Firewalls & VPNs

Last Updated on 21 Nov. 2012, Total: 29 Articles and Tutorials

  1. The Windows Server 2008 Connection Manager Administration Kit

    Taking a look at the Windows Server 2008 CMAK and how you can use it to create secure connectoids for PPTP, L2TP and SSTP remote access VPN client connections... Read More

  2. Secure Socket Tunneling Protocol

    SSTP (Secure Socket Tunneling Protocol) and the VPN capabilities it will offer in future... Read More

  3. Configure a VPN Connection Using Windows XP

    In this article we will learn how to configure a connection to a virtual private network (VPN) using Windows XP. This article will show you how to create a new VPN connection using Microsoft Windows XP. By creating an encryption tunnel through the Internet, data can be passed safely... Read More

  4. Customizing Windows Firewall

    This article looks at the different ways you can customize Windows Firewall when deploying Service Pack 2 for Windows XP. The methods covered include manually configuring Windows Firewall, customizing the Unattend.txt answer file used by unattended setup, customizing the Netfw.inf file that defines the default configuration of Windows Firewall, configuring Windows Firewall using the new firewall context of the netsh... Read More

  5. Personal Firewalls for Remote Access Users

    Administrators of enterprise level networks often don’t pay much attention to the personal firewall market. After all, you need something much more sophisticated to protect your corporate network. But what about the telecommuters and on-the-road executives who connect to your company’s network from remote locations? This article looks at how and why you should develop a policy requiring that remote... Read More

  6. Comparing VPN Options

    Virtual private networking has become necessity for business users who need to remotely access their files. Of course, they could dial in directly to a remote access server, but that solution has a couple of significant drawbacks. The solution, of course, is a VPN connection. This article will discuss the different VPN options available... Read More

  7. Comparing Firewall Features

    In this article, we’ll take a look at some of the factors you should consider when buying a firewall, features available on some of the most popular offerings, and how to compare the real cost of each (hint: the initial purchase price is only a starting point)... Read More

  8. Application Layer Filtering (ALF): What is it and How does it Fit into your Security Plan?

    ALF, not a nickname for Alfred but an acronym for Application Layer Filtering, is one of the hottest new buzzwords in a jargon-laden security subfield: firewall technology. Firewall vendors are rushing to implement ALF into their firewall products, and/or beefing up their ALF implementations to compete with those of other vendors. But exactly what is ALF and is it a... Read More

  9. A firewall in an IT system

    The term “firewall” evokes the image of a solid wall in a building, which prevents a fire spreading from one part of the building to another. Sometimes it is understood as a “wall of fire” blocking the entrance... Read More

  10. Windows 2000 Service Pack 3: Basics and Installation

    SP3 includes a component called Set Program Access and Defaults, which lets end-users to control Microsoft's software like Internet Browsers and Email Clients. This article chronicles the fundamentals you need to know to install it, where to get it from and the changes it makes... Read More