13 Results for:L2TP
- Sort by:
The pros and cons of VPNs for enterprises
28 Apr 2023VPNs use different protocols and encryption to protect data and prevent unauthorized users from accessing company resources. But those protocols come with their own benefits and challenges. Read More
Mandiant: JumpCloud breach led to supply chain attack
24 Jul 2023Mandiant researchers attribute the supply chain attack to a North Korean threat actor that abused JumpCloud's commands framework to gain access to a downstream customer. Read More
Microsoft fixes EoP zero-day on January Patch Tuesday
11 Jan 2023On the first Patch Tuesday of 2023, Microsoft fixed an elevation of privilege vulnerability in Windows Advanced Local Procedure Call, which has been actively exploited in the wild and may be co-opted into ... Read More
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
31 Oct 2006This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More
Evaluate if Chromebooks are secure enough for business use
13 Sep 2021Chromebooks are cost-effective endpoints that strip away desktop features for a simple desktop experience. Admins should evaluate if these endpoints are secure enough. Read More
How to use Java printf to format output
06 Aug 2022Learn by example how format output with the Java printf method. If you want to format dates, times, integers, doubles and Strings in the text you output to the console, logs or streams, you'll need ... Read More
The VPN Expert: VPN client alternatives, part 4 -- IPsec
10 Dec 2002Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Read More