Question

In: Computer Science

Instructions: 1. Implement SSL on a local computer. 2. Execute the email application using a secure...

Instructions:

1. Implement SSL on a local computer.

2. Execute the email application using a secure connection.

Solutions

Expert Solution

<VirtualHost*:443>
   DocumentRoot:"Your Project File path"
   ServerName localhost.mywebsite.com
   SSLEngine on
   SSLCertificateFile "file path for cert file"
   SSLCertificatekeyFile "file path for Key file"
   <Directory "Your Project File path">
   Options Indexes FollowSymLinks Include ExecCGI
   Allow from all
   AllowOverride all
   Require all granted
   </Directory>
</VirtualHost>
//---------------------------------------------------------------
Paste above under xampp folder in httpd-vhost.conf file

For ssl certification file and key file use online generator for self sign certification from example I use http://www.selfsignedcertificate.com/ and there paste your domain name.(If you want help with domain name commment below) and it will generate two file . Download them and give the file path to the above mentioned SSL cert and key respectively.

For 2)

Goto php.ini and search for send_mail then un-comment sendmail-path. if the path for it is not there then give the path from xamp/sendmail/sendmail -<search for this file and give the path there.

in sendgrid.ini

1) change the smtp-server to your domain such smtp_server to smtp.google.com

2) for google change smtp port to 587

3) auth_username= your email add
auth_password= your password

4) restart your xampp

you are good to go


Related Solutions

Create a new ASP.NET using MVC. Set the application to SSL Enabled Implement an external login...
Create a new ASP.NET using MVC. Set the application to SSL Enabled Implement an external login provider Facebook.
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure...
1-What measures (Operating system, application software, network, hardware, etc…) are there in your computer to secure your data from hacking? 2-How often do you back up critical data files such as homework files? What type of device do you use for backing up files? Where do you store the backups to ensure they won’t be destroyed if a major disaster (such as a fire) destroys your computer? Do you use online sites for file backups?
Instructions: 1. Read the scenario regarding the email from an employee at The Super Market. 2....
Instructions: 1. Read the scenario regarding the email from an employee at The Super Market. 2. Reply to the email using an indirect strategy • Inform Caitlin of the policy change. • Explain how it will affect her should she choose to return in September. • Although you must refuse her request, let her know that you would like her to stay. • Use the Outline sheet to hep you structure your reply. 3. Compose your new email in a...
A email application is an instance of a client-server model of computer networking. T/F Which of...
A email application is an instance of a client-server model of computer networking. T/F Which of the following command is used to list out process details in Unix system. mkdir process_a ls -;a bg ps -l -u $(whoami) Which of the file is used to sink the output of a process to Null. /dev/null /dev/tty /dev /dev/empty What does a pipe operator do? performs an OR operation takes input form a file and fees as input to other command it...
In Java Develop, test, and execute a graphics application for simulations using Java. Create a Java...
In Java Develop, test, and execute a graphics application for simulations using Java. Create a Java application. Given a set of events, choose the resulting programming actions. Understand the principles behind Java. Understand the basic principles of object-oriented programming including classes and inheritance. Deliverables .java files as requested below. Requirements Create all the panels. Create the navigation between them. Start navigation via the intro screen. The user makes a confirmation to enter the main panel. The user goes to the...
PROGRAM INSTRUCTIONS: 1. Code an application that asks the customer for a log-in and password. 2....
PROGRAM INSTRUCTIONS: 1. Code an application that asks the customer for a log-in and password. 2. The real log-in is "Buffet2011" and the real password is "Rank1Bill2008". 3. Allow the customer two (2) attempts to type either. a. Each time the customer enters an invalid log-in or password issue an error message. b. If the customer fails all two (2) log-in attempts, issue another error message and exit the program. c. If the log-in is successful, the customer can calculate...
1) SSL is used to A) Encrypt specific elements of data for application-specific purposes. B) Encrypt...
1) SSL is used to A) Encrypt specific elements of data for application-specific purposes. B) Encrypt files located on a Web server. C) Encrypt data as it travels over a network. D) Encrypt digital certificates used to authenticate a Web site. E) Encrypt passwords for storage in a database. 2) What kind of attacks does SSL prevent? Select the best answer. Explain. A) SQL Injection. B) Sniffing. C) Variable Manipulation. D) Phishing Attacks. 3) Which of the following are not...
Consider an employee using their computer to send and retrieve email at their workplace. Only Ethernet...
Consider an employee using their computer to send and retrieve email at their workplace. Only Ethernet networks are used for physical connectivity, but the mail server is located on a separate network. The employee’s network and the mail server’s network are connected by a single router which also has a connection to the Internet via the workplace’s ISP. Explain how the employees email client sends and receives emails using the email server, indicating any protocols involved and where any encapsulation/decapsulation...
1. Implement the graph ADT using the adjacency list structure. 2. Implement the graph ADT using...
1. Implement the graph ADT using the adjacency list structure. 2. Implement the graph ADT using the adjacency matrix structure. LANGUAGE IS IN JAVA Comment for any questions Data structures and algorithms
1. Implement the union set function using the prototype. 2. Implement the intersection set function using...
1. Implement the union set function using the prototype. 2. Implement the intersection set function using the prototype. 3. Implement the set difference function using the prototype. 4. Implement the subset function using the prototype.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT