NEWSFOR LARGE FILE TRANSTER

How to Share Files with Raysync File Transfer Software?
If you want to share files with your friends, you can try the Share function of Raysync. Step 1. Select the file/folder you would like to share, you can also select more than one files or folders. Step 2. Select the Share button at the top, or select Share under the Actions option. Step 3. Then the setting page will pop up. A. Set the link expiration time B. Set email notification: Send the message of sharing the link to the email address of your friends to remind them to open the link to download the file. The contents of the mailbox can be filled in according to their own definition. C. Set the download notification: it can send notification to the email addresses you set here when the file is being download or the download is completed. Step 4. After you configure all the settings done, click Create Link to generate the link and password. Step 5. Click Copy Link and Password, and then you can send them to your partners you want to share with.
2020-12-29
Raysync Security Design: Encryption Certificate Life Cycle Management
What's SSL certificate? SSL certificate provides a way of authentication on the Internet, which is a digital information file used to identify and prove the identities of both parties. Why do you need SSL certificates? The website using an SSL certificate can guarantee the confidentiality of information exchange between users and servers and has the functions of no eavesdropping, no alteration, no denial, and no impersonation. Specifically as follows: 1. Transfer encrypted data on the internet to prevent theft. 2. Maintain the integrity of data in the transmission from endpoint A to endpoint B. 3. The encrypted data is transmitted to the server through the public key in the SSL certificate, and the server decrypts it with the private key to prove its identity. Raysync SSL certificate configuration: Enter the Raysync admin console -> Setting ->TLS certificate, upload the corresponding certificate, and you can also choose whether enable Prohibit non-SSL connections or not on this page. 1. The transmission server only supports encrypted certificates issued by formal root certificate service providers, which prevents self-signed low-strength encrypted certificates from becoming system vulnerabilities. 2. When the transport client finds that the transport server certificate has expired, it will refuse to communicate with the transport server and prompt the server that the certificate has expired. 3. The transmission server checks the valid time of the encryption certificate every day, and when the valid time is less than or equal to 30 days, prompts the administrator to replace the timely encryption certificate on the management portal. If the prompt of the certificate is expired shown in the admin console, you need to upload the certificate again to ensure the transfer security. As a file transfer acceleration software trusted by 2W+ enterprises, Raysync adopts the high-speed transmission protocol to build a highway for accelerating the transmission of enterprise data in the information age and also puts enterprise data security at the forefront of development.
2020-12-23
Raysync Security Design: Behavioral Audit
Large file transfer software used by enterprises will involve all aspects of data information of enterprises. In addition to the security control of large file transfer software itself, the security design of enterprise user behavior is also very important. Aiming at the safety of enterprise users, Raysnc has designed strict transmission settings and user behavior control, so as to realize visible, controllable, and traceable enterprise data flow. 1. Enterprise users The Raysync server completely records the complete behavior logs of users logging in, logging out, uploading, downloading, changing passwords, sharing links, etc., and the administrator can regularly audit the user behavior information. 2. Software administrator The Raysync server completely records the administrator's operation log, including adding, deleting, modifying user information, modifying server information, and other complete information and auditors can regularly audit the server administrator's operation behavior. As a file transmission acceleration software trusted by 2W+ enterprises, Raysync adopts the high-speed transmission protocol to build a highway for accelerating enterprise data transmission in the information age, and at the same time, it always puts enterprise data security at the top of its development.
2020-12-15
Raysync Security Design: Software Installation
As with some other file transfer software, it takes a few steps to install Raysync including download the installation package, unzip, launch and activate it in three minutes, and then you can easily access the client. Then how to ensure the installation security so that to comprehensively protect the data security? Raysync focus on 5 details: - There is no built-in user name and password in the system, and the admin administrator password is randomly generated during the installation process, and the user is forced to change the password when the admin administrator logs in for the first time. - The default restriction of the files that the user uploads are 660. Remove the execution attribute of the file and prevent the input file execution behavior. - Run the Raysync server with a low-privilege user. - Administrators can customize file suffixes that users can upload and prohibit users from uploading dangerous files. - The user rights of other groups of server program files are all closed to prevent other users from accessing abnormally. As a file transfer accelerated software trusted by 2W+ enterprises, based on the self-developed high-speed transfer engine, Raysync builds a highway to accelerate the transmission of enterprise data in the information age, and at the same time always put enterprise data security at the top of development.
2020-12-14
Raysync Security Design: Account&Password Protection
Raysync is designed with multiple security protection based on the account number and password of the user. Specific security design is as follows: Account protection security design Login authentication has a built-in anti-violence cracking mechanism, if the user enters the wrong password five times within 3 minutes, the account will be automatically locked. Session identification in login is generated by using the interface of OpenSSL high-strength random function RAND_bytes to prevent random information from being hit by the simulator. Password protection security design In the transmission process, the user password is encrypted by the asymmetric high-strength encryption algorithm, and even if the transmission message is intercepted, the attacker can not recover the plaintext through ciphertext. The information stored in the database of the user password is irreversibly encrypted 10,000 times in one direction by using the PBKDF2 algorithm and the user's individual random salt. Even if the database information is leaked, the user password cannot be reversed through ciphertext. The password must be a combination of case, number and special symbols, and the length is greater than or equal to 8 characters. The system provides a weak password dictionary. Users can customize weak passwords that meet the password strength but are easy to be cracked by social engineering. System users are prohibited from using such passwords, such as @123. As a file transmission acceleration software trusted by 2W+ enterprises, Raysync adopts the high-speed transmission protocol independently developed to build enterprise data transmission highway in the information age, and always puts enterprise data security at the top of its development.
2020-12-11
Raysync Security Design: Web Security
As a file acceleration transmission software, for the convenience of users, Raysync can be accessed directly on the web. The browser supports the convenient process of interactive operation, and we should strictly control the security of the browser. In the data transmission, we can simply divide the web into several layers: - Browser: Browser is the client, which provides data information interaction between the client and the server; - Http: When the client interacts with the webserver, there is a web request, which is based on the unified application layer protocol-HTTP protocol to exchange data. HTTP is a lightweight protocol, which requires no connection and provides fault tolerance for communication errors. - Middleware: Middleware is a general service between platform and application. - Server container: Server container is responsible for parsing user requests and scripting languages, such as Tomcat and JBoss. When we visit the web page, we see the content processed by the web container; - Database: Dynamic pages can provide interactive information query service, which mainly depends on the realization of web databases. Web pages containing forms are provided as access interfaces, and query results are also returned to users in the form of Web pages containing data lists. In view of the above points, the design of Raysync on web security: 1. User-side Web portal and management-side Web Portal support access IP address isolation and port isolation; 2. Support some nodes to disable user plane Web Portal or management plane web portal; 3. Support HTTP and HTTPS, and the administrator can disable HTTP and only expose Https service; 4. HTTPS TLS 1.1, TLS 1.2, TLS 1.3, only open the encryption algorithm suite recognized by the industry as safe; 5. On the Web page of Raysync login, the effective range of session is only valid for the current access page, completely eliminating CSRF cross-site attack; Before each version of Raysync is released, Huawei Cloud Online Professional Web Vulnerability Scanning Service will be used to scan vulnerabilities and repair the latest released vulnerabilities in time. As a file transmission acceleration software trusted by 2W+ enterprises, Raysync adopts the self-developed high-speed transmission protocol to build enterprise data transmission highway in the information age, and always puts enterprise data security at the top of its development.
2020-12-09
Tutorial | How to Receive Files by Using Point to Point Transfer?
In this article, we will show you how to receive files via point to point as a recipient, and how to delete the point to point task? The recipient check "Allow to receive direct transfer files from partners" under the Point to Point option, then the Key and ID will display on the left side of the navigation bar. When the sender sends the files to the receiver, the receiving transfer list will generate the corresponding point to point task record. If the receiver doesn't want to receive the files from others, uncheck the option "Allow to receive direct transfer files from partners". How to delete the point to point transfer task? Select the task you want to delete, and click "Delete" to delete the file. Note: The task record in the Transfer List will also be deleted if you delete the task on the web page.
2020-11-24
The Function of Notification Sending Has Added to Raysync Enterprise 5.0.5.8 Version
There are two new ways for the notification function in the admin console: 1) Send notification to the webpage of the sub-user. 2) Send email notification to the sub-user. Operating instructions: Log in to the Raysync admin console-> Click "Send notification" under the option "Users Management"-> Click to "Add notification" and edit the notification "Subject" and "Content"-> Select the "Receiving accounts"-> Check on the "Notification option" "Website" and "Email"-> Click "OK" to save all the settings. The effect of sub-user receiving the notification: A Web-page B Email Note: Sender mailbox, mailbox display logo, and company name are configured by the administrator in the admin console.
2020-11-12

