What are cryptographic hashes?
Cryptographic hash algorithms are important mathematical functions used widely in software, particularly in secure protocols such as SSL/TLS and SSH. A hash algorithm is supplied a block of data, known…
Cryptographic hash algorithms are important mathematical functions used widely in software, particularly in secure protocols such as SSL/TLS and SSH. A hash algorithm is supplied a block of data, known…
Public key encryption is briefly explained in the first post of this series, here, but it is of such importance in SSL/TLS and SSH that a more detailed explanation is…
The first post in our series about new secure network protocols concerns the most important concept required for understanding security, encryption. Encryption is the process of encoding information in such…
This blog series will explain how secure network protocols work. It will explain what encryption is, what cryptographic hashes are, and how they are both used to secure data transmission.…
This tutorial demonstrates how to connect to your CompleteFTP server using the popular FTP/SFTP client, FileZilla (download here). FileZilla supports FTP, FTPS and SFTP (FTPS vs SFTP). Before looking at…
This tutorial explains how to get started with CompleteFTP, our Windows secure file server supporting a variety of secure file transfer protocols, including FTP, FTPS, SFTP, SCP, HTTP and HTTPS.…
This tutorial demonstrates how to connect to your CompleteFTP server using the popular FTP/SFTP client, WinSCP. Before looking at this tutorial, make sure you have CompleteFTP installed and a user…
We were recently asked by a CompleteFTP user which was the best protocol to use for file transfers - HTTPS or SFTP. In particular, the user was interested in large…
This post is the last in our series on securing your SFTP server. It's time for some concluding remarks and mention social engineering and SFTP. Firstly, never relax! Maintaining…
A common request that we get is how to configure CompleteFTP Enterprise Edition so that it acts as a direct proxy for another server. This is particularly common for users…