kapil sharmaUnveiling VPN Protocols and IPSecIn today’s digital age, where data privacy and security are paramount, Virtual Private Networks (VPNs) have emerged as indispensable tools…4 min read·Sep 25, 2023----
kapil sharmaUnderstanding ICMP: Internet’s Control and Diagnostic ToolThe internet, a vast and intricate web of interconnected devices, relies on a myriad of protocols to ensure smooth communication. One such…5 min read·Sep 25, 2023----
kapil sharmaCertificate Authentication using Webview in AndroidIf your business relies on certificate-based authentication and supports web-based authentication, this blog will guide you through the…2 min read·Sep 20, 2023----
kapil sharmaCertificate-based authentication in Android and iOSWelcome to my comprehensive blog series that delves deep into the realm of certificate-based authentication and modern security methods…2 min read·Sep 20, 2023----
kapil sharmaUnlocking the Power of ASM: Modifying Android OS and Library BehaviourIn the ever-evolving landscape of Android app development, there often arises the need to tailor the behaviour of the operating system (OS)…3 min read·Sep 18, 2023----
kapil sharmaSecurity provider in AndroidAndroid relies on provider to implement Java Security services. That is crucial to ensure secure network communications and secure other…2 min read·Feb 12, 2023----
kapil sharmaUnderstanding the different certificate and file formats.key is the private key. This is accessible to the key owner and no one else. It is used by the server to encrypt and package data for…2 min read·Feb 2, 2023----
kapil sharmaself-signed SSL certificateThe so-called self-signed certificate is a certificate issued by itself, so the subject of the certificate cannot be trusted.5 min read·Jan 30, 2023----