/n software - Knowledge Base
Matching Articles
Introduces Kerberos and SSL/TLS.
https://www.nsoftware.com/kb/articles/legacy/sbb/6-Kerberos
General information about the SSH protocol
https://www.nsoftware.com/kb/articles/legacy/sbb/Introduction-to-SSH
Introduction to the /n software IPWorks VoIP IVR component
https://www.nsoftware.com/kb/articles/ipworksvoip-ivr
Configure PowerShell Server to Access Resources Shared on an Internal Network
https://www.nsoftware.com/kb/articles/psserver-accessing-remote-network-resources
PKI Proxy and Code Signing Best Practices
https://www.nsoftware.com/kb/articles/pkiproxy-best-practices
The article describes different encryption schemes used in the IT industry and implemented in the SecureBlackbox products.
https://www.nsoftware.com/kb/articles/legacy/sbb/5-EncryptionSchemes
Introduction to Creating and Maintaining SSL Tunnels in PowerShell Server
https://www.nsoftware.com/kb/articles/psserver-ssl-tunnels
This how-to describes the ways to counteract DoS and DDoS attacks on your SSH or SFTP server
https://www.nsoftware.com/kb/articles/legacy/sbb/DoS-attacks-in-SSH-SFTP-servers
An overview of the methods of server and client authentication used in the SSH protocol.
https://www.nsoftware.com/kb/articles/legacy/sbb/SSH-Authentication-methods
Introductory article about security and encryption in distributed applications.
https://www.nsoftware.com/kb/articles/legacy/sbb/Securing-client-server-app