Raysync Security Design: Software Installation

security

As with some other file transfer software, it takes a few steps to install Raysync including download the installation package, unzip, launch and activate it in three minutes, and then you can easily access the client.

Then how to ensure the installation security so that to comprehensively protect the data security?

Raysync focus on 5 details:

  • There is no built-in user name and password in the system, and the admin administrator password is randomly generated during the installation process, and it is forced to change the password when the administrator logs in for the first time.

  • The default restriction of the files that the user uploads are 660. Remove the execution attribute of the file and prevent the input file execution behavior.

  • Run the Raysync server with a low-privilege user.

  • Administrators can customize file suffixes that users can upload and prohibit users from uploading dangerous files.

  • The user rights of other groups of server program files are all closed to prevent other users from accessing abnormally.

As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.

Share This:

You might also like

User Guide

June 1, 2022

[Guide] How to Choose Best Managed File Transfer Software?

Buy a managed file transfer software provider? This comprehensive buyer's guide will show you the best options for your organization.

Read more

User Guide

December 14, 2020

Raysync Security Design: Software Installation

As with some other file transfer software, it takes a few steps to install Raysync including download the installation package, unzip, launch and activate it in three minutes, and then you can easily access the client.

Read more

User Guide

December 9, 2020

Raysync Security Design: Web Security

HTTPS TLS 1.1, TLS 1.2, TLS 1.3, only open the encryption algorithm suite recognized by the industry as safe;

Read more

We use cookies and similar technologies to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Cookie Policy & Privacy.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.