EnterpriseDT Blog

TalkTalk hack

Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.

7 min read Read More

The dangers of cloud storage part 2

[CompleteFTP](http://enterprisedt.com/products/completeftp) customers will be pleased to know that CompleteFTP is very suitable for deployment in the cloud - we use it ourselves on Amazon AWS.

5 min read Read More

How does SSL/TLS work – part five - FTPS

An earlier group of posts in this series covered the SSL/TLS protocol in detail. They neglected, however, to mention one of the most common uses of SSL/TLS - to implement a secure form of file transfer known as FTPS.

8 min read Read More

How does SSH work - part three

SSH-2 uses a layered architecture, consisting of a transport layer, a user authentication layer, and a connection layer (described here).

5 min read Read More

CompleteFTP scheduled events

Up until 8.3.0, CompleteFTP's process triggers were initiated by certain events occurring in the server, such as users logging in or out, or files being uploaded or downloaded. Process triggers …

3 min read Read More