[2003-12-08] Securing Network Resources
Network attacks are the biggest risk for Windows 2000 servers. Since the release of the old Windows NT 3.1, hackers have been actively looking for bugs in Microsoft Windows operating systems. Tools like SecHole, IISInjector, NAT (NetBIOS Auditing Tool), SMBRelay and L0pthcrack have been developed to reveal passwords, execute actions on a server, forge network connections and degrade system performance. In addition, several critical security vulnerabilities have been recently released for Windows 2000 that can completely expose a network to an intruder.

[2003-12-01] An Intro to SSL VPN
1.1 Introduction In recent years, Virtual Private Networks have become the de facto standard for secure remote access. They enable teleworkers, day extenders and business partners access to corporate network resources across un-trusted networks. Typically, the untrusted network will be the Internet, but VPNs offer excellent flexibility and can also be used across more traditional network mediums such as frame relay or ATM networks. VPNs guarantee the confidentiality and integrity of corporate data through the use of strong encryption and authentication techniques.

[2003-12-01] SSL VPN in Detail
2.1 Benefits As with any security technology, SSL VPN will have to demonstrate tangible business benefit before it will even be considered. The current benefits of SSL VPN were briefly outlined in section 1.2.2, but are discussed in greater detailed below.

[2003-12-01] SSL VPN Deployment Considerations
Now we have discussed some of the advantages to SSL VPNs and have an understanding of how they operate, it is important to look at some of the deployment considerations (or in some ways disadvantages) of SSL VPNs.


Send me relevant info on
products and services.