|
Donations |
|
|
|
|
|
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
|
|
|
Survey |
|
|
|
|
|
|
|
|
Translate |
|
|
|
|
|
|
|
|
|
|
|
Anonymous writes "5 May 2004: Bintec Access Networks is shipping its new VPN product family for setting up IP-based secure remote access infrastructures. The new range offers flexible, high-availability VPNs with advanced load balancing and multi-level backup to connect remote sites, branch offices, teleworkers and mobile employees.
The VPN Access line includes five different models with support for 5 to 1,000 secure connections, to meet the needs of all sizes of company from SOHOs through SMEs to large corporate businesses. Prices range from £280 for the VPN 5 to £5,250 for the VPN 1000 (exc. VAT) and are available through distributors Wick Hill and Spot Distribution. "
|
|
|
|
What's BGP got to do with Internet security?
by Marcia J. Wilson, CCSP Staff Writer
March 30, 2004
"Reprinted from April 23, 2K3" The Internet wasn't built with security in mind; it was built with communication in mind. In the same way Tina Turner wailed that love is nothing but "a secondhand emotion," security is an Internet afterthought.
The issues with the Border Gateway Protocol (BGP) are a case in point.
|
|
|
|
curl and libcurl 7.11.0 (Default)curl and libcurl is a tool for transferring files using URL syntax. It supports HTTP, HTTPS, FTP, FTPS, DICT, TELNET, LDAP, FILE, and GOPHER, as well as HTTP-post, HTTP-put, cookies, FTP upload, resumed transfers, passwords, portnumbers, SSL certificates, Kerberos, and proxies. It is powered by libcurl, the client-side URL transfer library. There are bindings/interfaces to libcurl for more than a dozen languages and environments.
|
|
|
|
Cisco Joins SSL-VPN Push with WebVPN
By Jay Lyman
TechNewsWorld
The market not only is ready, but the SSL remote access technology has already become mainstream, according to Gartner vice president Richard Stiennon, who told TechNewsWorld that SSL-VPN, a combination of encryption and network management, has risen from flash-in-the-pan technology to an accepted improvement in remote-access security.
|
|
|
|
Commentaries: IP VPN: compelling savings - compelling performance? |
|
|
IP VPN: compelling savings - compelling performance?
By John Leyden
Briefing IP-based virtual private networks can offer compelling cost savings compared with leased lines, but how can they deliver enterprise-class security and performance?
|
|
|
|
Gartner: Time Is Now for VoIP
By Tim Greene
Gartner told attendees that IP telephony is ready for deployment technologically, but business concerns might override making the shift in some companies. The cost of the phones is a major issue.
|
|
|
|
Learning to speak IP
After our look at the basics of firewalling, on to more advanced stuff – Network Address Translation (NAT).
By David Cartwright
Part of the IP specification defines a set of ‘private’ IP addresses; these are set aside for use within a corporate network and don’t form part of the address space that the Internet’s core routers are willing to route. One nice thing about private addresses is that you don’t have to register your use of them with the Internet authorities. There are also plenty of them set aside so you’re never likely to run out. The other nice thing is that because the addresses are ‘private’, the routers on the Internet don’t route them – which means it’s impossible for an intruder to make a connection over the Internet to one of these private addresses.
|
|
|
|
Feds to Examine Ipv6 Transition
By Caron Carlson
WASHINGTON—The U.S. Department of Commerce recently set up a federal task force to examine the latest Internet Protocol, Ipv6. The government wants to better understand the impact that the standard could have on Internet security and what the government's role will be in deploying the standard.
|
|
|
|
Batten Down Those Ports
October 28, 2003
By Brett Glass
With worms such as Blaster prowling the Net, every user ought to know the ways a computer may be exposed to attacks. One of the simplest but most vital tests you can do to determine potential vulnerabilities is to find out which ports your PC has open to the outside world.
|
|
|
|
FCC's Powell takes on tech issues
By Declan McCullagh
CNET News.com
October 1, 2003, 10:25 AM PT
It would be easy to understand if Michael Powell no longer relished his high-profile job as chairman of the Federal Communications Commission.
|
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Forums Topics |
|
|
|
|
|
Syndication
|
|