/n software - Knowledge Base
Matching Articles
The article describes different encryption schemes used in the IT industry and implemented in the SecureBlackbox products.
https://www.nsoftware.com/kb/articles/legacy/sbb/5-EncryptionSchemes
The article describes how to use X.509 certificates for public-key authentication in SSH-secured communications.
https://www.nsoftware.com/kb/articles/legacy/sbb/X509Certificates
How to change certificates without impacting your partners
https://www.nsoftware.com/kb/articles/as2rollover
With what other PGP software is OpenPGPBlackbox compatible?
https://www.nsoftware.com/kb/articles/legacy/sbb/1-PGPSoftware
Introduction to the /n software OpenPGP Pipeline Component for Microsoft BizTalk
https://www.nsoftware.com/kb/articles/pgppipeline
How do I validate the server key in the OnKeyValidate event?
https://www.nsoftware.com/kb/articles/legacy/sbb/OnKeyValidate
This article answers some of the basic questions about the features of AES Drive.
https://www.nsoftware.com/kb/articles/aesdrivefaq
How is SecureBlackbox distributed and where do I get the files?
https://www.nsoftware.com/kb/articles/legacy/sbb/HowIsSecureBlackboxDistributed
An overview of the methods of server and client authentication used in the SSH protocol.
https://www.nsoftware.com/kb/articles/legacy/sbb/SSH-Authentication-methods
TLS/SSL Implementation Options
https://www.nsoftware.com/kb/entries/11012201