This is a good article as it simplifies a lot a process which in reality is very complex. The protocols to enable encryption of data are very important to guarantee a communication’s link with no leaks of information. Data signing offers yet an additional level of security. These two schemes are not only used in the big Internet world but also in the short range communications such as Bluetooth were one also find encryption and data signing.
There are just too many ways in which a hacker can gain access to our private information. It scares me when I think of how unsecured the internet can bem even with some security measures involved. I just hope that trusted CA can remain unhacked.
Simon - http://www.idpro.co.uk
Great write up. Be sure to verify your ssl certificate once you install it (ie http://www.ssltools.com/certificate_lookup/www.eetimes.com). And if you still have problems with installation, try SSLTools Manager - http://www.ssltools.com/manager