How does SSL/TLS work - part four
Like any secure protocol, vulnerabilities will continue to be discovered, and it is important to keep software that utilises TLS up-to-date so that the latest security patches are applied.
Like any secure protocol, vulnerabilities will continue to be discovered, and it is important to keep software that utilises TLS up-to-date so that the latest security patches are applied.
SSH is a secure network protocol that can used used on any platform for any purpose requiring secure network communication.
In How does public key encryption work?, it was explained that there needs to be a way of reliably associating public keys with their owners. Using someone's public key to …
The first post in our series about new secure network protocols concerns the most important concept required for understanding security, encryption.
Public key encryption is briefly explained in the first post of this series, here, but it is of such importance in SSL/TLS and SSH that a more detailed explanation is …
This blog series will explain how secure network protocols work. It will explain what encryption is, what cryptographic hashes are, and how they are both used to secure data transmission. …
This post is the last in our series on securing your SFTP server. It's time for some concluding remarks and mention social engineering and SFTP.
The first tip in this series on How to secure your SFTP server is a basic one that is very often neglected, and yet it is probably the most important thing you can do.
The first tip in this series on securing your SFTP (and FTP) server was to keep your operating system and server software up-to-date with the latest security patches. Next, make …
This post will focus on the SFTP and SSH protocols, and examine your protocol-specific settings that should be enabled to strengthen SFTP and SSH server configurations. Previous tips in our …