SERVER VPN BERBASISKAN LINUX DENGAN CLIENT WINDOWS XP SP2

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Windows XP Kernel Crash Analysis

PC users have started viewing crashes as a fact of life rather than a problem. To improve operating system dependability, systems designers and programmers must analyze and understand failure data. In this paper, we analyze Windows XP kernel crash data collected from a population of volunteers who contribute to the Berkeley Open Infrastructure for Network Computing (BOINC) project. We found tha...

متن کامل

Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP

These days, commodity-off-the-shelf (COTS) hardware and software are used to build high-end and powerful workstations and servers to be deployed in today’s local area networks of private homes and smallto medium-sized business. Typically, these servers are multipurpose and shared running networking functionalities involving IP packet forwarding in addition to other CPU intensive applications. I...

متن کامل

Windows XP annoyances - tips, secrets and solutions

When writing can change your life, when writing can enrich you by offering much money, why don't you try it? Are you still very confused of where getting the ideas? Do you still have no idea with what you are going to write? Now, you will need reading. A good writer is a good reader at once. You can define how you write depending on what books to read. This windows 7 annoyances tips secrets and...

متن کامل

Linux NFS Client Write Performance

We introduce a simple sequential write benchmark and use it to improve the Linux NFS client’s write performance. We reduce the latency of the write() system call, improve SMP write performance, and reduce kernel CPU processing during sequential writes. Memory write throughput to NFS files improves by more than a factor of three.

متن کامل

Windows and Linux Security Audit

The security audit in operating system is necessary, especially when there are multiple users using it or when the system is part of a company’s network. Before heading into the security audit, you have to be aware of the fundamentals of IT security auditing, whose main objective is to assure protection of the information assets and to dispense information properly to authorized parties. In ord...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: TELKOMNIKA (Telecommunication Computing Electronics and Control)

سال: 2006

ISSN: 2302-9293,1693-6930

DOI: 10.12928/telkomnika.v4i1.1239