Comments
broadbandcorporation.com/hnet/vpn.html
Posted by crouse
www.alliancedatacom.com/how-vpn-works.asp
Posted by crouse
Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by HamidAliKhan
http://www.alliancedatacom.com/how-vpn-works.asp
http://www.rice.edu/it/network/vpn-how.html
Posted by crouse
How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ...
for more details
www.alliancedatacom.com/how-vpn-works.asp - 45k -
Posted by waqasahmad
www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse
www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse
For more info
http://www.cit.cornell.edu/services/vpn/FAQVPN.html
Posted by Hash007
The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers.
Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice.
The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access.
Posted by jahangir1983
Posted by jahangir1983