MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
January 1, 2002
Duncan Napier
Setting up a VPN Gateway How to install and run an IPSec-based VPN gateway with a firewall using a single bootable Linux diskette distribution... mark for My Articles similar articles
PC Magazine
August 19, 2003
Simpler, Safe Remote Access Remote access via SSL (Secure Sockets Layer), the focus of our product roundup, is relatively new, but it's growing quickly because of its simplicity for users and its accessibility from any PC with an Internet connection and browser, anywhere. mark for My Articles similar articles
Linux Journal
April 1, 2002
Alan Zeichick
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... mark for My Articles similar articles
Linux Journal
August 1, 2007
Ben Martin
Create a Linux VPN for a Nokia E61 with Openswan A virtual private network (VPN) allows you to send traffic across an untrusted network without exposing the content of that traffic. The example in this article is connecting a Nokia E61 device to a home network through a VPN over the Internet. mark for My Articles similar articles
RootPrompt.org
August 30, 2000
A Stateful Inspection of FireWall-1 An analysis of Check Point FireWall-1 vulnerabilities resulting from protocol design flaws, problems in stateful inspection, common or default misconfigurations, and minor implementation errors discovered over the past few months in the lab, and verified in real-world penetration tests. mark for My Articles similar articles
Linux Journal
March 2, 2007
Michael Rash
Single Packet Authorization Single Packet Authorization fills the gaps in port knocking. mark for My Articles similar articles
Home Toys
December 2002
Satish Gupta
Design Challenges for Home Gateway Devices This paper details the hardware, software, technical architecture and specifications of home gateway devices and lists out the engineering design challenges (along with the possible solutions) faced by a home gateway product designer or a home gateway silicon designer. mark for My Articles similar articles
Linux Journal
August 1, 2007
Alexander Sirotkin
Building a Next-Generation Residential Gateway Here are the steps for picking hardware and setting up software for a Linux-based residential gateway. mark for My Articles similar articles
RootPrompt.org
June 5, 2000
Jeremey Barrett
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... mark for My Articles similar articles
Linux Journal
April 17, 2006
Geoff Baker
VPNs Illustrated: Tunnels, VPNS, and IPsec -- A Book Review Practical, well-documented advice that can help secure your system. mark for My Articles similar articles
RootPrompt.org
May 15, 2000
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... mark for My Articles similar articles
Military & Aerospace Electronics
December 2007
Courtney E. Howard
Top Secrets: Securing Sensitive Data Defense industry organizations develop and deploy secure information solutions to protect military and civilian lives. mark for My Articles similar articles
T.H.E. Journal
September 2000
Device Enhances Satellite Internet Connections The latest in their line of Internet-via-satellite enhancement products, Helius' Optimized Gateway is an IP-compliant device that is designed to improve interactive Internet services like browsing, FTP, VPN links, e-mail and other bi-directional services. mark for My Articles similar articles
InternetNews
June 16, 2004
Sean Michael Kerner
No Swan Song for Open Source IPsec Novell puts its weight behind the Openswan project. mark for My Articles similar articles
Linux Journal
December 12, 2006
Dempster & Eaton-Lee
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. mark for My Articles similar articles
InternetNews
May 12, 2009
Sean Michael Kerner
Aruba Gets Wired for Remote Access WLAN player shifts to the LAN with major new rollout of remote access gear with Linux at its core. mark for My Articles similar articles
Linux Journal
February 1, 2002
Gianluca Insolvibile
Inside the Linux Packet Filter In Part I of this two-part series on the Linux Packet Filter, the author describes a packet's journey through the kernel... mark for My Articles similar articles
RootPrompt.org
April 17, 2000
Lance Spitzner
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. mark for My Articles similar articles
InternetNews
September 10, 2008
Sean Michael Kerner
Cisco Looks to Lock Down Remote Workers Already in use by 12,000 of the networking giant's own employees, the new Cisco Virtual Office solution is being turned loose for mass-market consumption. mark for My Articles similar articles
InternetNews
January 11, 2008
Sean Michael Kerner
Aventail Expands SSL VPN to include more IPsec SSL VPN vendor Aventail is now blurring the lines between technologies integrating some key IPsec features into its new Aventail 9.0 SSL VPN product lineup. mark for My Articles similar articles
PC Magazine
January 18, 2006
Craig Ellison
Wireless Security Options GhostSurf provides encryption only for specific types of traffic, but SpotLock encrypts all types of traffic. mark for My Articles similar articles
PC Magazine
November 1, 2006
Matthew D. Sarrel
Take Your Network Anywhere A secure VPN is the best way to access your network files when you're out of the office. mark for My Articles similar articles
PC Magazine
June 8, 2004
Larry J. Seltzer
VPN Appliances Come to the Small Office Virtual Private Networks (VPNs) are the most mature and trusted method for providing outside access to a company?s network. We test three new appliances that aim to bring this big-business luxury to smaller firms. mark for My Articles similar articles
InternetNews
July 8, 2005
Mike Harwood
Storage Security Basics In the first part of a series on storage security, we examine the fundamental concepts for securing storage area networks. mark for My Articles similar articles
InternetNews
December 18, 2006
Sean Michael Kerner
Cisco VPN: Something Old, Something New Though VPN is a mature technology, there is still room for innovation. mark for My Articles similar articles
PC World
January 2005
Kirk Steers
Keep Your PC Hidden From the Bad Guys Guard your networked computers with a router's hardware firewall... Get your own router... What's the second thing you do when you think your PC has a hardware problem?... mark for My Articles similar articles
InternetNews
September 16, 2004
Sean Michael Kerner
Research: SSL VPN's Set to Grow Growth in secure sockets layer certification seen as one driver in the shift. mark for My Articles similar articles
PC Magazine
July 11, 2005
Craig Ellison
blueRoam The blueRoam virtual private network (VPN) is a cost-effective software-based SSL VPN solution that still has a few rough edges. mark for My Articles similar articles
Insurance & Technology
December 20, 2004
Wendy Toth
Long-Distance Relationship Reinsurer PartnerRe adopts SSL VPN technology to safely and conveniently keep employees all over the world connected to the company's network. mark for My Articles similar articles
InternetNews
May 3, 2004
Colin C. Haley
AT&T All Out for MPLS-Based IP-VPN The carrier introduces a new VPN service to sign up companies and government agencies for its IP services. mark for My Articles similar articles
PC World
November 2002
Scott Spanbauer
Internet Tips: Lock Out Internet Pests, Lock In Network Security Enhance your wireless network's security; safely share files; block spam in Outlook cooperatively. mark for My Articles similar articles
CIO
July 15, 2001
Fred Hapgood
Keeping Secrets Long ignored as an important security tool, encryption is finally getting its due... mark for My Articles similar articles
PC Magazine
July 29, 2011
Samara Lynn
LogMeIn Hamachi If you are looking for free, easy VPN for a small business, Hamachi is the best option we've found. mark for My Articles similar articles
InternetNews
July 30, 2004
Ryan Naraine
Check Point Patches Buffer Overflows A buffer overflow vulnerability in Check Point's virtual private network (VPN) products could put users at risk of network takeover, the company warned in an advisory. mark for My Articles similar articles