10 reasons why IPsec VPN failed
During the discussion around IPsec VPN deployment issues, I heard an idea as follows: 'We have an IPsec VPN, and it is configured to use encryption algorithms. So it's absolutely
System is a fairly wide category, including popular Windows operating systems, how to ghost computers, install Win, fix computer errors, remove viruses, malware, security solutions, servers, network tips
During the discussion around IPsec VPN deployment issues, I heard an idea as follows: 'We have an IPsec VPN, and it is configured to use encryption algorithms. So it's absolutely
In the previous sections we saw how to install DPM 2007, create basic items such as installing an agent (agent) to configure the disk, using the DPM 2007 Administrator Console. In
Today's communication networks often provide only a few types of information services. Meanwhile, the need to exchange information of users is increasing and diverse, requiring
On Windows built-in network diagnostic tool Windows Network Diagnostic. This tool can help you easily identify and solve most network problems.
Microsoft Windows Vista is equipped with some more secure system security layers than Windows XP. In general, this is a good thing. However, these additional security layers
Remote Access (Remote Access) is a very important issue today. As the number of people needing access to information is saved to home and work computers, the ability to access
In the previous part of this series, we introduced the concept of using groups to manage network access, followed by allowing permissions directly to users. We have also explained
Can you place the cursor at the Windows command prompt and run a command on the router? Usually, you will first have Telnet or SSH to connect to the router to be able to execute
When browsing the web and seeing the 'The page cannot be displayed' message (the page cannot be displayed), the network connection may be corrupted. The following methods will
Although we are familiar with the concepts and terms related to Microsoft's Network Access Protection (NAP) and Cisco NAC technologies, we still have to consider the new Network
Recently, we received some emails from readers who wanted to know why most of the articles in this series focused on Windows. To be honest with each individual, there may be
In the first part, we talked about some of Microsoft's previous VPN and VPN protocols. To continue what we have seen in part one, we will give you a description of the network
In the previous two articles of this series on how to create an SSL VPN server on Windows Server 2008, we introduced the basics of VPN connection issues, then went into the
SSL VPN clients need to trust the CA that issued the certificate used by the VPN server. To establish this trust, we need to install the CA certificate that issued the VPN
In the previous part of this series we learned two tricks for remote control scenarios. In the previous section we saw two more script tips. The first tip, remote scripting
Remote Assistance (RA) in Windows Vista includes a number of improvements in connectivity, performance, usability and security, along with a number of other advanced features that
Back in the third part of this series, we developed a simple script called displayTimeZone.vbs to display the current time zone setting on your computer. This article will show
The main Remote Assistance scenario within a corporate network environment is the support of workstations in the corporate network and in a domain. Since most corporate networks
In the previous article of this series we came up with a script called DisplayClassProperties.vbs, which shows the names of the properties of the WMI class. This is what the
In many companies, wireless networks are used to serve many different purposes: for corporate visitors, multimedia traffic from marketing departments to conference rooms and access