MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
PC Magazine
July 11, 2005
Craig Ellison
blueRoam The blueRoam virtual private network (VPN) is a cost-effective software-based SSL VPN solution that still has a few rough edges. mark for My Articles similar articles
PC Magazine
November 1, 2006
Matthew D. Sarrel
Take Your Network Anywhere A secure VPN is the best way to access your network files when you're out of the office. mark for My Articles similar articles
CIO
January 15, 2003
Susannah Patton
Simply Secure Communications VPN alternatives provide safe connections, ease and flexibility. mark for My Articles similar articles
PC Magazine
March 2, 2004
Davis D. Janowski
Small-Business Security For cash-strapped, IT-barren companies, all-in-one security appliances offer affordable protection. Here's how to make one work for your network. mark for My Articles similar articles
PC Magazine
February 3, 2004
Davis D. Janowski
Taking Care of Small Business Getting a small-business network up and running can be a daunting task. In particular, finding the right network operating system is paramount, because it's the backbone on which everything on your network is shared and added. mark for My Articles similar articles
New Architect
May 2002
Logan G. Harbaugh
SSL Accelerators To increase a Web site's ability to handle SSL transactions, as well as to reduce processor overhead, it makes sense to offload SSL processing from the server to dedicated hardware... mark for My Articles similar articles
PC Magazine
February 2, 2005
Robert P. Lipschutz
Lock Down Your Network When it comes to security, small and midsize businesses (SMBs) often find themselves in an uncomfortable position. They share many of the same security fears that threaten multinational enterprises. mark for My Articles similar articles
PC Magazine
December 8, 2004
Kaven & Janowski
A No-Hassle Server Our roundup focuses on three server appliances: the Axentra Net-Box SOHO 400... the EmergeCore IT-100... the Net Integrator Mark I... mark for My Articles similar articles
Linux Journal
October 9, 2001
Eric Rescorla
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... mark for My Articles similar articles
Linux Journal
December 12, 2006
Dempster & Eaton-Lee
Excerpt from the book "Configuring IPCop Firewalls: Closing Borders with Open Source" IPCop is a firewall for the Small Office/Home Office network, which is extremely easy to use and is released under the GPL. This excerpt outlines a few common methods of deploying IPCop and the motivation behind these topologies along with descriptions of some of the features you can deploy. mark for My Articles similar articles
RootPrompt.org
May 29, 2000
Reto Haeni
Can IPv6 replace SSL? A brief overview of the features of IPv6 and its security specifications. In the later sections of the paper, he compares the security specifications of IPv6 to one of today's available security protocols, SSL (Secure Sockets Layer). mark for My Articles similar articles
PC Magazine
September 14, 2011
Samara Lynn
Hands On: Windows Server 8 Microsoft is calling Windows Server 8 a "game-changer." They might be right. mark for My Articles similar articles
RootPrompt.org
June 5, 2000
Jeremey Barrett
A Response to the feature on IPv6 vs. SSL SSL and other transport-layer protocols provide additional and different security functionality that IPsec (and hence IPv6) will never provide.... mark for My Articles similar articles
InternetNews
September 16, 2004
Sean Michael Kerner
Research: SSL VPN's Set to Grow Growth in secure sockets layer certification seen as one driver in the shift. mark for My Articles similar articles
PC World
August 2005
Becky Waring
PC in a Browser Remote-access services put your essential files and applications at your fingertips, through any browser. And they're fast, secure, and affordable. We crown a new distance champ. MyWebEx PC Pro... etc. mark for My Articles similar articles
InternetNews
January 11, 2008
Sean Michael Kerner
Aventail Expands SSL VPN to include more IPsec SSL VPN vendor Aventail is now blurring the lines between technologies integrating some key IPsec features into its new Aventail 9.0 SSL VPN product lineup. mark for My Articles similar articles
Linux Journal
January 1, 2002
Duncan Napier
Setting up a VPN Gateway How to install and run an IPSec-based VPN gateway with a firewall using a single bootable Linux diskette distribution... mark for My Articles similar articles
Linux Journal
