EnterpriseDT Security Blog
Our business is information security, and so we blog on a variety of topics in this area. We often comment on the security aspects of current affairs, as well as providing technical discussion on cryptography and related areas such as privacy. We are particularly interested in secure protocols such as SSL/TLS and SSH. Our flagship product is CompleteFTP, a Windows server supporting FTPS, SFTP, SCP and HTTPS, all of which are reliant on SSH and SSL/TLS.
Windows has restricted the length of filenames to 26o characters for many years. For most CompleteFTP users, this isn’t an issue, but occasionally other applications generate ridiculously long filenames that they then need to send to CompleteFTP.
With Windows 10 and Windows Server 2016, this restriction finally has a workaround (although it is not the default behavior yet). Here’s how to enable long filenames in CompleteFTP:
- Windows 10 or Windows Server 2016
- .NET Framework […]
SFTP and SSH
SFTP is a network protocol for transferring files securely over a computer network. Its full name is the SSH File Transfer Protocol, and as it implies, SFTP is a set of commands that runs over another protocol known as SSH, or Secure Shell.
SSH is what provides SFTP with its security, and so to understand how secure SFTP is, it is necessary to examine how SSH works. SSH uses a layered architecture, […]
In public key authentication, what is called a key pair is used, consisting of two related cryptographic keys: the public key and the private key. The special property of any key pair is that data encrypted with one can only be decrypted with the other.
When the SSH or SFTP server asks the client to authenticate, the […]
We wrote about ransomware attacks almost a year ago, warning they would become more prevalent.
Now, the United Kingdom’s National Health Service (NHS) has suffered massive disruptions as a result of a ransomware attack. Apparently numerous countries have been hit by the malware, known as WannaCrypt, which was first spotted on 12 May.
Ransomware is usually spread via infected emails. Once an attachment is clicked on, […]
This article summarises the process of setting up a cluster of FTP servers on Amazon’s AWS EC2.
Primary and secondaries
A CompleteFTP cluster is arranged such that there’s one primary server and one or more secondaries. All configuration changes must be made via an instance of CompleteFTP Manager that’s connected to the primary. The primary will automatically distribute changes to the secondaries (unless this is disabled).
Files are not automatically synchronised
While CompleteFTP will take care of […]
SSL Certificate Installation for CompleteFTP
Use these instructions to install your SSL Certificate for CompleteFTP.
Before installing your SSL Certificate, you first need to create a Certificate Signing Request (CSR) (see Certificate Signing Request (CSR) Generated Using CompleteFTP).
How To Install an SSL Certificate for CompleteFTP
- Open the CompleteFTP Manager, then open Server certificate.
Click Settings > FTP/FTPS > Advanced FTP/FTPS Settings > Security Settings > Server certificate.
- In […]