Our knowledge base is a comprehensive resource designed to help you get the most out of our products. It includes getting started articles that guide you through initial setup, detailed information on specific features, and troubleshooting resources to assist you with any issues you may encounter. Explore our knowledge base to find helpful information about our products and answers to common questions.
IPWorks Bluetooth
SecureBlackbox 16: Certificate Pinning and SecureBlackbox
12/06/2016 - The article discusses how technically valid certificates can be fake, what certificate pinning is, and how it helps ensure authenticity of web sites and other servers. Also the article describes how you can implement Certificate Pinning in SecureBlackbox.
SecureBlackbox 16: Post-POODLE Adjustments in the TLS Components of SecureBlackbox
12/06/2016 - The article discusses changes in SecureBlackbox in regards to the recent POODLE attack and the measures you should take in your code.
SecureBlackbox 16: Security Advisory: On the information disclosure vulnerability in the SSL 3.0 and TLS 1.0 protocols (Rizzo/Duong "BEAST" attack)
12/06/2016 - This security advisory describes the details of the so-called BEAST attack on SSL/TLS.
SecureBlackbox 16: Security Advisory: On the version fallback vulnerability in SSL/TLS implementations (Moeller/Duong/Kotowicz POODLE attack)
12/06/2016 - In late September 2014 a new attack on the SSL/TLS protocol was recognized and described by security researchers Bodo Moeller, Thai Duong, and Krzysztof Kotowicz. The report of the attack gained high popularity in the news and raised concerns about its applicability to various network environments.
SecureBlackbox 16: Silverlight Environments: Security and Permissions
12/06/2016 - The article discusses how to fine-tune Silverlight applications to features of SecureBlackbox that require elevated permissions.
SecureBlackbox 16: Validation of Certificates in SecureBlackbox (Mini-FAQ)
12/06/2016 - The article describes how certificate validation in SecureBlackbox is done with the help of the TElX509CertificateValidator class.
SecureBlackbox 16: Benchmarking your SSL- or SSH-enabled communications
12/05/2016 - The article reviews several of the methods of properly benchmarking SSL- or SSH-enabled communications.
SecureBlackbox 16: Building user authentication systems for client-server environments
12/05/2016 - This article reviews using X.509 certificates for user authentication.
SecureBlackbox 16: Introduction to Certificates
12/05/2016 - General introduction to X.509 certificates
SecureBlackbox 16: Introduction to SSH
12/05/2016 - General information about the SSH protocol