When vpn first became popular, it usually require the installation of a dedicated vpn client that bound itself to your computer and its network adapters. It would create a virtual adapter that would allow attachment to the remote network via a separately assigned IP address generated by the firewall the vpn client attached itself to. more
-
Expanding roles of vpn
-
Looking at firewall testing methods
After installing a firewall, connectivity between internal networks and the outside world is likely to be tested extensively. It may not seem like a good idea to try to hack the fruits of your hard labor, the firewall you just built and installed, but testing it for intrusion resistance is a key component of being more
-
Configure proxy servers to filter and protect
In order to effectively use a proxy server, you must configure proxy settings that will govern all aspects of the server operation. The inherent functionality of a proxy is to provide internet connectivity to systems behind a firewall by browsing on their behalf. Beyond that very basic use, there are additional capabilities you can configure more
-
Benefits of Using a Proxy Server
Most of us have heard the term proxy server at least once in the past. The usage of a proxy server has become standard operating procedure for many individuals and companies, as such a device is incredibly useful when it comes to maintaining the security and privacy of a given network. However, there are a more
-
Firewall configuration procedures
A firewall is a device that controls access. The basic concept of the firewall is, that nothing gets through unless you say it does. The primary rule on a firewall should be no access. The other rules then sit on top of that main rule, one by one creating opening s just for the ports more
-
Proxy server configuration choices
The use of a proxy server is more involved than just putting the server in place. It involves making decisions regarding the proxy server configuration and putting those choices into effect. There are several different pieces of proxy server configuration the need to be tweaked in order to make the proxy server work for you more
-
Proxy uses and advantages
The use of a proxy server is certainly not a new concept. Server that run proxy have been around for a long time. In many cases, these are public proxy devices that allow access to anyone who would like to point their browser at them with the intention of anonymously browsing the web. This is more
-
What is a Firewall and what does it do?
You hear about firewalls in reference to computer hacking when you watch espionage movies, but what is a firewall? It is, in essence, a security device that walls off your network from outside intrusion. A firewall exists in front of every corporate network, blocking access to internal resources and acting as a sentry for the more
-
Legitimate Needs For Firewall Traversal
When it comes to cyber security, many people and corporations are justifiably nervous about any type of firewall traversal technology, software, or individual requests for network access. However, firewall traversal is absolutely necessary for certain cross network applications to function, such as VOIP or similar types of web conferencing technology. In addition, accessing a corporate more
-
Configure Proxy Settings? What Is This?
When it comes to cyber security, many of us have heard of the extra protection that proxy servers can provide. If you wish to set up your internet browser to configure proxy servers and their settings, nearly all commonly used browsers today have made this task fairly easy. No longer do you have to have more