What are digital certificates?
In How does public key encryption work?, it was explained that there needs to be a way of reliably associating public keys with their owners. Using someone's public key to …
In How does public key encryption work?, it was explained that there needs to be a way of reliably associating public keys with their owners. Using someone's public key to …
The first post in our series about new secure network protocols concerns the most important concept required for understanding security, encryption.
Public key encryption is briefly explained in the first post of this series, here, but it is of such importance in SSL/TLS and SSH that a more detailed explanation is …
This blog series will explain how secure network protocols work. It will explain what encryption is, what cryptographic hashes are, and how they are both used to secure data transmission. …
CoreTech has published an article on CompleteFTP in Italian: Il server Ftp è pronto per il futuro
CompleteFTP, our secure FTP server for Windows, has quite a long development history, and has undergone considerable change since its inception. HTTP support, clustering, a multi-protocol gateway, file sharing and …
We were recently asked by a CompleteFTP user which was the best protocol to use for file transfers - HTTPS or SFTP. In particular, the user was interested in large …
Survey reveals that more than 4 out of 5 CompleteFTP users would recommend it to others in need of secure FTP server software. CompleteFTP is SFTP server software trusted by …
By now most people will have heard of the POODLE SSL vulnerability, a flaw in the SSL 3.0 protocol that affects FTPS and HTTPS. We've recently blogged about POODLE in …
This post is the last in our series on securing your SFTP server. It's time for some concluding remarks and mention social engineering and SFTP.