Our knowledge base is a comprehensive resource designed to help you get the most out of our products. It includes getting started articles that guide you through initial setup, detailed information on specific features, and troubleshooting resources to assist you with any issues you may encounter. Explore our knowledge base to find helpful information about our products and answers to common questions.
Latest Articles
SecureBlackbox 16: Signing invoices for the Spanish government in the factura format
12/07/2016 - Sample code for signing electronic invoices for the Spanish government in the Factura XML format.
SecureBlackbox 16: SSL Transports for NexusDB
12/07/2016 - Information about adding SSL security to NexusDB
SecureBlackbox 16: Using SecureBlackbox with kbmMW
12/07/2016 - Step-by-step explanation of how to add SSL security to kbmMW
SecureBlackbox 16: Using OCSP Stapling in the TLS-Enabled Components
12/07/2016 - Using OCSP stapling in the TLS-enabled Components
SecureBlackbox 16: X.509 Certificates and SSH
12/07/2016 - The article describes how to use X.509 certificates for public-key authentication in SSH-secured communications.
SecureBlackbox 16: Certificate Pinning and SecureBlackbox
12/06/2016 - The article discusses how technically valid certificates can be fake, what certificate pinning is, and how it helps ensure authenticity of web sites and other servers. Also the article describes how you can implement Certificate Pinning in SecureBlackbox.
SecureBlackbox 16: Post-POODLE Adjustments in the TLS Components of SecureBlackbox
12/06/2016 - The article discusses changes in SecureBlackbox in regards to the recent POODLE attack and the measures you should take in your code.
SecureBlackbox 16: Security Advisory: On the information disclosure vulnerability in the SSL 3.0 and TLS 1.0 protocols (Rizzo/Duong "BEAST" attack)
12/06/2016 - This security advisory describes the details of the so-called BEAST attack on SSL/TLS.
SecureBlackbox 16: Security Advisory: On the version fallback vulnerability in SSL/TLS implementations (Moeller/Duong/Kotowicz POODLE attack)
12/06/2016 - In late September 2014 a new attack on the SSL/TLS protocol was recognized and described by security researchers Bodo Moeller, Thai Duong, and Krzysztof Kotowicz. The report of the attack gained high popularity in the news and raised concerns about its applicability to various network environments.
SecureBlackbox 16: Silverlight Environments: Security and Permissions
12/06/2016 - The article discusses how to fine-tune Silverlight applications to features of SecureBlackbox that require elevated permissions.