![Building a keystore file to be used with an HTTPS (or ENCRYPTED) connection type for real-time Java-based APIs | Devportal Building a keystore file to be used with an HTTPS (or ENCRYPTED) connection type for real-time Java-based APIs | Devportal](https://developers.refinitiv.com/content/dam/devportal/articles/building-a-keystore-file-to-be-used-with-an-https-(or-encrypted)-connection-type-for-real-time-java-based-apis/2018_Nipat_Keystore_07-1.png)
Building a keystore file to be used with an HTTPS (or ENCRYPTED) connection type for real-time Java-based APIs | Devportal
![Sectigo has announced that it will transition from Comodo CA roots to USERTrust CA roots | LeaderSSL Sectigo has announced that it will transition from Comodo CA roots to USERTrust CA roots | LeaderSSL](https://assets.getwildcard.com/system/images/imgs/000/000/430/original/sectigo2_1200x929.jpg?1545743876)
Sectigo has announced that it will transition from Comodo CA roots to USERTrust CA roots | LeaderSSL
![Sectigo (formerly Comodo) Time Stamping Service Expiration – What to Know and What to Do - Knowledge Base Sectigo (formerly Comodo) Time Stamping Service Expiration – What to Know and What to Do - Knowledge Base](https://www.thesslstore.com/knowledgebase/wp-content/uploads/2019/05/punnet-square-2.png)
Sectigo (formerly Comodo) Time Stamping Service Expiration – What to Know and What to Do - Knowledge Base
![Malware analysis http://crl.comodoca.com/COMODORSACertificationAuthority.crl No threats detected | ANY.RUN - Malware Sandbox Online Malware analysis http://crl.comodoca.com/COMODORSACertificationAuthority.crl No threats detected | ANY.RUN - Malware Sandbox Online](https://content.any.run/tasks/e512d769-35c5-4a20-946c-446df8d5c6eb/download/screens/1ccb65f2-6f29-41e4-b00d-f78d912f19ec/image.jpeg)
Malware analysis http://crl.comodoca.com/COMODORSACertificationAuthority.crl No threats detected | ANY.RUN - Malware Sandbox Online
![Malware analysis http://crt.comodoca.com/COMODORSAAddTrustCA.crt Malicious activity | ANY.RUN - Malware Sandbox Online Malware analysis http://crt.comodoca.com/COMODORSAAddTrustCA.crt Malicious activity | ANY.RUN - Malware Sandbox Online](https://content.any.run/tasks/29217b49-fcc0-4ea7-b8a8-797a0ea6832e/download/screens/7603da22-c746-4901-ad3d-7206528b848f/image.jpeg)