EnterpriseDT Security Blog
Our business is information security, and so we blog on a variety of topics in this area. We often comment on the security aspects of current affairs, as well as providing technical discussion on cryptography and related areas such as privacy. We are particularly interested in secure protocols such as SSL/TLS and SSH. Our flagship product is CompleteFTP, a Windows server supporting FTPS, SFTP, SCP and HTTPS, all of which are reliant on SSH and SSL/TLS.
Clustering is when a group of several servers work together to accomplish a task or function, appearing as a single unit to clients. The primary purpose is to provide resilience – a server in the cluster may fail but clients should ideally not even be aware of it.
A CompleteFTP user recently asked us about an easy way to change lots of folder paths. They are moving all their folders in CompleteFTP to a different location. They have far too many folders to update the paths one by one in the manager application.
Fortunately, there is an easier way.
All of CompleteFTP’s configuration data is stored in a SQL database called config.sdf. It can be found in the C:\ProgramData\Enterprise Distributed Technologies\Complete FTP folder. You […]
Windows has restricted the length of filenames to 26o characters for many years. For most CompleteFTP users, this isn’t an issue, but occasionally other applications generate ridiculously long filenames that they then need to send to CompleteFTP.
With Windows 10 and Windows Server 2016, this restriction finally has a workaround (although it is not the default behavior yet). Here’s how to enable long filenames in CompleteFTP:
- Windows 10 or Windows Server 2016
- .NET Framework […]
SFTP and SSH
SFTP is a network protocol for transferring files securely over a computer network. Its full name is the SSH File Transfer Protocol, and as it implies, SFTP is a set of commands that runs over another protocol known as SSH, or Secure Shell.
SSH is what provides SFTP with its security, and so to understand how secure SFTP is, it is necessary to examine how SSH works. SSH uses a layered architecture, […]
In public key authentication, what is called a key pair is used, consisting of two related cryptographic keys: the public key and the private key. The special property of any key pair is that data encrypted with one can only be decrypted with the other.
When the SSH or SFTP server asks the client to authenticate, the […]
We wrote about ransomware attacks almost a year ago, warning they would become more prevalent.
Now, the United Kingdom’s National Health Service (NHS) has suffered massive disruptions as a result of a ransomware attack. Apparently numerous countries have been hit by the malware, known as WannaCrypt, which was first spotted on 12 May.
Ransomware is usually spread via infected emails. Once an attachment is clicked on, […]