How does VPN work ?
ngnguru_com 27-January-2009 07:07:05 PM

Comments


broadbandcorporation.com/hnet/vpn.html
Posted by crouse


www.alliancedatacom.com/how-vpn-works.asp
Posted by crouse


Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by HamidAliKhan


http://www.alliancedatacom.com/how-vpn-works.asp

http://www.rice.edu/it/network/vpn-how.html

Posted by crouse


How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ...
for more details
www.alliancedatacom.com/how-vpn-works.asp - 45k -
Posted by waqasahmad


www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse


www.alliancedatacom.com/how-vpn-works.asp - 45k
Posted by crouse


For more info

http://www.cit.cornell.edu/services/vpn/FAQVPN.html
Posted by Hash007


The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers.

Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice.
The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access.
Posted by jahangir1983



Posted by jahangir1983



Posted: 28-January-2009 12:54:58 AM By: sagitraz

Please visit following links for detail information:

http://www.alliancedatacom.com/how-vpn-works.asp

http://www.rice.edu/it/network/vpn-how.html

http://computer.howstuffworks.com/vpn.htm/printable

Posted: 31-January-2009 12:32:42 AM By: jahangir1983


Posted: 31-January-2009 12:33:48 AM By: jahangir1983

The easiest way an individual can gain access to a Rice computer is by stealing a password that is transmitted through the Internet in readable form, or cleartext, from a remote user to a Rice computer. Attackers steal passwords using sophisticated programs, called sniffers, that analyze all of the data passing by a compromised computer and produce lists of computer names, userids, and cleartext passwords. Passwords can also be stolen by programs called Trojan horses that mimic a computer's normal login sequence. (Note that password theft is a violation of Texas law.) Armed with the valid userid and password, the attacker can simply log in and then attempt to gain control of the computer. An attacker who installs a sniffer at a busy network exchange point or a Trojan horse in a popular web service may be able to gain access to thousands of computers.

Rice's VPN is built around Cisco Systems 3000 Concentrator. A small client program (VPN 3000 Client) runs in the remote user's Windows, MacOS, Solaris, or Linux computer. The 3000 and client implement the Internet IPSEC protocol (Internet Protocol SECurity) to establish an encrypted pathway or tunnel to Rice.
The gateway authenticates the remote user's identity through the use of passwords. The remote user's identity determines that user's membership in a VPN group that, in turn, determines what Internet sites will be accessed through the tunnel. Because the Rice end of the tunnel is assigned a Rice Internet address, sites accessed by the remote user through the tunnel will appear to be accessed from Rice instead of from the remote user's Internet access.

Posted: 31-January-2009 04:48:10 AM By: Hash007

For more info

http://www.cit.cornell.edu/services/vpn/FAQVPN.html

Posted: 31-January-2009 11:32:18 AM By: crouse

www.alliancedatacom.com/how-vpn-works.asp - 45k

Posted: 01-February-2009 01:02:27 PM By: crouse

www.alliancedatacom.com/how-vpn-works.asp - 45k

Posted: 02-February-2009 11:34:33 AM By: waqasahmad

How Virtual Private Networks Work. by Jeff Tyson .... That's essentially how a VPN works. Each remote member of your network can ...
for more details
www.alliancedatacom.com/how-vpn-works.asp - 45k -

Posted: 08-February-2009 06:30:38 AM By: crouse

http://www.alliancedatacom.com/how-vpn-works.asp

http://www.rice.edu/it/network/vpn-how.html

Posted: 16-April-2009 03:09:20 AM By: HamidAliKhan

Follow the link for more info www.alliancedatacom.com/how-vpn-works.asp - 45k

Posted: 14-September-2009 04:17:18 AM By: crouse

www.alliancedatacom.com/how-vpn-works.asp

Posted: 14-September-2009 04:18:44 AM By: crouse

broadbandcorporation.com/hnet/vpn.html