we can use PKI for on a daily basis and then we'll set up our own standalone Certificate Authority (CA) and start cranking out some certificates of our own.
This article was published in the 25.07 issue of MacTech Magazine. Subscribers saw this article in the print magazine when it was first published. MacTech provides its readers with valuable information each and every month, but even if it only solves one problem for you a year, it's more than paid for itself.
Subscribe today with a special RISK FREE trial subscription ... and get the back issues at the MacTech Store, or the new MacTech CD with the history of the magazine all in one convenient place.
![](/file/12652/www.mactech.com.tar/www.mactech.com/sites/all/themes/custom_front/img/search_text.gif)
- SPREAD THE WORD:
- Slashdot
- Digg
- Del.icio.us
- Newsvine