bruce

About Bruce Blackshaw

Bruce has been writing software professionally for almost 25 years, and has worked in a number of industries, including commercial software development and investment banking. He has wide experience in encryption, security, and network protocols such as SSL/TLS, SSH, SFTP and FTPS. Bruce currently works on developing CompleteFTP.

How to distribute private keys

A common method of authenticating users in SFTP servers such as CompleteFTP is public key authentication.

In public key authentication,  what is called a key pair is used, consisting of two related cryptographic keys: the public key and the private key. The special property of any key pair is that data encrypted with one can only […]

By |May 26th, 2017|Blogs, CompleteFTP|Comments Off on How to distribute private keys

NHS ransomware attack

We wrote about ransomware attacks almost a year ago, warning they would become more prevalent.

Now, the United Kingdom’s National Health Service (NHS) has suffered massive disruptions as a result of a ransomware attack. Apparently numerous countries have been hit by the malware, known as WannaCrypt, which was first spotted on 12 May.

Ransomware is usually […]

By |May 16th, 2017|News|Comments Off on NHS ransomware attack

How to set up a free FTPS server on Windows

Filezilla server?
Until recently, the easiest way to get a free FTPS server up and running on Windows was to download and install Filezilla server. Simple, free and robust, Filezilla server was a perfectly adequate solution.

But there were some nagging issues. Filezilla server has never managed to make it out of beta status, and that’s […]

By |October 18th, 2016|Blogs, Tutorials|Comments Off on How to set up a free FTPS server on Windows

IoT security

We’ve previously discussed the poor security of many devices on the Internet of Things (IoT) – the network of “smart” devices connected by the Internet. Unfortunately in their race to implement features, vendors seem to rate IoT security very low on their list of priorities. Often, IoT devices are protected by factory default or hard-coded usernames and passwords. […]

By |October 8th, 2016|Blogs, News|Comments Off on IoT security

Planning for server reliability

Server reliability is of primary importance in our networked world. Billions of dollars in e-commerce is utterly dependent on reliable servers and reliable networks connecting those servers to users.

The Australian stock exchange (ASX) recently had a bad day when their trading system failed. Market opening was delayed by 90 minutes, and after experiencing problems during trading, they were […]

By |October 1st, 2016|Blogs, Discussion|Comments Off on Planning for server reliability

Massive Yahoo hack confirmed

Yahoo has confirmed it has suffered the largest data breach in history, potentially affecting 500 million user accounts.  This Yahoo hack beats the huge Myspace hack of a few months ago.

If you have a Yahoo account, have you been affected? The best course of action (given the huge number of user accounts affected) is […]

By |September 24th, 2016|Announcements, Blogs, News|Comments Off on Massive Yahoo hack confirmed

How to secure your server

We published a blog series two years ago on how to secure an SFTP server. Given it is such a pertinent topic, we’re highlighting the posts again here. These points are relevant to all servers, not just SFTP servers, and should be read by server administrators. Although it refers to our server, CompleteFTP, the suggestions are applicable to and useful […]

By |September 23rd, 2016|Blogs, CompleteFTP, Tutorials|Comments Off on How to secure your server

The danger of legacy protocols

 

Legacy server protocols can be dangerous, particularly those which were once widely used and are no longer well known. Why do these legacy protocols present a danger? Because people forget they exist – and younger IT workers may never have encountered them.

This issue was recently highlighted in an interesting blog post about the telnet protocol. Telnet, created […]

By |September 13th, 2016|Blogs, Discussion|Comments Off on The danger of legacy protocols

Australian census fail

We outlined numerous privacy concerns with the 2016 Australian census recently.  These concerns included the change to compulsory names and addresses, and the potential problems with online collection of highly personal data. Last night was census night, 9 August 2016, and we saw the Australian census fail.

In fact, census night was an utter disaster.  The site […]

By |August 10th, 2016|Blogs, Hacking, News, Security|Comments Off on Australian census fail

Privacy concerns with Australian census

There are serious privacy concerns with the forthcoming Australian census.

The Australian Census is Australia’s biggest survey. Conducted every five years by the Australian Bureau of Statistics (ABS), it asks a range of questions of all 10 million households and 24 million people. The results are intended to guide government policy over the next few years.

Unfortunately, there’s been some […]

By |August 6th, 2016|Blogs, Discussion, Security|Comments Off on Privacy concerns with Australian census