18 Results for:PPTP
- Sort by:
The pros and cons of VPNs for enterprises
28 Apr 2023VPNs use different protocols and encryption to protect data and prevent unauthorized users from accessing company resources. But those protocols come with their own benefits and challenges. Read More
CloudPhysics details virtual machine cost in the cloud
04 Oct 2016This week, bloggers look into virtual machine cost in the cloud, incident response automation and untangling Mac OS X PPTP connections. Read More
VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec
31 Oct 2006This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More
Security and the TCP/IP stack
22 Jun 2006Each layer of TCP/IP has security mechanisms, protocols, and applications. This tip describes the more popular ones that are associated with each layer of TCP/IP. Read More
VPNs and remote access quiz
16 Jul 2006Take this five-question quiz to see how much you've learned about VPNs and remote access. Read More
Wireless attacks, A to Z
10 Apr 2006In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks ... Read More