Virtual Private Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 12
Abstract
This research is on the implementation of Virtual Private Network (VPN). Owing to the demand at the present time to connect to internal networks from distant locations, the significant of establishing safe links across the network became paramount. Workers frequently require connecting to internal private networks over the Internet which is by nature insecure; accordingly, security becomes a chief thought. Virtual Private Network (VPN) technology provides a way of protecting information being transmitted over the Internet, by allowing users to set up a virtual private to securely enter an internal network, accessing resources, data and communications via an insecure network such as the Internet. This involves a combination of some or all of these features namely: encryption, encapsulation, authorization, authentication, accounting, and spoofing.
Authors and Affiliations
Nnochiri, I. U. , M. Eng.
Corrosion Inhibition of Copper Metal by Prosopis Cineraria Leaves as Green Corrosion Inhibitor in Acidic Medium
Ethanolic extract of Prosopis cineraria leaves(EEPcL) behaves as a green corrosion inhibitor to replace toxic chemicals. The corrosion inhibition of copper in 0.5 N HCl by Prosopis cineraria leaves has been studied by m...
Sensor Based Human Gait Recognition for Drunk State
Many research studies have examined human activity recognition and body posture and gait detection. Relatively fewer studies have investigated specifically into shaky, abnormal gait or how drunken person move in a low l...
Digital Watermarking on Multimedia Application
This paper incorporates the detail investigation of Digital watermarking clarification, idea and the principle commitments in this field, for example, classes of watermarking procedure that show which watermarking techn...
In Bituminous Concrete Mixes Utilization of Waste Plastic Materials
The constant growth in road traffic couple with an inadequate degree of maintenance due to lack of funds has caused a continuous and accelerated deterioration of the road network. To improve this process, numerouskinds...
Review of Integrity Constraint in MySQL
For the semantic correctness of database records, Integrity constraints or data constraints are proper representations of invariant conditions. Constraints can be articulated in declarative languages such as data log, p...