18 Results for:PPTP

  • Sort by: 

The pros and cons of VPNs for enterprises

By David Jacobs 28 Apr 2023

VPNs use different protocols and encryption to protect data and prevent unauthorized users from accessing company resources. But those protocols come with their own benefits and challenges. Read More

CloudPhysics details virtual machine cost in the cloud

By Eamon McCarthy Earls 04 Oct 2016

This week, bloggers look into virtual machine cost in the cloud, incident response automation and untangling Mac OS X PPTP connections. Read More

VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec

By Lisa Phifer 31 Oct 2006

This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More

Security and the TCP/IP stack

By Michael Gregg 22 Jun 2006

Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Read More

VPNs and remote access quiz

16 Jul 2006

Take this five-question quiz to see how much you've learned about VPNs and remote access. Read More

Wireless attacks, A to Z

10 Apr 2006

In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks ... Read More