vortipb.blogg.se

Floola tutorial
Floola tutorial






floola tutorial floola tutorial
  1. #Floola tutorial how to
  2. #Floola tutorial install

NDIzMDA0NjM4WhcNMDgwNzIyMDA0NjM4WjCBhjEPMA0GA1UEAwwGbXluYW1lMRMwEQYDVQQKDAptĮSBjb21wYW55MSIwIAYDVQQLDBlkZXBhcnRtZW50IG9mIGRlcGFydG1lbnRzMRAwDgYDVQQHDAdnī3JvZG9rMRswGQYDVQQIDBJzdGF0ZSBvZiBuZXcgbm9pc3kxCzAJBgNVBAYMAnp6MIIBuDCCASwGīyqGSM44BAEwggEfAoGBAP1 /U4EddRIpUt9KnC7s5Of2EbdSPO9EAMMeP4C2USZpRV1AIlH7WT2N MIIDQjCCAwGgAwIBAAIBATAJBgcqhkjOOAQDMIGGMQ8wDQYDVQQDDAZteW5hbWU圎zARBgNVBAoMĬm15IGNvbXBhbnkxIjAgBgNVBAsMGWRlcGFydG1lbnQgb2YgZGVwYXJ0bWVudHM圎DAOBgNVBAcMī2dvcm9kb2sxGzAZBgNVBAgMEnN0YXRlIG9mIG5ldyBub2lzeTELMAkGA1UEBgwCenowHhcNMDgw So let’s look at this keystore that we just generated: State or Province Name (full name) : state of new noisyĪs you might figured already, a keystore is a small database, that we just created, that would hold all the keys (private/public) for many systems – right now we only have one pair, but later we can add more keys to the keystore. Organizational Unit Name (department, division): department of departments

Hitting , or blank the field by entering the <.> characterĬommon Name (hostname, IP, or your name): myname

$ keytool -genkey -alias otherguy -keypass -keystore our.keystoreĮnter key store password: are about to enter information that will be incorporated into State or Province Name (full name ) : state of new noisy Locality Name (city, district ) : gorodok Organizational Unit Name (department, division ): department of departments Organization Name (company ) : my company > characterĬommon Name ( hostname, IP, or your name ): myname

Hitting , or blank the field by entering the <.

There are quite a few fields but youĬan use supplied default values, displayed between brackets, by just This information is what is called aĭistinguished Name or DN. $ keytool -genkey -alias otherguy -keypass p -keystore our.keystoreĮnter key store password: ksp are about to enter information that will be incorporated into So, fire up the terminal (Windows’ “cmd”) and let’s generate a pair of public/private keys now:

#Floola tutorial install

In order to get/download a keytool, you just have to install Java (JRE) on your system (95% that you already have it installed, hence you can go ahead and use “keytool” without needing to install/download anything else).Įxamples here are run on Linux (Ubuntu), but as long as you have Java installed, it does not really matter what OS you have to get the job done. “keytool” is a java tool that has a great manual, and since its java – it’ll work on any OS that has JVM. I would show you one of the simplest ways how this can be archived using a tool called… any guess? Yes – a “keytool” – make sense, right?

floola tutorial

There are number of ways – tools/libraries/code snippets/etc.

#Floola tutorial how to

Now let’s see how to do the magic – how to generate a pair of YOUR public and private keys. YOU: receive their top secret response and using YOUR private key decrypt it.THEY: write you an answer, encrypt it with YOUR public key, and send to you.THEY: receive your top secret message and using THEIR private key decrypt it.YOU: write your secret message, encrypt it with THEIR public key and send to them.Now when YOU and THEY have each others public keys and their own private keys communication may begin: THEY: give their public key to anybody who wants to communicate with them.THEY: hide their private key from everybody including YOU.THEY: generate a pair of public/private keys.YOU: give your public key to anybody who wants to communicate with you.YOU: hide your private key from everybody.YOU: generate a pair of public/private keys (where whatever is encrypted with your public key can only be decrypted with your private key).It is actually very simple – there is “YOU” and “THEY”: Hence this little guide will show you one of many ways on how to generate a pair of X.509 public/private keys, and how to access this magic pair to get that “public key”, so it can be given to anyone who needs it.įirst, let us throw a couple of sentences on how these keys are used. Usually when you talk to different sources, nobody would guide you through on how to create that “public key” of yours, “they” would just want it, but you would be left alone to figure out how you should generate it. Hence once you want to communicate with them they give you something called a “public key” ( or “public-key certificate” ) and ask you to give them yours. Have you ever tried to communicate with somebody/something through any kind of technology? Most of the time “those” people/systems like privacy, in a way that they like their communication with everybody including you to be private.








Floola tutorial