April 1, 2002
Alan Zeichick
Product Review: SnapGear Lite An Inexpensive Home Office/Small Office Firewall and VPN Client... mark for My Articles similar articles
Linux Journal
August 1, 2007
Ben Martin
Create a Linux VPN for a Nokia E61 with Openswan A virtual private network (VPN) allows you to send traffic across an untrusted network without exposing the content of that traffic. The example in this article is connecting a Nokia E61 device to a home network through a VPN over the Internet. mark for My Articles similar articles
PC Magazine
June 22, 2004
Robert P. Lipschutz
Business Security Our buying guide sorts out the technologies and explains the best ways to protect yourself. mark for My Articles similar articles
PC Magazine
April 6, 2005
David A. Karp
Control a PC for Free With a remote control solution, you sit in front of one computer and view the desktop of another computer in a window. mark for My Articles similar articles
Home Toys
April 2003
John Drabik
Creating an Effective VPN Implementation on Embedded Linux This article discusses issues and tradeoffs associated with implementation of IPsec on Virtual Private Network (VPN) gateways. mark for My Articles similar articles
PC Magazine
June 8, 2004
Larry J. Seltzer
VPN Appliances Come to the Small Office Virtual Private Networks (VPNs) are the most mature and trusted method for providing outside access to a company?s network. We test three new appliances that aim to bring this big-business luxury to smaller firms. mark for My Articles similar articles
T.H.E. Journal
December 2003
Julio W. Velasquez
Somerset Area Schools Select SSL-Based Solution to Connect to the Digital World With only 20 computers in a school district of more than 2,800 students -- with an average of five computers functioning at one time -- the district decided they needed to make changes fast. mark for My Articles similar articles
PC World
March 15, 2001
Stephanie Bruzzese
Remote Access Applications Square Off Heavy-hitter Symantec and rookie Expertcity go head-to-head with remote access Windows applications. mark for My Articles similar articles
PC Magazine
December 30, 2003
Can You Outsource Remote Access? Busy network administrators will appreciate getting something for nothing. The something is secure remote access to your company network; the nothing is the equipment and software you'll need to set up at the office. mark for My Articles similar articles
PC World
May 2001
Stephanie Bruzzese
Peek Into Your PC From Anywhere On the road--and missing an important file left behind on your office system? With remote PC-access software, you can quickly save the day. New entrants in this category include the Web-based GoToMyPC from Expertcity and an updated version of the long-standing PCAnywhere from Symantec... mark for My Articles similar articles
PC Magazine
February 3, 2004
S. Jae Yang
Citrix Moves Beyond Thin Clients Citrix has put together a suite of products that work together to manage access to enterprise-scale computing resources. mark for My Articles similar articles
Insurance & Technology
December 20, 2004
Wendy Toth
Long-Distance Relationship Reinsurer PartnerRe adopts SSL VPN technology to safely and conveniently keep employees all over the world connected to the company's network. mark for My Articles similar articles
JavaWorld
August 2001
Abraham Kang
J2EE clustering, Part 2 Because most developers build their Web applications in a nonclustered environment, those applications often break when moved into a cluster. This article explains the programming, setup, and management issues related to clustering... mark for My Articles similar articles
Entrepreneur
November 2003
Spiwak & Gros
Safety First You know a firewall is essential in keeping your network secure. So why haven't you gotten one yet? mark for My Articles similar articles
PC World
November 2002
Scott Spanbauer
Internet Tips: Lock Out Internet Pests, Lock In Network Security Enhance your wireless network's security; safely share files; block spam in Outlook cooperatively. mark for My Articles similar articles
PC World
April 2005
Yardena Arar
Buffalo Offers Affordable Remote Access Wi-Fi router accepts VPN connections and provides file access and even remote PC control. mark for My Articles similar articles
InternetNews
August 30, 2004
Colin C. Haley
Juniper Takes Security to Endpoints A new initiative integrates third-party software from McAfee and others with Juniper's SSL VPN appliance. mark for My Articles similar articles
