Similar Articles |
|
Linux Journal January 1, 2002 Duncan Napier |
Setting up a VPN Gateway How to install and run an IPSec-based VPN gateway with a firewall using a single bootable Linux diskette distribution... |
PC Magazine August 19, 2003 |
Simpler, Safe Remote Access Remote access via SSL (Secure Sockets Layer), the focus of our product roundup, is relatively new, but it's growing quickly because of its simplicity for users and its accessibility from any PC with an Internet connection and browser, anywhere. |
Linux Journal April 1, 2002 Alan Zeichick |
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... |
Linux Journal August 1, 2007 Ben Martin |
Create a Linux VPN for a Nokia E61 with Openswan A virtual private network (VPN) allows you to send traffic across an untrusted network without exposing the content of that traffic. The example in this article is connecting a Nokia E61 device to a home network through a VPN over the Internet. |
RootPrompt.org August 30, 2000 |
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. |
Linux Journal March 2, 2007 Michael Rash |
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. |
Home Toys December 2002 Satish Gupta |
Design Challenges for Home Gateway Devices This paper details the hardware, software, technical architecture and specifications of home gateway devices and lists out the engineering design challenges (along with the possible solutions) faced by a home gateway product designer or a home gateway silicon designer. |
Linux Journal August 1, 2007 Alexander Sirotkin |
Building a Next-Generation Residential Gateway Here are the steps for picking hardware and setting up software for a Linux-based residential gateway. |
RootPrompt.org June 5, 2000 Jeremey Barrett |
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... |
Linux Journal April 17, 2006 Geoff Baker |
VPNs Illustrated: Tunnels, VPNS, and IPsec -- A Book Review Practical, well-documented advice that can help secure your system. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
Military & Aerospace Electronics December 2007 Courtney E. Howard |
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. |
T.H.E. Journal September 2000 |
Device Enhances Satellite Internet Connections The latest in their line of Internet-via-satellite enhancement products, Helius' Optimized Gateway is an IP-compliant device that is designed to improve interactive Internet services like browsing, FTP, VPN links, e-mail and other bi-directional services. |
InternetNews June 16, 2004 Sean Michael Kerner |
No Swan Song for Open Source IPsec Novell puts its weight behind the Openswan project. |
Linux Journal December 12, 2006 Dempster & Eaton-Lee |
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. |
InternetNews May 12, 2009 Sean Michael Kerner |
Aruba Gets Wired for Remote Access WLAN player shifts to the LAN with major new rollout of remote access gear with Linux at its core. |
Linux Journal February 1, 2002 Gianluca Insolvibile |
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
InternetNews September 10, 2008 Sean Michael Kerner |
Cisco Looks to Lock Down Remote Workers Already in use by 12,000 of the networking giant's own employees, the new Cisco Virtual Office solution is being turned loose for mass-market consumption. |
InternetNews January 11, 2008 Sean Michael Kerner |
Aventail Expands SSL VPN to include more IPsec SSL VPN vendor Aventail is now blurring the lines between technologies integrating some key IPsec features into its new Aventail 9.0 SSL VPN product lineup. |
PC Magazine January 18, 2006 Craig Ellison |
Wireless Security Options GhostSurf provides encryption only for specific types of traffic, but SpotLock encrypts all types of traffic. |
PC Magazine November 1, 2006 Matthew D. Sarrel |
Take Your Network Anywhere A secure VPN is the best way to access your network files when you're out of the office. |
PC Magazine June 8, 2004 Larry J. Seltzer |
VPN Appliances Come to the Small Office Virtual Private Networks (VPNs) are the most mature and trusted method for providing outside access to a company?s network. We test three new appliances that aim to bring this big-business luxury to smaller firms. |
InternetNews July 8, 2005 Mike Harwood |
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. |
InternetNews December 18, 2006 Sean Michael Kerner |
Cisco VPN: Something Old, Something New Though VPN is a mature technology, there is still room for innovation. |
PC World January 2005 Kirk Steers |
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... |
InternetNews September 16, 2004 Sean Michael Kerner |
Research: SSL VPN's Set to Grow Growth in secure sockets layer certification seen as one driver in the shift. |
PC Magazine July 11, 2005 Craig Ellison |
blueRoam The blueRoam virtual private network (VPN) is a cost-effective software-based SSL VPN solution that still has a few rough edges. |
Insurance & Technology December 20, 2004 Wendy Toth |
Long-Distance Relationship Reinsurer PartnerRe adopts SSL VPN technology to safely and conveniently keep employees all over the world connected to the company's network. |
InternetNews May 3, 2004 Colin C. Haley |
AT&T All Out for MPLS-Based IP-VPN The carrier introduces a new VPN service to sign up companies and government agencies for its IP services. |
PC World November 2002 Scott Spanbauer |
Internet Tips: Lock Out Internet Pests, Lock In Network Security Enhance your wireless network's security; safely share files; block spam in Outlook cooperatively. |
CIO July 15, 2001 Fred Hapgood |
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... |
PC Magazine July 29, 2011 Samara Lynn |
LogMeIn Hamachi If you are looking for free, easy VPN for a small business, Hamachi is the best option we've found. |
InternetNews July 30, 2004 Ryan Naraine |
Check Point Patches Buffer Overflows A buffer overflow vulnerability in Check Point's virtual private network (VPN) products could put users at risk of network takeover, the company warned in an advisory. |