Key Words

File sharing software|File collaboration software|Secure data collaboration|Mass file transfer|Point to point transmission|transmission system|network disk|transmit data|Transnational transmission|Cross border file transfer|File transfer solution|raysync cloud|Large file transfer solution|raysync|raysync Software|Large file transfer|File management system|Large file transfer|file transfer|raysync cloud|raysync transmission|data transmission|LDAP|AD|HTTP|tcp|High speed transmission|Remote large file transfer|Transnational file transfer|Accelerated transmission|File share transfer|file data|Transfer large files|Cross border transmission|Data transmission software|Large file transfer software|Enterprise file transfer software|High speed data transmission|File synchronous transfer|FTP transmission|Transnational transmission|High Availability|Transmission encryption|High speed transmission protocol|aspera|Breakpoint renewal|socks5|Cache|network|Secure transmission|Cloud storage|saas|Enterprise Network Disk|Operational tools|cloud computing|File management| Foreign trade|Data exchange|Telecommuting|High-speed transmission|SD-WAN|transfer software|High speed transmission|High-speed file transfer|File synchronization|ftp|file transfer protocol|Transfer tool|Big data transfer|File synchronization software|file sync|File transfer software|Oversized file transfer|Transfer solution|Transfer file via email|File transfer server|File transfer services|Managed File Transfer|Fast File Transfer|point to point transfer|Data Management|aes|File sharing|ftps|sftp|mft|shared file|Send Large Files|Secure file transfer|small file transfer|synchronous transmission|data sync|file transfer|video transmission|long distance transmission|file transfer|cross-border data transmission|transfer files|media industry|TLS|teletransmission|File sharing

APPLY FOR FREE TRIAL

Raysync offers free file transfer solutions and technical support for enterprise users!