PC World
July 2005
Scott Dunn
Access Your Files and Apps From Anywhere for Free Use a built-in Windows tool to reach your office PC's files remotely from the road... Back up Outlook files easily... mark for My Articles similar articles
InternetNews
May 12, 2009
Sean Michael Kerner
Aruba Gets Wired for Remote Access WLAN player shifts to the LAN with major new rollout of remote access gear with Linux at its core. mark for My Articles similar articles
Linux Journal
March 2001
New Products Wing IDE for Python... Netmax VPN Server Suite... iConnect Suite... Linux2order Web Site... NetBSD 1.5 CD-ROM... WARP Performance Suite... INTERNETpro Small Enterprise Server 2012... ProcureMind 1.6...MSC.Linux... mark for My Articles similar articles
PC World
September 2004
Jamie Fenton
EnKoo Offers Secure Remote Access The EnKoo-2000, a rack-mountable Linux PC, should be safer than a virtual private network (VPN) setup. mark for My Articles similar articles
CIO
November 15, 2003
Todd Datz
Remote Possibilities Server-based computing is old news, but users find new reasons to keep it around. mark for My Articles similar articles
InternetNews
September 10, 2008
Sean Michael Kerner
Cisco Looks to Lock Down Remote Workers Already in use by 12,000 of the networking giant's own employees, the new Cisco Virtual Office solution is being turned loose for mass-market consumption. mark for My Articles similar articles
JavaWorld
February 2002
Steve Ditlinger
Mix protocols transparently in Web applications To maintain the security of sensitive data as it travels over the Internet to or from the browser, Web applications often rely on Secure Sockets Layer. The secure Webpages and processes that transmit sensitive data utilize HTTP over SSL (HTTPS) rather than the usual HTTP. Integrating SSL into a Web application should prove seamless and simple to implement as well as maintain. This article explores typical SSL implementations and develops an SSL solution using the J2EE servlet redirect mechanism to protect sensitive data transmission. It also develops an overall solution combining JavaServer Pages custom tags and an application-specific servlet base class. mark for My Articles similar articles
JavaWorld
May 2001
Todd Sundsted
Build secure network applications with SSL and the JSSE API SSL (Secure Socket Layer) is the de facto standard for securing a communication channel between two applications that converse over the Internet. Sun's JSSE (Java Secure Socket Extension) provides SSL support for Java applications... mark for My Articles similar articles
PC Magazine
July 29, 2011
Samara Lynn
LogMeIn Hamachi If you are looking for free, easy VPN for a small business, Hamachi is the best option we've found. mark for My Articles similar articles
Bank Technology News
July 2008
Barry Cox
Automating Management of the Branch Office Network Some financial services IT departments with high availability requirements and limited staff at distributed locations are turning toward a new remote management approach. mark for My Articles similar articles
InternetNews
May 6, 2005
Erin Joyce
Bob Weinschenk, CEO, Britestream And here's the pitch: The time has come for offloading online security from the software side to the hardware side of the network. mark for My Articles similar articles
InternetNews
May 12, 2006
Sean Michael Kerner
Report: SSL-VPNs Still Behind IPsec The emerging SSL-VPNs security protocol will eventually overtake IPsec VPN deployments for transmitting data across a network securely. But for now, IPsec retains the lead, according to Infonetics Research. mark for My Articles similar articles
InternetNews
September 15, 2005
Sean Michael Kerner
Juniper, Cisco Heat up SSL VPN Space The SSL VPN market heated up this week with the Juniper Networks release of a new managed and virtualized platform for service providers. But it's not the only company vying for a piece. mark for My Articles similar articles
PC World
April 2002
Jamie Fenton
Fortress in a Box New Internet security appliances simplify network protection chores... mark for My Articles similar articles
PHONE+
November 16, 2009
Cara Sievers
Helping Customers Plan For Disaster MegaPath offers up business continuity planning checklist. mark for My Articles similar articles
InternetNews
December 18, 2006
Sean Michael Kerner
Cisco VPN: Something Old, Something New Though VPN is a mature technology, there is still room for innovation. mark for My Articles similar articles