Results 51 to 60 of about 1,966 (130)

Personal Anonycloud [PDF]

open access: yes, 2015
Personal AnonyCloud es un proyecto que soluciona varios de los principales problemas en redes hoy en día. Por una parte, actualmente las herramientas VPN solo permiten conexiones punto a punto, es decir, cliente a servidor.
Baños Rodríguez, Sergio   +2 more
core   +1 more source

Virtual Privet Networks using Cisco Routers

open access: yesJournal of Engineering and Sustainable Development, 2009
Virtual private Network (VPN), is a technology that provides a secure communications mechanism for data and control information transmitted between networks. It can be used over existing network such as data across public network.
Haider Tarish Haider   +1 more
doaj  

Guidelines for Specifying the Use of IPsec Version 2 [PDF]

open access: yes, 2009
The Security Considerations sections of many Internet Drafts say, in effect, "just use IPsec". While this is sometimes correct, more often it will leave users without real, interoperable security mechanisms. This memo offers some guidance on when IPsec
Bellovin, Steven Michael
core   +2 more sources

Perancangan Dan Implementasi VPN Server Dengan Menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Studi Kasus Kampus Universitas Sam Ratulangi [PDF]

open access: yes, 2017
Jaringan internet merupakan salah satu kebutuhan manusia sekarang ini. Begitu banyak aktifitas manusia menjadi lebih mudah dengan adanya jaringan internet seperti proses mengirim data dari satu tempat ke tempat lain. Proses pengiriman data tersebut hanya
Farly, K. A. (Kaseger)   +2 more
core  

An Analisys of Business VPN Case Studies [PDF]

open access: yes
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo   +2 more
core  

Web Tracking: Mechanisms, Implications, and Defenses [PDF]

open access: yes, 2015
This articles surveys the existing literature on the methods currently used by web services to track the user online as well as their purposes, implications, and possible user's defenses.
Barlet-Ros, Pere   +3 more
core   +2 more sources

Broadband Architectures, ISP Business Plans, and Open Access [PDF]

open access: yes, 2000
Something suspiciously resembling a double standard exists in US regulation of broadband access carriers. Incumbent local exchange carriers?ILECs?are required to open their networks to competing service providers, while cable television companies are ...
O'Donnell, Shawn
core  

Analisis Perbandingan Performa Qos, Pptp, L2Tp, Sstp Dan Ipsec Pada Jaringan Vpn Menggunakan Mikrotik

open access: yessemanTIK, 2018
AbstractTunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss,
Zamalia, Wa Ode   +2 more
openaire   +2 more sources

Open Vpn-access Server dengan Enskripsi Ssl/ti Open Ssl [PDF]

open access: yes, 2016
Computer network is one technology that is widely used by some companies today. one of the functions of a computer network is to connect one location to another.
Badrul, M. (Mohammad)
core   +1 more source

Home - About - Disclaimer - Privacy