FTP Script! v3 is coming!

While working on the new version of our flagship product, Syncplify.me Server! v4, we have not forgotten our many FTP Script! users. Our team has been working hard on the brand new major version, and we’re now happy to announce that in few days Syncplify.me FTP Script v3.0 will be released.

The main limitation of version 1 and 2 was its single-threaded architecture. Although ideal for unattended file transfer operations, the single thread may become a significant performance hurdle when it comes to uploading or downloading a massive amount of small files.

Therefore all upload/download operations in FTP Script! v3 are now multi-threaded, and you can decide how many concurrent upload/download threads will be used in each transfer operation, and even change it multiple times within a single script. Continue reading

Syncplify.me Server!: 2 million file transfers in 24 hours

This article refers to Syncplify.me Server! v4.0, which – at the time the article is being written – is still in beta, and is not yet available for purchase by customers. The purpose of this article is to give our users an idea of the performance level of the upcoming version.

A considerable amount of Syncplify customers are large and very-large enterprises, and – as you can guess – some of them need a secure file transfer server that can sustain a tremendous amount of sessions for a very long period of time.

Syncplify.me Server! v3.x, with its HA (High Availability) deployment specific configuration was already ahead of the competition in many ways, but some of our customers needed something even more powerful. Therefore we have engineered our Syncplify.me Server! v4.0 to be our most reliable and heavy-load bearing version ever.

Continue reading

Project codename: Foundation

More frequently than expected we receive questions from our users relative to the “codenames” of the various editions of our Syncplify.me Server! software. Since now our version 3 is solid enough to allow us to fully focus on version 4 development, we think this is a good time to answer that question, and give our readers few more details regarding what to expect in the upcoming new major version. Continue reading

Syncplify.me Server!: the path from v3 to v4 (teaser)

After less than a month from the release of v3, our team is already at work on v4.

While v3 has been our “back-end release” (the version that introduced a whole lot of new functional features, from speed limits to new scripting capabilities, from multiple instances to actual impersonation, and more…), v4 will be our “front-end release” and will deliver a greatly improved interface for… well… everything.

And thanks to the whole new configuration API implemented as REST web service to be consumed over a secure HTTPS channel, the GUI will also be fully cross-platform. Ever dreamed to be able to configure your Syncplify.me Server! from your iPhone or Android device? V4 will make it possible!


The above is not a mock-up, it is an actual screenshot taken from one of our Android phones in the lab. More to come… soon!

Syncplify.me Server!: No worries about POODLE SSLv3 bug.

By now, everyone has heard about the POODLE bug, that’s scaring every system administrator these days.

Unfortunately it is a design flaw in SSLv3, therefore the only thing you can do to go around it is to disable SSLv3 from all your servers (whatever they are, IIS, Apache, …, all SSL-capable servers).

Fortunately Syncplify.me Server! has – by design – a very easy way to do that. As shown in the picture below, just make sure the SSLv3 option is unchecked, and save your configuration. There you go, you’re safe now.


Someone is up to something (SSH server hacking attempts)

As some of you may know, Syncplify’s goal wasn’t just to build a secure FTP and SFTP server with regards to data in motion; we made sure to design a server software that can protect itself (and therefore you) from many hacking attempts, like DoS, password harvesting, hammering, and many other types of attack.

In order to better understand what types of attack are out there in the wild, we have deployed several instances of our Syncplify.me Server! in many different networks (in the cloud, VPS, dedicated servers, …) and we use them as “honeypots” to keep the world SSH break-in attack situation under constant monitoring.

In the past few days we have noticed a significant increase of password harvesting/guessing/breaking attacks, as shown in the picture here below. Taking control of as many servers as possible by breaking into them via SSH is one of the preliminary actions that usually lead to some form of DDoS outbreak in the near future.


The situation shown here above is a clear indicator that someone is up to something. We would not be surprised if another major vendor/corporation/network is subject to a DDoS attack in the next few days. Please, everybody stay alert!

We’re also happy to report that, unlike some competitors’ software, Syncplify.me Server! is successfully identifying all attacks, and blacklisting all attackers. No Syncplify.me Server! has been broken into. Ever.