How does SSH work - part three
SSH-2 uses a layered architecture, consisting of a transport layer, a user authentication layer, and a connection layer (described here). The previous post in this series explained the transport layer,…
SSH-2 uses a layered architecture, consisting of a transport layer, a user authentication layer, and a connection layer (described here). The previous post in this series explained the transport layer,…
But why would someone choose the significantly more expensive Enterprise Edition? The key differences are described in this article.
This post will explain the main features of the transport layer.
SSH is a secure network protocol that can used used on any platform for any purpose requiring secure network communication.
Up until 8.3.0, CompleteFTP's process triggers were initiated by certain events occurring in the server, such as users logging in or out, or files being uploaded or downloaded. Process triggers…
This tutorial demonstrates how to connect to your CompleteFTP server using the popular FTP/SFTP client, WinSCP. Before looking at this tutorial, make sure you have CompleteFTP installed and a user…
This tutorial demonstrates how to connect to your CompleteFTP server using the popular FTP/SFTP client, FileZilla (download here). FileZilla supports FTP, FTPS and SFTP (FTPS vs SFTP). Before looking at…
This tutorial explains how to get started with CompleteFTP, our Windows secure file server supporting a variety of secure file transfer protocols, including FTP, FTPS, SFTP, SCP, HTTP and HTTPS.…
SHA-1 is now getting too old and the possibility of successful attacks on its integrity are becoming more likely.
We were recently asked by a CompleteFTP user which was the best protocol to use for file transfers - HTTPS or SFTP. In particular, the user was interested in large…