Design and Implementation of VPN Experiment Based on Windows Server 2012
نویسندگان
چکیده
منابع مشابه
Design and Implementation of Windows Based Computer Forensics Management System
Computer management in campus had always been the core task for computer teachers. With the upgrades of computer equipment and network speed, the network traffic showed a higher pattern than before. However, the students’ perception of computer system safety and intellectual property right did not improve accordingly, which resulted in several information safety issues, and the Internet managin...
متن کاملGraffiti Server — Design and Implementation
While data on file systems and data on the Web have traditionally been organized in a hierarchical structure, tagging has emerged as a viable technology for dealing with large collections of data. Tagging involves attaching descriptive keywords to data objects such as files and URLs. Most current implementations of tagging restrict the scope of tags to the website or application in which they w...
متن کاملImplementation of Wireless VoIP System based on VPN
VoIP isn’t secure since it uses the Internet to which many people connect simultaneously. In this paper, we designed and implemented a Wireless VoIP + VPN system with which secure telephone calls are possible using the open project SIP VoIP Gateway, 'Asterisk' and 'OpenVPN'. Key-Words: VoIP, VPN, SIP, Wireless, Security, WiFi
متن کاملDesign and Implementation of CA/PKI on the Windows Environment
CA and PKI are crucial parts of many secure network applications. In this paper, we present our effort in the design and implementation of CA/PKI on the PC Windows environment. The Borland C++Builder 5 is used as a software tool to develop client and server software while the Microsoft SQL is used to manage X.509v3 certificates stored at CA. Our CA server is also equipped with a proprietary har...
متن کاملDesign, Implementation and Performance Evaluation of IP-VPN
Network security has always been a significant issue, but a recognized priority today due to the popular of internet. The issue is not if security should be implemented on a network; rather, the question to ask is if security has been implemented properly and the interoperability with today’s network architecture. Although there are various ways to perform a secure network environment, but the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Application
سال: 2017
ISSN: 2161-8801,2161-881X
DOI: 10.12677/csa.2017.78091