NEWSFOR LARGE FILE TRANSTER

Ultimate Guide: 5 Steps To Share Files/Folders
In this article, we will share the method of how to share files/folders via the Raysync user portal. It involves 5 easy steps: Step 1. Select a file/folder you would like to share, you ccould also select more than one files or folders in this step. Step 2. Click the Share button at the top, or select Share under the Actions option. Step 3. After implementing the Share operation, the setting page will pop up. A. Allow download: enable this option to allow your partners to download the files/folders. B. Set password: enable set password option and you can set a random password as your want. C. Expiration: the share link will expire at your set date. D. Show file alias: you can customize the file name, the file will be shown as the alias on the sharing page. Note: Folder sharing does not support this feature. E. Email notification: Send the message of sharing the link to the email address of your friends to remind them to open the link to download the file. The contents of the mailbox can be filled in according to their own definition. F. Download notification: it can send notification to the email addresses you set here when the file is being download or the download is completed. Step 4. After you configure all the settings done, click Create Link to generate the link and password. Step 5. Click Copy Link and Password, and then you can send them to your partners you want to share with.
Raysync Security Design: Encryption Certificate Life Cycle Management
What's an SSL certificate? SSL certificates are what enable websites to move from HTTP to HTTPS, which is more secure. An SSL certificate is a data file hosted in a website's origin server. SSL certificates make SSL/TLS encryption possible, and they contain the website's public key and the website's identity, along with related information. Devices attempting to communicate with the origin server will reference this file to obtain the public key and verify the server's identity. The private key is kept secret and secure. Why do you need SSL certificates? A website needs an SSL certificate in order to keep user data secure, verify ownership of the website, prevent attackers from creating a fake version of the site, and gain user trust. 1. Transfer encrypted data on the internet to prevent theft. 2. Maintain the integrity of data in the transmission from endpoint A to endpoint B. 3. The encrypted data is transmitted to the server through the public key in the SSL certificate, and the server decrypts it with the private key to prove its identity. Raysync SSL certificate configuration: Login to the Raysync admin portal -> Setting ->TLS certificate, upload the corresponding certificate, and you can also choose whether enable Prohibit non-SSL connections option or not on this page. 1. The transfer server only supports encrypted certificates issued by formal root certificate service providers, which prevents self-signed low-strength encrypted certificates from becoming system vulnerabilities. 2. When the transport client finds that the transport server certificate has expired, it will refuse to communicate with the transport server and prompt the server that the certificate has expired. 3. The transmission server will regularly check the valid time of the encryption certificate , and when the valid time is less than or equal to 30 days, a prompt will pop up on the admin portal, prompting the administrator to replace the encryption certificate in time. Note: If the prompt of the certificate is expired shown in the admin portal, you need to upload the certificate again to ensure the transfer security. As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
Raysync Security Design: Behavioral Audit
The large file transfer software used by enterprises will involve all aspects of enterprise data and information. Besides the security control of large file transfer software itself, the security design of enterprise user behavior is also very important. Aiming at the safety of enterprise users, Raysnc has designed strict transmission settings and user behavior control, control so as to realize visible, controllable, and traceable enterprise data flow. 1. Enterprise users The Raysync server completely records the behavior logs of users logging in, logging out, uploading, downloading, changing passwords, sharing links, etc., and the administrator can regularly audit the user behavior information. 2. Software administrator The Raysync server completely records the administrator's operation log, including adding, deleting, modifying user information, modifying server information, and other complete information and auditors can regularly audit the server administrator's operation behavior. As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
Raysync Security Design: Software Installation
As with some other file transfer software, it takes a few steps to install Raysync including download the installation package, unzip, launch and activate it in three minutes, and then you can easily access the client. Then how to ensure the installation security so that to comprehensively protect the data security? Raysync focus on 5 details: - There is no built-in user name and password in the system, and the admin administrator password is randomly generated during the installation process, and it is forced to change the password when the administrator logs in for the first time. - The default restriction of the files that the user uploads are 660. Remove the execution attribute of the file and prevent the input file execution behavior. - Run the Raysync server with a low-privilege user. - Administrators can customize file suffixes that users can upload and prohibit users from uploading dangerous files. - The user rights of other groups of server program files are all closed to prevent other users from accessing abnormally. As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
Raysync Security Design: Account&Password Protection
Raysync is designed with multiple security protection based on the account number and password of the user. Specific security design is as follows: Account protection security design - Login authentication has a built-in anti-violence cracking mechanism, if the user enters the wrong password five times within 3 minutes, the account will be automatically locked. - Session identification in login is generated by using the interface of OpenSSL high-strength random function RAND_bytes to prevent random information from being hit by the simulator. Password protection security design - In the transfer process, the user password is encrypted by the asymmetric high-strength encryption algorithm, and even if the transfer message is intercepted, the attacker can not recover the plaintext through ciphertext. - The information stored in the database of the user password is irreversibly encrypted 10,000 times in one direction by using the PBKDF2 algorithm and the user's individual random salt. Even if the database information is leaked, the user password cannot be reversed through ciphertext. - The password must be a combination of case, number and special symbols, and the length is greater than or equal to 8 characters. - The system provides a weak password dictionary. Users can customize weak passwords that meet the password strength but are easy to be cracked by social engineering. System users are prohibited from using such passwords, such as @123. As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
Raysync Security Design: Web Security
As a file acceleration transmission software, for the convenience of users, Raysync can be accessed directly on the web. The browser supports the convenient process of interactive operation, and we should strictly control the security of the browser. In the data transmission, we can simply divide the web into several layers: - Browser: Browser is the client, which provides data information interaction between the client and the server; - Http: When the client interacts with the webserver, there is a web request, which is based on the unified application layer protocol-HTTP protocol to exchange data. HTTP is a lightweight protocol, which requires no connection and provides fault tolerance for communication errors. - Middleware: Middleware is a general service between platform and application. - Server container: Server container is responsible for parsing user requests and scripting languages, such as Tomcat and JBoss. When we visit the web page, we see the content processed by the web container; - Database: Dynamic pages can provide interactive information query service, which mainly depends on the realization of web databases. Web pages containing forms are provided as access interfaces, and query results are also returned to users in the form of Web pages containing data lists. In view of the above points, the design of Raysync on web security: 1. User-side Web portal and management-side Web Portal support access IP address isolation and port isolation; 2. Support some nodes to disable user plane Web Portal or management plane web portal; 3. Support HTTP and HTTPS, and the administrator can disable HTTP and only expose Https service; 4. HTTPS TLS 1.1, TLS 1.2, TLS 1.3, only open the encryption algorithm suite recognized by the industry as safe; 5. On the Web page of Raysync login, the effective range of session is only valid for the current access page, completely eliminating CSRF cross-site attack; Before each version of Raysync is released, professional Web vulnerability scanning service will be used to scan vulnerabilities and repair the latest released vulnerabilities in time. As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
Tutorial | How to Receive Files by Using Point to Point Transfer?
In this article, we will show you how to receive files via point to point as a recipient, and how to delete the point to point task? The recipient check "Allow to receive direct transfer files from partners" under the Point to Point option, then the Key and ID will display on the left side of the navigation bar. When the sender sends the files to the receiver, the receiving transfer list will generate the corresponding point to point task record. If the receiver doesn't want to receive the files from others, uncheck the option "Allow to receive direct transfer files from partners". How to delete the point to point transfer task? Select the task you want to delete, and click "Delete" to delete the file. Note: The task record in the Transfer List will also be deleted if you delete the task on the web page.
The Function of Notification Sending Has Added to Raysync Enterprise 5.0.5.8 Version
Raysync notification function adds two methonds: 1) Send notification to the webpage mailbox of the sub-user. 2) Send an email notification to the mailbox of the sub-user. Details: Log in to the Raysync admin portal-> Select "Send notification" under the option "Users Management"-> Click "Add notification" and edit the notification "Subject" and "Content"-> Select the "Receiving accounts"-> Check on the "Notification option" "Website" and "Email"-> Click "OK" to save all the settings. User receiving effect: A Web-page B Email Note: Sender mailbox, mailbox display logo, and company name are configured by the administrator in the admin console.

Key Words

File sharing|teletransmission|TLS|media industry|transfer files|cross-border data transmission|file transfer|long distance transmission|video transmission|file transfer|data sync|synchronous transmission|small file transfer|Secure file transfer|Send Large Files|shared file|mft|sftp|ftps|File sharing|aes|Data Management|point to point transfer|Fast File Transfer|Managed File Transfer|File transfer services|File transfer server|Transfer file via email|Transfer solution|Oversized file transfer|File transfer software|file sync|File synchronization software|Big data transfer|Transfer tool|file transfer protocol|ftp|File synchronization|High-speed file transfer|High speed transmission|transfer software|SD-WAN|High-speed transmission|Telecommuting|Data exchange| Foreign trade|File management|cloud computing|Operational tools|Enterprise Network Disk|saas|Cloud storage|Secure transmission|network|Cache|socks5|Breakpoint renewal|aspera|High speed transmission protocol|Transmission encryption|High Availability|Transnational transmission|FTP transmission|File synchronous transfer|High speed data transmission|Enterprise file transfer software|Large file transfer software|Data transmission software|Cross border transmission|Transfer large files|file data|File share transfer|Accelerated transmission|Transnational file transfer|Remote large file transfer|High speed transmission|tcp|HTTP|AD|LDAP|data transmission|raysync transmission|raysync cloud|file transfer|Large file transfer|File management system|Large file transfer|raysync Software|raysync|Large file transfer solution|raysync cloud|File transfer solution|Cross border file transfer|Transnational transmission|transmit data|network disk|transmission system|Point to point transmission|Mass file transfer|data sync

APPLY FOR FREE TRIAL

Raysync offers high-speed file transfer solutions and free technical support for enterprise users!

apply banner