New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 1016
Comments: 21
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: Protocols

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image New Technology\Prods: Bintec Ships new VPN Access line image
Protocols
Anonymous writes "5 May 2004: Bintec Access Networks is shipping its new VPN product family for setting up IP-based secure remote access infrastructures. The new range offers flexible, high-availability VPNs with advanced load balancing and multi-level backup to connect remote sites, branch offices, teleworkers and mobile employees.

The VPN Access line includes five different models with support for 5 to 1,000 secure connections, to meet the needs of all sizes of company from SOHOs through SMEs to large corporate businesses. Prices range from £280 for the VPN 5 to £5,250 for the VPN 1000 (exc. VAT) and are available through distributors Wick Hill and Spot Distribution. "
Posted by phoenix22  on Wednesday, 05 May 2004 @ 13:28:16 EDT (427 reads)
(» Read More... | 1830 bytes more | TrackBack (0) | comments? | New Technology\Prods | Score: 0)
image

image Feature Opinion: What's BGP got to do with Internet security? image
Protocols

What's BGP got to do with Internet security?







by Marcia J. Wilson, CCSP Staff Writer
March 30, 2004


"Reprinted from April 23, 2K3"
The Internet wasn't built with security in mind; it was built with communication in mind. In the same way Tina Turner wailed that love is nothing but "a secondhand emotion," security is an Internet afterthought.

The issues with the Border Gateway Protocol (BGP) are a case in point.
Posted by cj  on Tuesday, 30 March 2004 @ 11:17:34 EST (1343 reads)
(» Read More... | 8666 bytes more | TrackBack (0) | comments? | Feature Opinion | Score: 4)
image

image New Technology\Prods: curl and libcurl 7.11.0 (Default) image
Protocols

curl and libcurl 7.11.0 (Default)

cURLcurl and libcurl is a tool for transferring files using URL syntax. It supports HTTP, HTTPS, FTP, FTPS, DICT, TELNET, LDAP, FILE, and GOPHER, as well as HTTP-post, HTTP-put, cookies, FTP upload, resumed transfers, passwords, portnumbers, SSL certificates, Kerberos, and proxies. It is powered by libcurl, the client-side URL transfer library. There are bindings/interfaces to libcurl for more than a dozen languages and environments.
Posted by cj  on Thursday, 22 January 2004 @ 08:07:44 EST (320 reads)
(» Read More... | 919 bytes more | TrackBack (0) | comments? | New Technology\Prods | Score: 0)
image

image New Technology\Prods: Cisco Joins SSL-VPN Push with WebVPN image
Protocols
Cisco Joins SSL-VPN Push with WebVPN
By Jay Lyman
TechNewsWorld

The market not only is ready, but the SSL remote access technology has already become mainstream, according to Gartner vice president Richard Stiennon, who told TechNewsWorld that SSL-VPN, a combination of encryption and network management, has risen from flash-in-the-pan technology to an accepted improvement in remote-access security.
Posted by phoenix22  on Wednesday, 12 November 2003 @ 04:35:00 EST (507 reads)
(» Read More... | 4776 bytes more | TrackBack (0) | comments? | New Technology\Prods | Score: 4)
image

image Commentaries: IP VPN: compelling savings - compelling performance? image
Protocols
IP VPN: compelling savings - compelling performance?
By John Leyden

Briefing IP-based virtual private networks can offer compelling cost savings compared with leased lines, but how can they deliver enterprise-class security and performance?
Posted by phoenix22  on Wednesday, 12 November 2003 @ 04:30:00 EST (333 reads)
(» Read More... | 7186 bytes more | TrackBack (0) | comments? | Commentaries | Score: 0)
image

image Commentaries: Gartner: Time Is Now for VoIP image
Protocols
Gartner: Time Is Now for VoIP
By Tim Greene

Gartner told attendees that IP telephony is ready for deployment technologically, but business concerns might override making the shift in some companies. The cost of the phones is a major issue.
Posted by phoenix22  on Sunday, 09 November 2003 @ 05:00:00 EST (473 reads)
(» Read More... | 4644 bytes more | TrackBack (0) | 1 comment | Commentaries | Score: 0)
image

image Tutorials: Learning to speak IP image
Protocols
Learning to speak IP
After our look at the basics of firewalling, on to more advanced stuff – Network Address Translation (NAT).
By David Cartwright

Part of the IP specification defines a set of ‘private’ IP addresses; these are set aside for use within a corporate network and don’t form part of the address space that the Internet’s core routers are willing to route. One nice thing about private addresses is that you don’t have to register your use of them with the Internet authorities. There are also plenty of them set aside so you’re never likely to run out. The other nice thing is that because the addresses are ‘private’, the routers on the Internet don’t route them – which means it’s impossible for an intruder to make a connection over the Internet to one of these private addresses.
Posted by phoenix22  on Sunday, 09 November 2003 @ 04:35:00 EST (551 reads)
(» Read More... | 6251 bytes more | TrackBack (0) | comments? | Tutorials | Score: 0)
image

image Gov't (U.S.): Feds to Examine Ipv6 Transition image
Protocols
Feds to Examine Ipv6 Transition
By Caron Carlson

WASHINGTON—The U.S. Department of Commerce recently set up a federal task force to examine the latest Internet Protocol, Ipv6. The government wants to better understand the impact that the standard could have on Internet security and what the government's role will be in deploying the standard.
Posted by phoenix22  on Friday, 17 October 2003 @ 10:50:11 EDT (289 reads)
(» Read More... | 1515 bytes more | TrackBack (0) | comments? | Gov't (U.S.) | Score: 0)
image

image Strategies: Batten Down Those Ports image
Protocols
Batten Down Those Ports
October 28, 2003
By Brett Glass

With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposed to attacks. One of the simplest but most vital tests you can do to determine potential vulnerabilities is to find out which ports your PC has open to the outside world.
Posted by phoenix22  on Thursday, 09 October 2003 @ 05:10:00 EDT (688 reads)
(» Read More... | 4471 bytes more | TrackBack (0) | comments? | Strategies | Score: 0)
image

image Interviews: FCC's Powell takes on tech issues image
Protocols
FCC's Powell takes on tech issues
By Declan McCullagh
CNET News.com
October 1, 2003, 10:25 AM PT

It would be easy to understand if Michael Powell no longer relished his high-profile job as chairman of the Federal Communications Commission.
Posted by phoenix22  on Thursday, 02 October 2003 @ 05:05:00 EDT (298 reads)
(» Read More... | 14917 bytes more | TrackBack (0) | comments? | Interviews | Score: 0)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication