TalkTalk hack
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Details of a damaging hack of British phone and broadband provider TalkTalk's customer database are emerging.
Our previous post explained that the "nothing to hide, nothing to fear" argument is based on a narrow view of privacy that assumes it is primarily about concealing our wrongs.
But why would someone choose the significantly more expensive _Enterprise Edition_? The key differences are described in this article.
[CompleteFTP](http://enterprisedt.com/products/completeftp) customers will be pleased to know that CompleteFTP is very suitable for deployment in the cloud - we use it ourselves on Amazon AWS.
An earlier group of posts in this series covered the SSL/TLS protocol in detail. They neglected, however, to mention one of the most common uses of SSL/TLS - to implement a secure form of file transfer known as FTPS.
The most common subsystem available is SFTP, which provides commands to transfer and manipulate files.
SSH-2 uses a layered architecture, consisting of a transport layer, a user authentication layer, and a connection layer (described here).
The final piece of SSH-2's layered architecture is the _connection_ layer, which provides network services
Another very commonly used authentication method is _publickey authentication_ , which is based on public key encryption.
Up until 8.3.0, CompleteFTP's process triggers were initiated by certain events occurring in the server, such as users logging in or out, or files being uploaded or downloaded. Process triggers …