Site Search

Please enter a set of keywords separated by spaces and click on the 'Search' button. Matching entries (if any) will be listed below. 



Search Results





Downloads | CData Software
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/support/builds/

CData Arc - Blog
The Latest News and Events from CData Arc
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/blog/?tag=data+connectivity

CData Arc - Blog
The Latest News and Events from CData Arc
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/blog/?tag=events

CData Arc - Blog
The Latest News and Events from CData Arc
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/blog/?tag=cdata+arc+cloud

Connect to Arc through the Cloud Gateway
Configure the Cloud Gateway on Arc to create a reverse SSH tunnel to a publicly accessible SSH host.
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/kb/articles/cloud-gateway.rst

SHA-2 vs. SHA-1: The Complete Rundown
SHA-2 is a family of hash algorithms created to replace SHA-1. SHA-2 consists of SHA-224, SHA-256, SHA-384, and SHA-512 algorithms — SHA-256 is the most common.
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/kb/articles/connect-sha-2.rst

CData Arc - Blog
The Latest News and Events from CData Arc
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/blog/?tag=new+features

RSA
RSA is one of the first and most widely used cryptosystems for securing data.
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/resources/mft/rsa.rst

What is PGP? (Pretty Good Privacy) and Open PGP Encryption
PGP, or Pretty Good Privacy, is one of the most popular methods for signing and encrypting files. Open PGP is the identical, open-source standard used by everyone.
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/resources/mft/pgp.rst

HTTPS, What is HTTPS?
HTTP is the foundation of data communication for the world wide web, in which hypertext documents use hyperlinks to other resources that users can click on and visit.
[About CData Contact Product Managed File Transfer EDI Automation Back Secure File Transfer Automation EDI OFTP2 PGP Encryption Cloud File]
[0.47%] - https://arc.cdata.com/resources/mft/https.rst