Results 11 to 20 of about 107,397 (277)

Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima

open access: yesComputer Science, 2022
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server.
Farizal Triyansa, Irwan Agus Sobari
doaj   +1 more source

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Network Security Analysis Using Virtual Private Network in Vocational School

open access: yesJurnal Paedagogy, 2022
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN).
Yosi Nofita Sari, Dedy Irfan, Asrul Huda
doaj   +1 more source

Analysis and Verification of IPSec VPN Security Vulnerability [PDF]

open access: yesJisuanji gongcheng, 2021
Network boundary is the necessary channel for providing access services. As a key technique widely used in network boundary protection, IPSec VPN has a significant influence on the overall security of network.
ZHOU Yimin, LIU Fangzheng, DU Zhenyu, ZHANG Kai
doaj   +1 more source

Dissecting Deradicalization: Challenges for Theory and Practice in Germany

open access: yesInternational Journal of Conflict and Violence, 2020
Compared to the topic of radicalization, deradicalization was long treated as secondary in research, at least until recently. This article outlines the most important findings from theory and practice in three steps by: (1) discussing and reviewing ...
Till Baaken   +3 more
doaj   +1 more source

Penerapan Firewall Dan Protokol IpSec/L2TP Sebagai Solusi Keamanan Akses Jaringan Publik

open access: yesComputer Science, 2021
Firewall is an algorithm that allows filtering activities to determine access restrictions on a komputer  that can use Publik  network access and which komputer s cannot pass through Publik  network access, this is commonly called filtering. As time goes
Muhammad Ayub   +2 more
doaj   +1 more source

"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers [PDF]

open access: yesUSENIX Security Symposium, 2022
As more users adopt VPNs for a variety of reasons, it is important to develop empirical knowledge of their needs and mental models of what a VPN offers.
Reethika Ramesh, A. Vyas, Roya Ensafi
semanticscholar   +1 more source

Design and Implementation of Controlling and Monitoring System Based on Wireless VPN [PDF]

open access: yesEngineering and Technology Journal, 2013
The work presented in this paper was concerned to design a new remote control and monitoring system, which can be used for controlling the electrical devices at college/office and monitoring the clients' status by using the Virtual Private Network (VPN).
Siraj Qays Mahdi
doaj   +1 more source

Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi

open access: yesTeknika, 2022
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik ...
Taufik Rahman   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy