Our knowledge base is a comprehensive resource designed to help you get the most out of our products. It includes getting started articles that guide you through initial setup, detailed information on specific features, and troubleshooting resources to assist you with any issues you may encounter. Explore our knowledge base to find helpful information about our products and answers to common questions.

Latest Articles

SecureBlackbox 16: Plugging SecureBlackbox Java Cryptography Extensions into Your Java Project

12/07/2016 - Plugging SecureBlackbox Java Cryptography Extensions into your Java project

SecureBlackbox 16: Post-POODLE Adjustments in the TLS Components of SecureBlackbox

12/06/2016 - The article discusses changes in SecureBlackbox in regards to the recent POODLE attack and the measures you should take in your code.

SecureBlackbox 16: Preventing TLS Renegotiation Attacks with SecureBlackbox 7.2 and Later

12/07/2016 - This article discusses TLS renegotiation attacks and the ways to prevent them when using SecureBlackbox 7.2 or later.

SecureBlackbox 16: Securing RemObjects

12/07/2016 - This how-to describes how to add SSL security to RemObjects

SecureBlackbox 16: Why doesn't the socket detect that the remote side was disconnected?

12/08/2016 - Why doesn't the socket detect that the remote side was disconnected?

SecureBlackbox 16: SecureBlackbox produces invalid results or exposes incorrect behavior. Is this a bug?

12/08/2016 - The first step to troubleshoot invalid results or incorrect behavior.

SecureBlackbox 16: Why SecureBlackbox is a Superior Alternative to BouncyCastle

07/02/2017 - Why you should choose SecureBlackbox's professionally developed security components over BouncyCastle

SecureBlackbox 16: What encryption and hashing algorithms does SecureBlackbox implement?

12/08/2016 - Using SecureBlackbox for encryption and hashing algorithms.

SecureBlackbox 16: Is SecureBlackbox multithreaded?

12/08/2016 - Is SecureBlackbox multithreaded?

SecureBlackbox 16: Securing Your Client-Server or Multi-Tier Application

12/05/2016 - Introductory article about security and encryption in distributed applications.

SecureBlackbox 16: Security Advisory: On the information disclosure vulnerability in the SSL 3.0 and TLS 1.0 protocols (Rizzo/Duong "BEAST" attack)

12/06/2016 - This security advisory describes the details of the so-called BEAST attack on SSL/TLS.