EldoS | Feel safer!

Software components for data protection, secure storage and transfer

Articles, tutorials, how-to's about SecureBlackbox

 
Securing your client-server or multi-tier application.

Introductory article about security and encryption in distributed applications.

Introduction to SSL

General description of SSL/TLS protocol

Introduction to SSH

General information about SSH protocol

Introduction to Certificates (common)

General introduction to X.509 certificates

Certificate basics (technical)

Technical description of X.509 certificates

Building user authentication systems for client-server environments.

The article reviews using X.509 certificates for user authentication.

Benchmarking your SSL- or SSH-enabled communications.

The article reviews the method of proper benchmarking your SSL- or SSH-enabled communications.

SSH Authentication methods

The article describes various methods of server and client authentication, used in SSH protocol.

Post-POODLE adjustments in TLS components of SecureBlackbox

The article discusses changes in SecureBlackbox in regards to recent POODLE attack and the measures you should take in your code.

Silverlight environments: Security and permissions specifics

The article discusses how to tune up Silverlight applications to use those feature of SecureBlackbox, which require elevated permissions.

|

Back to top