Articles, tutorials, how-to's about SecureBlackbox
Introductory article about security and encryption in distributed applications.
General description of SSL/TLS protocol
General information about SSH protocol
General introduction to X.509 certificates
Technical description of X.509 certificates
The article reviews using X.509 certificates for user authentication.
The article reviews the method of proper benchmarking your SSL- or SSH-enabled communications.
The article describes various methods of server and client authentication, used in SSH protocol.
The article describes how SecureBlackbox works with files and how the files can be kept to avoid storing them on the disk.
The article describes how certificate validation in SecureBlackbox is done with help of TElX509CertificateValidator class.