Results 161 to 170 of about 2,910 (182)
Some of the next articles are maybe not open access.

Benefits and drawbacks of OpenVPN in accessing Osiris in academic libraries

Library Hi Tech News, 2023
Purpose The aim of this study is to investigate the benefits and weaknesses of OpenVPN to access Osiris. Design/methodology/approach This study uses a case study approach to describe a phenomenon. The data collected from observation of the real-world environment.
Prasetyo Adi Nugroho   +2 more
openaire   +1 more source

Log Collection, OpenVPN, and iptables

2014
This chapter covers three topics related to security: log collection, virtual private networks (VPNs), and firewalls. Log collection and analysis is an integral part of an effective infrastructure support strategy. OpenVPN enables secure VPNs and iptables is a fast and powerful firewall built into Linux.
openaire   +1 more source

Performance measurement of WEP and WPA2 on WLAN using OpenVPN

2015 International Conference on Nascent Technologies in the Engineering Field (ICNTE), 2015
With the advancement of wireless networking many serious security issues have been raised. Because of broadcast nature in wireless networks, various attacks such as eavesdropping, Denial of Service, Session hijacking is very much possible. To encounter these attacks various encryption standards such as Wired Equivalent Privacy (WEP) and 802.11i (WPA2 ...
Rathod Mahesh Pandurang, Deepak C. Karia
openaire   +1 more source

Experimental performance comparison between TCP vs UDP tunnel using OpenVPN

2015 International Conference on Computing, Communication and Security (ICCCS), 2015
The comparison between TCP and UDP tunnels have not been sufficiently reported in the scientific literature. In this work, we use OpenVPN as a platform to demonstrate the performance between TCP/UDP. The de facto belief has been that TCP tunnel provides a permanent tunnel and therefore ensures a reliable transfer of data between two end points. However
Irfaan Coonjah   +2 more
openaire   +1 more source

Research and design of the PMI-based access control model for OpenVPN

2010 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2010), 2010
Open VPN is commonly used to remotely access a variety of resources in the enterprise networks. However, there is a deficiency that Open VPN can only provide coarse-grained access control. It brings in security problems in accessing the key resources with different security levels.
null Yang Yang   +3 more
openaire   +1 more source

Konfiguracija OpenVPN servera na MikroTik usmjerniku

2019
Zadatak ovog diplomskog rada je u teorijskom dijelu najprije objasniti pojam i namjenu VPN-a, vrste rješenja te njegove tehnologije i protokole. Nakon toga je fokus rada prebačen na sami OpenVPN protokol, koji je najpoznatiji predstavnik TLS/SSL VPN protokola. Kao i kod VPN-a općenito, prikazana je povijesna podloga i početci OpenVPN tehnologije, te su
openaire   +1 more source

OpenVPN

VPN (Virtual Private Network) je tehnologija koja omogućuje korisnicima da sigurno komuniciraju preko javnih ili nesigurnih mreža, poput interneta, stvarajući "privatni" kanal za prijenos podataka. OpenVPN je jedna od najpoznatijih open-source implementacija VPN-a koja kombinira SSL/TLS protokole za sigurnu komunikaciju.
openaire   +1 more source

Analisis Perbandingan Kinerja OpenVPN GUI dengan SoftEther VPN

2018
Pengiriman data melalui internet sangat erat kaitanya dengan keamanan, dengan menggunakan jaringan publik dapat terjadi pencurian data oleh orang yang tidak bertanggung jawab. Fakultas Teknologi Informasi (FTI) Universitas Kristen Satya Wacana (UKSW) memanfaatkan jaringan internet sebagai media dalam menjalankan tugas tugas kampus seperti file sharing,
openaire   +1 more source

OpenVPN en Solaris 10

2011
Jesus, Juan, Ruiz Lagunas
openaire   +1 more source

OpenVPN TLS-Crypt-V2 Key Wrapping with Hardware Security Modules

The control channel protection of OpenVPN using the tls-crypt-v2 mechanism provides, among other, post-quantum security of the VPN tunnel. With tls-crypt-v2, a user sends a wrapped, pre-shared client key to the server when establishing a tunnel. If the server wrapping key is compromised, all client keys need to be renewed.
openaire   +1 more source

Home - About - Disclaimer - Privacy