How does VPN work ?
ngnguru_com 27-January-2009 07:07:05 PMComments broadbandcorporation.com/hnet/vpn.html Posted by crouse www.alliancedatacom.com/how-vpn-works.asp Posted by crouse Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k Posted by HamidAliKhan http://www.alliancedatacom.com/how-vpn-works.asp http://www.rice.edu/it/network/vpn-how.html Posted by crouse How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ... for more details www.alliancedatacom.com/how-vpn-works.asp - 45k - Posted by waqasahmad www.alliancedatacom.com/how-vpn-works.asp - 45k Posted by crouse www.alliancedatacom.com/how-vpn-works.asp - 45k Posted by crouse For more info http://www.cit.cornell.edu/services/vpn/FAQVPN.html Posted by Hash007 The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers. Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice. The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access. Posted by jahangir1983 Posted by jahangir1983 |
Posted: 28-January-2009 12:54:58 AM By: sagitraz Please visit following links for detail information: http://www.alliancedatacom.com/how-vpn-works.asp http://www.rice.edu/it/network/vpn-how.html http://computer.howstuffworks.com/vpn.htm/printable | |
Posted: 31-January-2009 12:32:42 AM By: jahangir1983 | |
Posted: 31-January-2009 12:33:48 AM By: jahangir1983 The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers. Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice. The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access. | |
Posted: 31-January-2009 04:48:10 AM By: Hash007 For more info http://www.cit.cornell.edu/services/vpn/FAQVPN.html | |
Posted: 31-January-2009 11:32:18 AM By: crouse www.alliancedatacom.com/how-vpn-works.asp - 45k | |
Posted: 01-February-2009 01:02:27 PM By: crouse www.alliancedatacom.com/how-vpn-works.asp - 45k | |
Posted: 02-February-2009 11:34:33 AM By: waqasahmad How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ... for more details www.alliancedatacom.com/how-vpn-works.asp - 45k - | |
Posted: 08-February-2009 06:30:38 AM By: crouse http://www.alliancedatacom.com/how-vpn-works.asp http://www.rice.edu/it/network/vpn-how.html | |
Posted: 16-April-2009 03:09:20 AM By: HamidAliKhan Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k | |
Posted: 14-September-2009 04:17:18 AM By: crouse www.alliancedatacom.com/how-vpn-works.asp | |
Posted: 14-September-2009 04:18:44 AM By: crouse broadbandcorporation.com/hnet/vpn.html |