Steps to Resolve the ‘NET ERR_CERT_AUTHORITY_INVALID’ Error in Google Chrome

Here’s a step-by-step guide to fix the NET::ERR_CERT_AUTHORITY_INVALID error in Chrome for site owners and visitors

If you’re facing the “NET ERROR_CERT_AUTHORITY_INVALID” (or what’s sometimes referred to as “ERR_CERT_AUTHORITY_INVALID” or “NET::ERR_CERT_AUTHORITY_INVALID”) error in Google Chrome, then you’re not alone. Thousands of users around the world face this pesky SSL error, and it’s irritating to say the least. If you’re looking for a solution through this post, you’re either a website owner whose website is facing this error or you’re a user who wants to access a particular website that’s displaying this error message. In either case, this post will help to solve the SSL certificate error in Chrome.

Read More

Email Certificate Not Secure: How to Solve the ‘Not Verified’ Error in Outlook

We have the answers you need about the causes of your Outlook certificate problems and the antidote to fix them

Life with SSL/TLS certificates on your email server is a lot like the summer in London. It’s all mild and pleasant until an occasional rain shower strikes you out of nowhere. If a Microsoft Outlook error such as

If a Microsoft Outlook error such as:

  • The server you are connected to is using a security certificate that cannot be verified” or
  • “email certificate not secure” or
  • “Outlook certificate not trusted” or
  • “Security certificate could not be verified”

Then we’ve got you covered with a solid umbrella.

Read More

How to Convert CER to CRT in OpenSSL

We’ll break down how to convert your certificate file from one file extension to another to work with your server

When working with SSL/TLS certificates and other X.509 digital certificates, you may find yourself needing to convert files from CER to CRT. No worries — you’re not the first (and you certainly won’t be the last) person who needs to know how to convert CER to CRT.

Read More

How to Resolve Comodo RSA Certificate Not Trusted Error

Two methods to help you fix this complex Comodo SSL not trusted error

Unlike other SSL related errors, the “Comodo RSA Certification Authority Not Trusted” or “Comodo RSA Certificate Not Trusted” error doesn’t appear as frequently. However, as you’re reading this sentence right now, it’s likely you’ve come across it and it’s occupying your attention. Well, not for long. In this post, we’ll outline some simple steps that will make this error disappear out of your browser.

Read More

What Is an SSL Certificate for an Email Server?

Have you heard of SSL mail server certificates? Here’s what you need to know

“An SSL/TLS certificate for an email server? Aren’t SSL certificates used for websites?”

If you can even remotely relate to either (or both) of these questions, you’re not alone. Many people have the misconception that SSL certificates are just for websites. Well, it’s easy to understand considering that SSL and website security have become synonymous.

Read More

ECC vs RSA: Comparing SSL/TLS Algorithms

Here’s a comparative analysis of ECC & RSA cryptosystems and how they’re similar or different

Both ECC and RSA are protocols used for encryption in SSL/TLS certificate. But selecting RSA vs ECC certificate before buying SSL/TLS might be a daunting task for a layman. However, let’s understand both algorithms in detail.

ECC vs RSA — how do you choose between these two types of algorithms when choosing an SSL/TLS certificate? Moreover, what do each of these options even mean in terms of encryption?

When purchasing an SSL certificate, users come across many technical specifications that they have no idea about. However, going ahead without understanding these terms isn’t an option for many. They want to get to the roots of these terms so that they can make an educated choice about purchasing the right SSL/TLS certificate to protect their website.

Read More

SHA1 vs SHA2 — The Technical Difference Explained by SSL Experts

Let’s talk about SHA1 vs SHA2 — or SHA-1 vs SHA-2, as you may more frequently see them written.

For some of you, when you hear “SHA,” you may think of the dark, physical manifestations of negative emotions from a popular online game (World of Warcraft). For others who aren’t major MMORPG players, you likely think of SHA-1 and SHA-2 hash algorithms.

Read More

What Is a RapidSSL Intermediate Certificate and How Do I Download It?

Obtaining your intermediate certificate is an essential step to installing your new SSL certificate

One of the most important steps associated with installing an SSL certificate is ensure your intermediate certificates are installed. This is essential for all brands of intermediate certificates, including RapidSSL intermediate certificates.

Read More

FortiGate Users: How to Install a Wildcard SSL Certificate

How to install a wildcard SSL certificate on a FortiGate is a topic that pops up in conversation with our customers once in a blue moon. Heck, you may even be one of them! There are a few different reasons why you may want to install an SSL/TLS certificate on FortiGate — for example, it could have to do with wanting to secure your communications via a virtual private network (VPN).

Read More