SSL-Explorer Test: An easy VPN with SSL-ExplorerFeb 01, 2006
SSL-Explorer provides an easy, web-based interface for configuring a virtual private network.more »
OpenVPN Workshop: A quick and simple private tunnel with OpenVPNNov 01, 2005
Firewalls sometimes prohibit everything but everyday surfing, leaving users with no hope of running IRC or streaming servers through the firewall, unless they use a virtual private networking tool like OpenVPN.more »
High Availability VPN High Availabilty for VPNsMay 01, 2005
IPSec prevents many of the clever tricks high-availability products employ. We’ll show you a solution that provides transparent backup for IPSec connections.more »
OpenVPN Safe WLAN Networking with an Encrypted OpenVPN TunnelFeb 01, 2005
Wireless networks are practical but dangerous at the same time.WEP encryption is unlikely to stop an attacker. But help is at hand in the form of add-on security measures such as an encrypted OpenVPN tunnel.more »
Go Wireless Intro Wireless Networking in LinuxFeb 01, 2005
When you’re going wireless,it pays to be careful. Get the right hardware,and make sure your network is as secure as you think it is.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives