Articles, tutorials, how-to's about SecureBlackbox
Introductory article about security and encryption in distributed applications.
General description of SSL/TLS protocol
General information about SSH protocol
General introduction to X.509 certificates
Technical description of X.509 certificates
The article reviews using X.509 certificates for user authentication.
The article reviews the method of proper benchmarking your SSL- or SSH-enabled communications.
The article describes various methods of server and client authentication, used in SSH protocol.
The article discusses changes in SecureBlackbox in regards to recent POODLE attack and the measures you should take in your code.
The article discusses how to tune up Silverlight applications to use those feature of SecureBlackbox, which require elevated permissions.