Results 51 to 60 of about 1,966 (130)
Personal AnonyCloud es un proyecto que soluciona varios de los principales problemas en redes hoy en día. Por una parte, actualmente las herramientas VPN solo permiten conexiones punto a punto, es decir, cliente a servidor.
Baños Rodríguez, Sergio +2 more
core +1 more source
Virtual Privet Networks using Cisco Routers
Virtual private Network (VPN), is a technology that provides a secure communications mechanism for data and control information transmitted between networks. It can be used over existing network such as data across public network.
Haider Tarish Haider +1 more
doaj
Guidelines for Specifying the Use of IPsec Version 2 [PDF]
The Security Considerations sections of many Internet Drafts say, in effect, "just use IPsec". While this is sometimes correct, more often it will leave users without real, interoperable security mechanisms. This memo offers some guidance on when IPsec
Bellovin, Steven Michael
core +2 more sources
Perancangan Dan Implementasi VPN Server Dengan Menggunakan Protokol SSTP (Secure Socket Tunneling Protocol) Studi Kasus Kampus Universitas Sam Ratulangi [PDF]
Jaringan internet merupakan salah satu kebutuhan manusia sekarang ini. Begitu banyak aktifitas manusia menjadi lebih mudah dengan adanya jaringan internet seperti proses mengirim data dari satu tempat ke tempat lain. Proses pengiriman data tersebut hanya
Farly, K. A. (Kaseger) +2 more
core
An Analisys of Business VPN Case Studies [PDF]
A VPN (Virtual Private Network) simulates a secure private network through a shared public insecure infrastructure like the Internet. The VPN protocol provides a secure and reliable access from home/office on any networking technology transporting IP ...
Crescenzio Gallo +2 more
core
Web Tracking: Mechanisms, Implications, and Defenses [PDF]
This articles surveys the existing literature on the methods currently used by web services to track the user online as well as their purposes, implications, and possible user's defenses.
Barlet-Ros, Pere +3 more
core +2 more sources
Broadband Architectures, ISP Business Plans, and Open Access [PDF]
Something suspiciously resembling a double standard exists in US regulation of broadband access carriers. Incumbent local exchange carriers?ILECs?are required to open their networks to competing service providers, while cable television companies are ...
O'Donnell, Shawn
core
A novel dataset for encrypted virtual private network traffic analysis. [PDF]
Naas M, Fesl J.
europepmc +1 more source
AbstractTunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to be applicable to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss,
Zamalia, Wa Ode +2 more
openaire +2 more sources
Open Vpn-access Server dengan Enskripsi Ssl/ti Open Ssl [PDF]
Computer network is one technology that is widely used by some companies today. one of the functions of a computer network is to connect one location to another.
Badrul, M. (Mohammad)
core +1 more source

