Free Republic
Browse · Search
News/Activism
Topics · Post Article

Don't know a lot about it but heads up if you're still using PPTP at work.
1 posted on 07/29/2012 12:52:44 PM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies ]


To: LibWhacker

I never assume any form of electronic communication is secure.


2 posted on 07/29/2012 12:57:33 PM PDT by null and void (Day 1286 of our ObamaVacation from reality - Heroes aren't made Frank, they're cornered...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: LibWhacker

Since all my servers are Windows 2008 R2, and my clients are running Windows 7, I’ve set SSTP as my standard VPN protocol.

My campus uses Cisco Anywhere Connect, which is OpenSSL, almost the same thing.


4 posted on 07/29/2012 1:13:17 PM PDT by Alas Babylon!
[ Post Reply | Private Reply | To 1 | View Replies ]

To: LibWhacker

WPA has been hackable for quite a while with free tools. Wireless is not secure.


7 posted on 07/29/2012 1:46:04 PM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: LibWhacker

I keep saying I am going to wire for ethernet and give up my tablet, but it’s like a crack addict trying to stop crack for me, evidently.

I just love being able to surf on my ipod & tablet. Dang it.

I wish infrared had made it big... I could install local infrared access points in each room, and be reasonably secure (there is still the issue of light leakage through windows and such, but it would take professional equipment to access that reliably, and a position which I could easily detect a hacker in).

I think the sum total is this: wireless encryption needs to get A LOT BETTER.

Maybe I will setup a VPN which my wireless devices have to access to get to the internet.


10 posted on 07/29/2012 2:46:32 PM PDT by Aqua225 (Realist)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: LibWhacker

I recently implemented an IPSEC host to host capability for a customer. It uses IKE and AES crypto. Both AH and ESP elements. The only down side was network performance is cut in half. Using signed certs for the authentication gives you the ability to lockout unauthorized use bia a CRL.


11 posted on 07/29/2012 3:50:41 PM PDT by Myrddin
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson