Zeitschriftenartikel zum Thema „VPN“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: VPN.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "VPN" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Kazén, Miguel. „Problemessen vs. Spaßessen“. Zeitschrift für Gesundheitspsychologie 14, Nr. 2 (April 2006): 34–45. http://dx.doi.org/10.1026/0943-8149.14.2.34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Zusammenfassung. Das Zusammenspiel von negativem Affekt und nachfolgender Affektregulation auf das Essverhalten wurde mit 70 Versuchspersonen (Vpn) experimentell untersucht. Nach einer Imaginationsinduktion von negativem Affekt wurden die Vpn in eine positive oder in eine negative Selbstaktivierungsgruppe eingeteilt. Die Diätintention der Probanden wurde durch eine “Neujahrsvorsatz-Methode“ erfasst. Es ergaben sich folgende Interaktionen zwischen Selbstaktivierung und Diätintention: (a) Vpn mit negativer Selbstaktivierung und niedriger Diätintention aßen mehr Schokolade als Vpn in allen anderen Bedingungen. (b) Vpn mit positiver Selbstaktivierung und hoher Diätintention aßen mehr Kekse als Vpn in allen anderen Bedingungen. Die Befunde sind nicht mit der Hypothese von Tice, Bratslavsky und Baumeister (2001) vereinbar, die eine einfache Beziehung zwischen negativem Affekt und nachfolgendem Verlust der Impulskontrolle beim Essen postulierten. Es gab darüber hinaus positive Korrelationen zwischen der Menge der verzehrten Schokolade und Persönlichkeitsdispositionen mit Beziehung zu Depressivität. Implikationen der Befunde für eine Diät und die Gesundheit werden diskutiert.
2

Leutner, Detlev, Anke Barthel und Beate Schreiber. „Studierende können lernen, sich selbst zum Lernen zu motivieren: Ein Trainingsexperiment“. Zeitschrift für Pädagogische Psychologie 15, Nr. 3/4 (November 2001): 155–67. http://dx.doi.org/10.1024//1010-0652.15.34.155.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Zusammenfassung: Sechsundsechzig Studierende nahmen an einem computer-basierten Training motivationaler Lernstrategien teil. Gegenstand des Trainings war eine Strategie, eine Lernabsicht zu entwickeln, indem man sich den persönlichen Nutzen des zu erwerbenden Wissens verdeutlicht. Die Vpn erhielten (1) kein spezifisches Training, (2) nur ein Training der motivationalen Lernstrategie oder (3) ein kombiniertes Training der Lernstrategie und darauf bezogener Selbstregulation. Nach dem Training bearbeiteten die Vpn einen Lehrtext, den sie zuvor als weniger motivierend beurteilt hatten. Es wurde erhoben, inwieweit die Vpn die Trainingsinhalte zur Anwendung brachten, welches Motivationsniveau sie bei Anwendung der gelernten Strategie erreichten und wie viel Wissen sie aus der Bearbeitung des Textes gewannen. Die Vpn des kombinierten Trainings schnitten hinsichtlich aller drei Variablen besser ab als die Vpn des Lernstrategietrainings und die Vpn ohne Training, und die Vpn des Lernstrategietrainings schnitten ebenfalls besser ab als die Vpn ohne Training. Die Ergebnisse entsprechen aktuellen Theorien des Trainings von Lernstrategien, die davon ausgehen, dass es sinnvoll ist, neben der Vermittlung von Wissen über einzelne Lernstrategien auch den zielführenden Einsatz der jeweiligen Lernstrategie zu trainieren.
3

Kempter, Guido, und Carsten Möller. „Beurteilung einzelner Stimuli des Ausdrucksverhaltens ohne ihre entsprechenden Kontext- und Begleitmerkmale“. Zeitschrift für Sozialpsychologie 31, Nr. 2 (Juni 2000): 102–12. http://dx.doi.org/10.1024//0044-3514.31.2.102.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Zusammenfassung: Die Untersuchung galt der Frage, welche Bedeutung ausschließlich den Körper- und Gliederbewegungen des Menschen in face-to-face Situationen bei der Eigenschaftsattribution zukommt. Hierzu wurde das Verfahren der Skriptanimation eingesetzt, womit sich die entsprechenden Bewegungen von anderen normalerweise zur Verfügung stehenden Informationen isolieren und auf eine Computerpuppe übertragen lässt. Insgesamt 153 Versuchspersonen nahmen an drei Versuchsreihen teil und beurteilten nacheinander 12 verschiedene Fernsehakteure: 55 Vpn beurteilten die Originalaufzeichnung der Akteure; 33 Vpn beurteilten die originalgetreu reanimierten Körper- und Gliederbewegungen der Darsteller; 65 Vpn beurteilten die im Bewegungsablauf modifizierten Animationen. Als Beurteilungsinstrument wurden Ratingskalen eingesetzt. Die Ergebnisse veranschaulichen, dass die Eliminierung bzw. Konstanthaltung aller Begleit- und Kontextinformationen keinen systematischen Einfluss auf die Eigenschaftsattributionen ausübte. Andererseits genügten bereits kleine Modifikationen im Bewegungsablauf der Kopf- und Rumpfbewegungen, damit sich das Bild, das sich die Vpn von den dargestellten Personen machten, auf nahezu allen Urteilsskalen entweder verbesserte oder verschlechterte. Die Ergebnisse werden mit Erkenntnissen aus Multikanalanalysen nonverbalen Verhaltens in Zusammenhang gebracht.
4

Lee, Min-Seong, Jee-Tae Park, Ui-Jun Baek, Jung-Woo Choi und Myung-Sup Kim. „Importance Analysis of Traffic Statistics Information for VPN/NoN-VPN Classification“. Journal of Korean Institute of Communications and Information Sciences 47, Nr. 11 (30.11.2022): 1768–75. http://dx.doi.org/10.7840/kics.2022.47.11.1768.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Anbalagan, Srivishnupriya, Elyse Cooper, Pat Klumper, Randy R. Simonson und Ben M. Hause. „Whole genome analysis of epizootic hemorrhagic disease virus identified limited genome constellations and preferential reassortment“. Journal of General Virology 95, Nr. 2 (01.02.2014): 434–41. http://dx.doi.org/10.1099/vir.0.059659-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Epizootic hemorrhagic disease virus (EHDV) is a Culicoides transmitted orbivirus that causes haemorrhagic disease in wild and domestic ruminants. A collection of 44 EHDV isolated from 2008 to 2012 was fully sequenced and analysed phylogenetically. Serotype 2 viruses were the dominant serotype all years except 2012 when serotype 6 viruses represented 63 % of the isolates. High genetic similarity (>94 % identity) between serotype 1 and 2 virus VP1, VP3, VP4, VP6, NS1, NS2 and NS3 segments prevented identification of reassortment events for these segments. Additionally, there was little genetic diversity (>96 % identity) within serotypes for VP2, VP5 and VP7. Preferential reassortment within the homologous serotype was observed for VP2, VP5 and VP7 segments for type 1 and type 2 viruses. In contrast, type 6 viruses were all reassortants containing VP2 and VP5 derived from an exotic type 6 with the remaining segments most similar to type 2 viruses. These results suggest that reassortment between type 1 and type 2 viruses requires conservation of the VP2, VP5 and VP7 segment constellation while type 6 viruses only require VP2 and VP5 and are restricted to type 2-lineage VP7. As type 6 VP2 and VP5 segments were exclusively identified in viruses with type 2-derived VP7, these results suggest functional complementation between type 2 and type 6 VP7 proteins.
6

Kher, Bhushan, Preeti Karmore, Nutan Sonwane, Amol Gahane, Nitin Meshram, Kartik Ghagre, Himanshu Nandekar und Sonal Borkar. „Apnavpn Project“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 4 (30.04.2022): 1828–29. http://dx.doi.org/10.22214/ijraset.2022.41646.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Abstract: A VPN is an essential tool for securing your personal data and protecting your privacy online. We’ve put together the ultimate guide to VPNs to show you what a VPN does, how VPNs work, and how they protect you. Learn how to choose the right VPN, or secure your privacy right now by downloading our own powerful and lightning-fast VPN app. A VPN works by using encryption protocols to funnel all your internet traffic through an encrypted tunnel a virtual private network between your computer and a remote VPN server. This hides your IP address and secures your data, preventing others from intercepting it. Without a VPN, all your internet traffic is potentially exposed to your internet service provider (ISP), the government, advertisers, or other people on your network. That’s why VPN connections boost your privacy and security online. VPN is virtual because it’s created digitally there isn’t a physical cable that reaches from your device directly to the VPN server.
7

Mardianto, Mardianto. „Analisis Quality Of Service (QoS) pada Jaringan VPN dan MPLS VPN Menggunakan GNS3“. Jurnal Sains dan Informatika 5, Nr. 2 (01.12.2019): 98–107. http://dx.doi.org/10.34128/jsi.v5i2.191.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The ever-increasing internet is an ISP challenge for the future of the expected global computer network traffic and QoS needs. To maintain competitive ISPs in Indonesia with the development of internet usage, the demand for QoS must be increased. MPLS VPN networks combine layer 2 switching technology with layer 3 routing technology. MPLS VPN networks have emerged as technologies that meet VPN requirements such as private IP, and the ability to support overlapping addresses in resolving speed and QoS problems. The method used is experimental research. From the measurement results obtained by VPN and MPLS VPN network delay has a very good delay value. For throughput on VPN networks have medium quality and MPLS VPN networks have good quality. And for the packet loss value for both types of networks is 0%. This shows that MPLS VPN network throughput has better QoS while for delay and packet loss on VPN and MPLS VPN networks have the same quality value.
8

Zelenkina, A. S., E. A. Pavlyukevich und A. V. Ponachugin. „VPN: USE, SECURITY, RISKS“. ITNOU: Information technologies in science, education and management 1, Nr. 19 (Dezember 2022): 45–48. http://dx.doi.org/10.47501/itnou.2022.1.45-48.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
In this article, we will look at some ways to connect to the Internet, one of which is a VPN. You will learn the history of its creation, how it functions and how safe its use is. Also, the article discusses some laws concerning the use of this service and what consequences its use in everyday life may have.
9

Zhang, Zhensheng, Ya-Qin Zhang, Xiaowen Chu und Bo Li. „An Overview of Virtual Private Network (VPN): IP VPN and Optical VPN“. Photonic Network Communications 7, Nr. 3 (Mai 2004): 213–25. http://dx.doi.org/10.1023/b:pnet.0000026887.35638.ce.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Anwar, Rian Septian, und Nani Agustina. „Implementasi dan Analisa Kinerja Jaringan Wide Area Network dengan Open VPN-Access Server“. INFORMATICS FOR EDUCATORS AND PROFESSIONAL : Journal of Informatics 4, Nr. 2 (02.06.2020): 143. http://dx.doi.org/10.51211/itbi.v4i2.1307.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Abstrak: Meningkatnya penggunaan internet di dunia, membuat trafik internet menjadi tinggi. Kebutuhan akan interkoneksi antar jaringan yang meningkat terutama pada perusahaan yang mempunyai banyak cabang. Oleh karena itu perusahaan dituntut untuk mengeluarkan budget lebih banyak lagi. Untuk meredam pengeluaran yang terlalu berlebih maka dibutuhkan dibutuhkan sebuah jaringan Virtual Private Network (VPN). Dengan memanfaatkan Open VPN-Access Server biaya yang dikeluarkan lebih murah dibandingkan dengan sewa VPN-IP yang relatif lebih mahal biayanya. Untuk jaringan yang lebih baik, maka harus ditopang dengan struktur topology terbaik menurut pemasangannya. Pemilihan topology pada awal pembangunan jaringan sangat penting untuk membuat akses Virtual Private Network (VPN) ini terkoneksi dengan baik. Kata kunci: VPN, Jaringan, Open VPN-Acces Server. Abstract: The increasing use of the internet in the world, making internet traffic become high. The need for interconnection between networks is increasing in companies with many branches. Therefore companies are required to spend even more budget. To reduce excess expenditure, a Virtual Private Network (VPN) is needed. By utilizing Open VPN-Server Access that is issued is cheaper compared to VPN-IP leases that are relatively more expensive. For better tissue, it must be supported by the best topological structure according to installation. The choice of topology at the beginning of network development is very important to make this Virtual Private Network (VPN) access well connected. Keywords: VPN, Networking, Open VPN-Acces Server.
11

Liu, Zai Ying, Ping Yang und Li Xiao Zhang. „Research of Typical VPN Network Management Mechanisms“. Applied Mechanics and Materials 380-384 (August 2013): 2510–14. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2510.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.
12

Mohd Fuzi, Mohd Faris, Mohamad Ridzuan Mohd Alias, Naginder Kaur und Iman Hazwam Abd Halim. „SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network“. Journal of Computing Research and Innovation 6, Nr. 4 (20.09.2021): 90–101. http://dx.doi.org/10.24191/jcrinn.v6i4.230.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet. VPNs can be used to shield users’ browsing activity and encrypts data transmitted over the network to prevent sniffing attack. Nowadays, users can either pay a premium price for a good VPN service or risk their privacy using free browser-based VPN. Thus, SafeSearch is developed to address these issues in mind. With SafeSearch, users will not need to fork out a lot of money for premium VPN subscription services or expose themselves to targeted advertising when utilising free browser-based VPN. In this study, open VPN protocol was used to create the VPN server on a microcomputer called Raspberry Pi. The software used was mostly open-source except for the VPN client. Obfuscation technique was used to hide VPN traffic by disguising it as just another normal Internet traffic against Deep Packet Inspection when passing through firewall. After the VPN server was established, tests were carried out to evaluate the functionality and reliability of the VPN server in “real-world” environment. The tests conducted were network restriction penetration assessment, network performance and user acceptance test. Penetration assessment result showed that SafeSearch is capable of bypassing web filtering and deep packet inspection. Network performance during SafeSearch connection has slight latency and bandwidth decline, although it is not overly affected. The outcome of the user acceptance test was positive as the majority of participants of the study were confident that SafeSearch can secure their connection and protect their privacy when browsing the web. To conclude, both objectives of this project were fully achieved and the scope of study was followed thoroughly.
13

Kempter, Guido. „Scriptanimation. Methode zur Beschreibung und Darstellung natürlicher menschlicher Bewegungen“. Experimental Psychology 46, Nr. 2 (April 1999): 129–34. http://dx.doi.org/10.1026//0949-3964.46.2.129.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Zusammenfassung. Das Verfahren zur Scriptanimation wird als eine neue Methode zur originalgetreuen Beschreibung und Nachbildung natürlicher menschlicher Körperbewegungen vorgestellt. Es basiert auf einem Verfahren zur Erstellung von Bewegungsscripts nach biomechanischer Taxonomie und einer Rechnerschnittstelle, welche die Daten des Scripts auf die geometrischen Segmente eines Computermodells überträgt. In einem Anwendungsbeispiel wurden die gestischen Bewegungen von 59 Politikern, wie sie in Nachrichtensendungen zu sehen waren, mit diesem Verfahren reanimiert. 84 Vpn betrachteten das Original und 36 Vpn die Reanimation. Gleichzeitig wurden die psychophysiologischen Reaktionen der Probanden erfasst. Der Vergleich physiologischer Parameter zeigt eine sehr große Ähnlichkeit in der vegetativen Bewertung.
14

Jaafar, Fauziah Mohd, Houssam Attoui, Peter P. C. Mertens, Philippe de Micco und Xavier de Lamballerie. „Structural organization of an encephalitic human isolate of Banna virus (genus Seadornavirus, family Reoviridae)“. Journal of General Virology 86, Nr. 4 (01.04.2005): 1147–57. http://dx.doi.org/10.1099/vir.0.80578-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Banna virus (BAV) is the type species of the genus Seadornavirus within the family Reoviridae. The Chinese BAV isolate (BAV-Ch), which causes encephalitis in humans, was shown to have a structural organization and particle morphology reminiscent of that of rotaviruses, with fibre proteins projecting from the surface of the particle. Intact BAV-Ch virus particles contain seven structural proteins, two of which (VP4 and VP9) form the outer coat. The inner (core) particles contain five additional proteins (VP1, VP2, VP3, VP8 and VP10) and are ‘non-turreted’, with a relatively smooth surface appearance. VP2 is the ‘T=2’ protein that forms the innermost ‘subcore’ layer, whilst VP8 is the ‘T=13’ protein forming the core-surface layer. Sequence comparisons indicate that BAV VP9 and VP10 are equivalent to the VP8* and VP5* domains, respectively, of rotavirus outer-coat protein VP4 (GenBank accession no. P12976). VP9 has also been shown to be responsible for virus attachment to the host-cell surface and may be involved in internalization. These similarities reveal a previously unreported genetic link between the genera Rotavirus and Seadornavirus, although the expression of BAV VP9 and VP10 from two separate genome segments, rather than by the proteolytic cleavage of a single gene product (as seen in rotavirus VP4), suggests a significant evolutionary jump between the members of these two genera.
15

Fan, Ya Qin, Ling Lv, Mei Lin Liu und Fei Xie. „Improvements Based on the IPSec VPN Secuirity“. Advanced Materials Research 756-759 (September 2013): 2693–97. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2693.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec VPN has improved the safety performance of data transmission, it at the same time affects the transmission efficiency. By analyzing the problems of IPSec VPN, in terms of improving safety performance, the combination of PKI and IPSec VPN program was proposed. Theoretical analysis shows that such program can indeed solve the problem of authentication imperfect, thus improving the safety performance of the network.
16

Mahardiyanto, Muliatama Putra. „Analysis of PPTP and L2TP/ IPSEC VPN Network Security Performance for FTP Server at State Polytechnic of Malang“. Jurnal Jartel: Jurnal Jaringan Telekomunikasi 3, Nr. 2 (07.11.2016): 26–32. http://dx.doi.org/10.33795/jartel.v3i2.217.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Data exchange communication has developed that leads to centralized communication, and to realize this communication, a type of data communication is needed whose data is stored on a server and can be accessed by clients, such as at the Malang State Polytechnic. As an institution engaged in the world of education, the development of data communication is centralized by utilizing the established intranet network. The use of an intranet network allows for data communication that is vulnerable to eavesdropping. To overcome this, use a VPN network. PPTP VPN and L2TP/IPsec VPN have different performances, especially in the level of security provided. In this study, the performance analysis of the PPTP VPN and L2TP/IPsec VPN networks was carried out which was implemented on an FTP Server on a Raspberry Pi server and a Mikrotik router for the VPN configuration. In this study, we designed PPTP VPN and L2TP/IPsec VPN by configuring the Mikrotik RB9412nD-TC router and configuring FTP Server using the proftpd application on the Raspberry Pi server. For security analysis using hacking method to get VPN Server login data and sniffing method to get FTP Server login data, FTP data. For performance analysis using parameters delay, throughput, and packet loss.
17

Rahman, Taufik, Giovanni Maria Vianney Tobia Mariatmojo, Hafis Nurdin und Herman Kuswanto. „Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi“. Teknika 11, Nr. 2 (01.07.2022): 138–47. http://dx.doi.org/10.34148/teknika.v11i2.482.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik dan kemudahan, kecepatan pertukaran data bisa di implementasikan sehingga dapat menjadi suatu nilai lebih. VPN dapat terjadi antara dua PC atau bisa juga antara dua atau lebih jaringan yang berbeda. VPN dapat dibentuk dengan menggunakan teknologi tunneling dan encryption. Server OpenVPN menghasilkan profil jaringan terenkripsi, kemudian semua pengguna dapat membentuk jaringan VPN dan mereka dapat menggunakan layanan organisasi seolah-olah mereka secara geografis berada di tempat yang sama, konfigurasi ini juga memungkinkan penggunaan layanan atau aplikasi eksternal apa pun tanpa memengaruhi keamanan organisasi, VPN dapat berjalan pada IPv6 dan IPv4, dengan kelebihan yang banyak OpenVPN melintasi NAT (Network Address Translation). Jaringan VPN ini dibuat untuk memudahkan pekerja yang sedang melaksanakan aktivitas WFH (Work From Home) VPN sebuah koneksi virtual yang bersifat private dan tidak semua orang bisa mengaksesnya. Implementasi VPN dapat mempermudah komunikasi data jarak jauh tanpa khawatir ada tabrakan data, karena dengan menggunakan jaringan virtual ini dapat terhubung secara bersamaan. Dengan VPN, pengguna mempunyai keamanan data yang lebih dibandingkan dengan menggunakan jaringan lokal biasa. Ketika pengguna terhubung ke jaringan VPN maka akan mempunyai IP yang berbeda dengan IP Physical dibuktikan dengan tool tracert terlihat IP dan hoop. Raspberry Pi berfungsi untuk membuat sertifikat VPN client, karena fungsi tersebut tidak digabungkan ke dalam VPS Server karena masalah keamanan jaringan.
18

Chen, Jianyun, und Chunyan Li. „Research on meteorological information network security system based on VPN Technology“. MATEC Web of Conferences 232 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201823201001.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
In this paper, the concept of VPN and the security technology are studied. In combination with the characteristics of the network, the security technology of the remote access VPN server and the client is discussed, the VPN security system of the meteorological special network is designed, and the VPN network security system of the meteorological network is realized.
19

Fan, Ya Qin, Hao Fan und Chao Sun. „OPNET-Based Computer Simulation of MPLS VPN Security Solutions“. Applied Mechanics and Materials 40-41 (November 2010): 361–65. http://dx.doi.org/10.4028/www.scientific.net/amm.40-41.361.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This paper features of IPSec and MPLS technologies, proposes a suitable MPLS VPN security solutions. The program to solve the VPN using MPLS backbone network in the public transport there is a second layer of information can not automatically encrypt, or connect easily made because of errors due to the interruption of information disclosure and other issues. To verify the proposed security program, the actual MPLS VPN can be simplified, abstracestablishing a simulation system MPLS VPN, and using OPNET simulation software simulation, simulation results of VPN officers practical reference value.
20

Haeruddin, Haeruddin, und Kelvin Kelvin. „Analisa Penggunaan VPN L2TP dan SSTP di Masa Pandemi Covid-19“. Jurnal Ilmu Komputer dan Bisnis 13, Nr. 1 (01.05.2022): 105–14. http://dx.doi.org/10.47927/jikb.v13i1.279.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
COVID-19 merupakan sebuah virus yang telah berkembang menjadi pandemi global. Hal ini menyebabkan jutaan karyawan di seluruh dunia saat ini bekerja dari rumah. Virtual Private Network (VPN) dapat digunakan untuk memberikan karyawan akses data kantor dari rumah. Penelitian ini menganalisa perbedaan protokol VPN L2TP/IPsec dengan SSTP untuk memilih teknologi VPN yang cocok digunakan sesuai kebutuhan pengguna. Hal ini dilakukan dengan cara membangun jaringan VPN tersebut dengan parameter kebutuhan perangkat, QoS, keamanan, dan skalabilitas dengan menggunakan metode Network Development Life Cycle (NDLC). Hasil dari penelitian ini menunjukkan bahwa kedua jenis VPN tersebut memiliki kelebihan dan kekurangannya masing-masing dari segi performa, keamanan dan skalabilitas. Hasil penelitian ini diharapkan dapat memberikan gambaran kepada pengguna untuk mempertimbangkan jenis VPN yang sesuai dengan kebutuhan.
21

Fan, Ya Qin, Sheng Sheng Qian und Feng Shan Liang. „VPN Security Technology Theory Modeling and Simulation“. Applied Mechanics and Materials 135-136 (Oktober 2011): 1114–19. http://dx.doi.org/10.4028/www.scientific.net/amm.135-136.1114.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
In order to authenticate users and to strictly control the only authorized users can access VPN address and biling functions to provide audit expenses such problems, the paper established a theoretical model of VPN security technologies, the use of OPNET simulation tool for safety and technical performance of the VPN the simulation results of VPN security professionals with practical reference value.
22

Ariyadi, Tamsir, und Muhamad Agung Prabowo. „Perbandingan Kinerja Virtual Private Network Antara Vpn Tunnel Dan Internet Protocols Security“. INOVTEK Polbeng - Seri Informatika 6, Nr. 1 (15.06.2021): 80. http://dx.doi.org/10.35314/isi.v6i1.1698.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Dibutuhkannya komunikasi dalam menunjang interaksi antar perusahaan yang memiliki kaitan yang sangat erat terhadap perkembangan teknologi informasi melalui jaringan komputer. Virtual Private Network atau biasa disebut VPN memiliki peran penting dalam perkembangan sistem keamanan dalam jaringan internet, terutama dalam membatasi hak akses terhadap server, database, dan sejenisnya dalam meminimalisir terjadinya akses illegal terhadap data-data penting perusahaan. VPN memiliki beberapa tipe salah seperti VPN Tunnel dan IPSec, VPN Tunnel memiliki konsep yang lebih sederhana dibandingkan dengan IPSec karena dapat menghubungkan server dan client secara remoteaccess yang hanya membutuhkan 1 router saja yang terhubung pada sisi server. IPSec memiliki tingkat keamanan yang lebih tinggi dibandingkan dengan VPN Tunnel dengan jalur komunikasi dilengkapi dengan kriptografi. IPSec yang berjalan pada L2TP memiliki tingkat kinerja yang lebih baik dibandingkan VPN Tunnel berdasarkan hasil yang telah di dapatkan, karena konsep yang mengharuskan router terkoneksi secara point-to-point. Kata Kunci - Virtual Private Network (VPN), IPSec, Tunneling, Quality of Service, Peformance
23

Supriyanto, Bambang, und Suharyanto Suharyanto. „Perancangan Jaringan VPN Menggunakan Metode Point To Point Tunneling Protocol“. Jurnal Teknik Komputer 5, Nr. 2 (01.08.2019): 235–40. http://dx.doi.org/10.31294/jtk.v5i2.5452.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
PT. Hail Otis Logistics is a Forwarding and Expedition Company that provides Custom Clearence Export and Import services as well as Shipping or Delivery from Partner Companies to Tanjung Priuk Port and vice versa. Currently PT. Hail Otis Logistics is sending company data using e-mail, so the company cannot yet ensure the security of the data sent. Due to the company's problems, designing a VPN is a means of communicating and transferring data securely and maintaining data validity. In this study VPN was built using the PPTP (Point To Point Tunneling Protocol) method to build a VPN network at PT. Hail Otis Logistics. Use PPTP because this method uses a protocol that allows point to point relationships that pass through the IP network. Results obtained in VPN development at PT. Hail Otis Logistics are VPN networks that can connect between headquarters and branch offices to transfer data safely. VPN development can provide security with encryption in every data communication.Keywords: PPTP, Network, VPN
24

Mohammed, Subhi Aswad. „Performance Analysis of Volume Loads of (Services and Transmission) Traffic in VPN Networks: A Comparative Study“. Al-Nahrain Journal for Engineering Sciences 22, Nr. 4 (20.12.2019): 283–93. http://dx.doi.org/10.29194/njes.22040283.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This paper proposes a design for a network connected over public networks using Virtual Private Network (VPN) technique. The network consists of five sites; center server and four customer service sites, each site consists of a number of LANs depending on the user services requirements. This work aims to measure the effect of VPN on the performance of a network. Four approaches are implements: Network design without using VPN, network design using VPN with centralized servers, network design using VPN with distributed servers, and network design using server load balance.The OPNET and BOSON simulation results show higher response time for packet transmission due to effect of VPN tunneling. The concurrent activation of application execution is used as a solution to the delay problem of the initial timing period while the application proceeds. The results dealing with QoS are E-mail, FTP, voice services traffic and IP traffic dropped. The VPN Tunnels is in the range of (0.01 to 0.02) sec.; along with this simulator there are four VPN tunnels in the network. Also, a special server’s load balance is used to manage distribution of the server processing load across all other network servers to achieve the best response
25

Novanto, Mukhammad Rizki, Joseph Dedy Irawan und F. X. Ariwibisono. „RANCANG BANGUN PANEL VIRTUAL PRIVATE NETWORK (VPN) BERBASIS WEB“. JATI (Jurnal Mahasiswa Teknik Informatika) 6, Nr. 1 (12.03.2022): 259–66. http://dx.doi.org/10.36040/jati.v6i1.4615.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Tidak bisa dipungkiri semenjak pandemi virus Covid-19 kegiatan internet terus menjadi bertambah. Semacam halnya bekerja dari rumah memakai internet, belajar daring memakai internet, komunikasi social media memakai internet, belanja online di pasar online dengan internet, sampai mencari data lewat internet. Kebutuhan internet terus menjadi bertambah, tidak hanya harga virtual private server yang disediakan provider lokal relatif mahal serta instalasi sampai operasional membutuhkan banyak tahapan, semacam wajib menginstal script guna berjalannya protocol pada VPS sehingga dibutuhkannya sesuatu system website yang bisa jadi fasilitas buat mengakses sampai membuat akun virtual private network. Bermacam berbagai tipe VPN yang terletak pada VPS bisa dikelola via website oleh admin. User bisa melaksanakan pembuatan akun VPN pada website. Pada biasanya bila mau mengakses VPN wajib login VPS terlebih dulu buat membuat VPN. Berbentuk username & passwordsampai expired dan perinci pelayanan sampai port yang hendak digunakan pada protocol VPN semacam SSH, V2RAY, Trojan, L2TP, Shadowsocks. Perihal ini dirasa kurang efektif semacam login terminal VPS dulu buat membuat akun VPN secara manual, buat memudahkan client diperlukan panel berbasis website. Diharapkan bisa memudahkan pengguna dalam membuat VPN via website serta tidak wajib login VPS terlebih dulu. Menyederhanakan perintah dari VPS yang diimpelentasikan via website hendak memudahkan kegiatan user dalam pembuatan VPN. Berdasarkan hasil akhir, Web GUI yang telah menyediakan fitur layanan VPN sesuai yang disediakan VPS berjalan dengan normal. Masing-masing protokol atau jenis VPN memiliki karakteristik daya kinerja yang berbeda. Meliputi kecepatan dan ping pada saat diuji coba melalui alamat website speedtest.net untuk mengukur kecepatan dan ping koneksi internet.
26

Hyatt, A. D. „Exposure of protein VP7 on the surface of bluetongue virus“. Proceedings, annual meeting, Electron Microscopy Society of America 48, Nr. 3 (12.08.1990): 600–601. http://dx.doi.org/10.1017/s0424820100160558.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Bluetongue virus (BTV) is the type species os the genus orbivirus in the family Reoviridae. The virus has a fibrillar outer coat containing two major structural proteins VP2 and VP5 which surround an icosahedral core. The core contains two major proteins VP3 and VP7 and three minor proteins VP1, VP4 and VP6. Recent evidence has indicated that the core comprises a neucleoprotein center which is surrounded by two protein layers; VP7, a major constituent of capsomeres comprises the outer and VP3 the inner layer of the core . Antibodies to VP7 are currently used in enzyme-linked immunosorbant assays and immuno-electron microscopical (JEM) tests for the detection of BTV. The tests involve the antibody recognition of VP7 on virus particles. In an attempt to understand how complete viruses can interact with antibodies to VP7 various antibody types and methodologies were utilized to determine the physical accessibility of the core to the external environment.
27

Sulistiyono, Sulistiyono. „PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK“. PROSISKO: Jurnal Pengembangan Riset dan Observasi Sistem Komputer 7, Nr. 2 (01.09.2020): 150–64. http://dx.doi.org/10.30656/prosisko.v7i2.2523.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Perkembangan teknologi yang semakin maju mempengaruhi suatu sistem dan efisiensi dalam dunia pekerjaan. Oleh karna itu sangat di butuhkan sekali jaringan internet, selain pentingnya jaringan internet juga perusahaan sangat membutuhkan adanya jaringan pribadi (VPN) yang aman, sebagai jalur khusus untuk mengakses ke jaringan lokal perusahaan. Untuk mengatasi hal ini maka penulis akan merancang sebuah VPN IPsec dengan menggunakan Router MikroTik. VPN memungkinkan untuk mengakses jaringan lokal perusahaan menggunakan koneksi internet publik. Dari hasil riset yang penulis lakukan telah membuktikan bahwa dengan adanya VPN IPsec jalur komunikasi menggunakan jaringan publik menjadi lebih aman dengan adanya proses tunneling VPN dan enkripsi dari IPsec
28

Qian, Xuan Yu, Shi Min Liu, Cheng Zhou und Xiao Juan Guan. „Research of Network Testing Based on MPLS L2VPN“. Advanced Materials Research 791-793 (September 2013): 1695–98. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.1695.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
MPLS (Multi-Protocol Label Switching) VPN is based on MPLS technology and construct virtual private network (VPN) on backbone network, to provide users with safe, reliable, high-quality business technology VPN. MPLS L2VPN (Layer 2 VPN) is one type of solutions of MPLS VPN. The MPLS L2VPN technology, after years of researching and practicing, is becoming mature, and many RFCs and related drafts are published to standardize it. However, there is not much research of network test method on the MPLS L2VPN technology, this paper analyzes the various MPLS L2VPN solutions and make a reach on test method based on two types solutions: Martini and Kompella.
29

Kuang, Ai Nong. „Application Research of Computer Network Load Certification Constructing VPN Tunnel Technology“. Advanced Materials Research 926-930 (Mai 2014): 2217–20. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2217.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Setting-up large-scale VPN network becomes an important task, VPN has been attracted extensibe attention of business subscribers. In one speak, VPN technology is very complicated, it involves in communication technology, cryptography, authentication technology, it is an interdisciplinary. Tunnel technology is a key technology to set-up VPN network. In the port of host LAN and Internet, the data is packed in a pattern that can transport in Internet , in object LAN, the data is decompression and can use it . Give a simple analysis of the tunnel technique from the development of tunnel technique, to know the security technical of the setting-up large-scale VPN.
30

Khan, Muhammad U. S., Syed M. A. H. Bukhari, Tahir Maqsood, Muhammad A. B. Fayyaz, Darren Dancey und Raheel Nawaz. „SCNN-Attack: A Side-Channel Attack to Identify YouTube Videos in a VPN and Non-VPN Network Traffic“. Electronics 11, Nr. 3 (24.01.2022): 350. http://dx.doi.org/10.3390/electronics11030350.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Encryption Protocols e.g., HTTPS is utilized to secure the traffic between servers and clients for YouTube and other video streaming services, and to further secure the communication, VPNs are used. However, these protocols are not sufficient to hide the identity of the videos from someone who can sniff the network traffic. The present work explores the methodologies and features to identify the videos in a VPN and non-VPN network traffic. To identify such videos, a side-channel attack using a Sequential Convolution Neural Network is proposed. The results demonstrate that a sequence of bytes per second from even one-minute sniffing of network traffic is sufficient to predict the video with high accuracy. The accuracy is increased to 90% accuracy in the non-VPN, 66% accuracy in the VPN, and 77% in the mixed VPN and non-VPN traffic, for models with two-minute sniffing.
31

Pangestu, Sindu. „Perancangan Cloud Storage Menggunakan Freenas Melalui Jalur Tunneling“. JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, Nr. 2 (09.06.2022): 955–72. http://dx.doi.org/10.35957/jatisi.v9i2.1655.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Paper ini membahas tentang pembuatan server untuk penyimpanan data menggunakan sistem operasi Freenas, yang pengaksesan servernya melalui jaringan internet atau ip public menggunakan jalur VPN (Virtual Private Network). Akses data dari user ke server menggunakan authentikasi user Freenas dan ditambah dengan authentikasi user VPN untuk menambah keamanan jaringan dan mengatasi masalah keamanan dalam transaksi data seperti pencurian data. Hasil penelitian dari server yang dibuat, menunjukkan bahwa jalur VPN yang dibuat dapat dipakai untuk mengatasi masalah keamanan tersebut. Dari percobaan transaksi data yang sudah dilakukan pada server, menunjukkan bahwa data yang dikirim melalui jaringan internet tanpa VPN tidak terenkripsi dan masih bisa dilihat isinya, sedangkan data yang menggunakan jalur VPN, datanya telah terenkripsi dan tidak bisa dilihat isinya secara langsung.
32

Sun, Yunxiao, Bailing Wang, Chao Wang und Yuliang Wei. „On Man-in-the-Middle Attack Risks of the VPN Gate Relay System“. Security and Communication Networks 2021 (21.10.2021): 1–7. http://dx.doi.org/10.1155/2021/9091675.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
With the development of the Internet, more and more people use virtual private network (VPN) to circumvent censorship or hide themselves for privacy purposes. However, VPN itself faces some security and privacy risks. Widely used all over the world, the VPN Gate is a volunteer-organized public VPN relay system launched in 2013. By analyzing the security of the system, we have found that there is a man-in-the-middle attack risk because an attacker may hijack a VPN session and decrypt the traffic. According to our study, the reason of the security issues is the misuse of the SSL certificate. To mitigate the security risks, we offered a series of recommendations.
33

Pangestu, Raka Nugraha, Risma Yanti und Herlina Harahap. „Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer“. Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) 3, Nr. 1 (19.06.2021): 27–33. http://dx.doi.org/10.35447/jikstra.v3i1.357.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown IPs from accessing the server and redirecting attacks to virtual IPs provided by the VPN.
34

Maulidi, A., M. Abdullah und DW Handani. „Virtual private network (VPN) model for AIS real time monitoring“. IOP Conference Series: Earth and Environmental Science 1081, Nr. 1 (01.09.2022): 012028. http://dx.doi.org/10.1088/1755-1315/1081/1/012028.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Abstract The need for a ship monitoring system based on Automatic Identification System (AIS) has been developed and provides many broad benefits for the maritime world in Indonesia. The system can become an early warning system (EWS) for ship operators, port operators, and even ship owners for tracking a movement of their ships. By internet connection based Virtual Private Network (VPN) can connect several remote base stations (RBS), VPN technology can integrate many RBS from several remote places into one AIS monitoring system. VPN-based internet connection is used to guarantee a secure network, private internet connection, and can access a network remotely. VPN technology encrypts data exchange even before data transmission reaches the public network. Connecting to the internet using a VPN connection is like accessing the internet using a special tunnel, not in the main internet network. Thus the use of a VPN-based internet connection in the AIS monitoring system can ensure the security of data transmission from RBS to the AIS monitoring server.
35

Alashi, Shahad A., und Hanaa A. Aldahawi. „Cybersecurity Management for Virtual Private Network (VPN) Applications: A Proposed Framework for the Governance of their Use in the Kingdom of Saudi Arabia“. Journal of Information Security and Cybercrimes Research 3, Nr. 1 (20.12.2020): 31–57. http://dx.doi.org/10.26735/vsdj4585.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
By using the research process, this study addresses the attitudes of the members of Saudi society towards using Virtual Private Network (VPN) applications and the former’s perceptions of the latter’s concept, security, and privacy, in addition to monitoring their risks to cybersecurity. The main objective of the study is to present a proposed framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia to strengthen cybersecurity management. To achieve the objectives of the study, the researchers used two methods: the social survey method and the content analysis method. The researchers also relied on the questionnaire tool to collect information from the 455 individuals in the study sample. The study yielded a set of findings, the most important of which are as follows: The use of free VPN applications represents 91% of the sample of the study. Also, the study revealed confusion in perceptions of the actual concept of VPN applications, which may be common among users, and showed a diversity of attitudes and motives for using VPN applications, most of which are related to entertainment. Moreover, the study showed that the study sample individuals had some knowledge about the risks of VPN applications to cybersecurity, although most of them did not use cyber protection means. The study recommended the need to organize and manage the use of VPN applications, conduct an evaluation of VPN applications available on Saudi smartphone stores, and prohibit those which contain security vulnerabilities and malware. The study proposed a framework for the governance of the use of VPN applications in the Kingdom of Saudi Arabia, which comprised three dimensions: legal, organizational and awareness-based dimensions.
36

Santoso, Budi, Asrul Sani, T. Husain und Nedi Hendri. „VPN SITE TO SITE IMPLEMENTATION USING PROTOCOL L2TP AND IPSEC“. TEKNOKOM 4, Nr. 1 (10.06.2021): 30–36. http://dx.doi.org/10.31943/teknokom.v4i1.59.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Data exchange communication has developed, which leads to centralized communication, and to achieve this communication requires a type of data communication whose data is accommodated on the server and can be accessed by clients, such as at organization. As a company engaged in education, the development of centralized data communication by utilizing the intranet network has been formed. The use of an intranet network allows data communication that is vulnerable to wiretapping. To fix this using a VPN network. L2TP and IPsec VPNs have different performances, especially in the level of security provided. In this study, an analysis of the L2TP and IPsec VPN network performance was carried out on the SMB Server on the Ubuntu server and the Mikrotik router for its VPN configuration. In this study, the L2TP and IPsec VPN was designed by configuring the Mikrotik RB 450G router and the SMB Server configuration using Command Line Interface on Ubuntu 18.04 server. For security analysis, use hacking methods to get VPN Server login data and sniffing methods to get SMB Server login data and SMB data. For performance analysis using parameters of delay, throughput, and packet loss. Wireshark is software for checking by capturing each packet of data from an interface. The research objective to be achieved is to design a VPN technology based on L2TP & IPSec, to be able to determine the resulting performance after implementing a VPN based on L2TP & Ip Sec. The result is that VPN can connect from HO to branch one and branch two or connect from public connection to local connection. The Ubuntu server used is also running well, so it helps the VPN process properly.
37

Sari, Yosi Nofita, Dedy Irfan und Asrul Huda. „Network Security Analysis Using Virtual Private Network in Vocational School“. Jurnal Paedagogy 9, Nr. 3 (21.07.2022): 582. http://dx.doi.org/10.33394/jp.v9i3.5346.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Every organization chooses a virtual private network (VPN) as their top option since it is a practical and secure solution. Through the use of a virtual private network, this study seeks to evaluate the network in SMK (VPN). The descriptive qualitative research used in this study was carried out at the lab of SMK Negeri 1 Ampek Angkek. Data were gathered through observation, interviews, and document analysis studies. The method of data analysis employed descriptive analysis. The results of this study indicate that the activity on the VPN network is better than the Non-VPN because the activities carried out in the VPN tunnel are not known by others. Users find it simpler to finish their daily agenda as a result.
38

Shepherd, Frances, Diana Herrera-Ibata, Elizabeth Porter, Nitipong Homwong, Richard Hesse, Jianfa Bai und Douglas Marthaler. „Whole Genome Classification and Phylogenetic Analyses of Rotavirus B strains from the United States“. Pathogens 7, Nr. 2 (18.04.2018): 44. http://dx.doi.org/10.3390/pathogens7020044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Rotaviruses (RVs) are a major etiological agent of acute viral gastroenteritis in humans and young animals, with rotavirus B (RVB) often detected in suckling and weaned pigs. Group A rotavirus classification is currently based on the two outer capsid proteins, VP7 and VP4, and the middle layer protein, VP6. Using RVB strains generated in this study and reference sequences from GenBank, pairwise identity frequency graphs and phylogenetic trees were constructed for the eleven gene segments of RVB to estimate the nucleotide identity cutoff values for different genotypes and determine the genotype diversity per gene segment. Phylogenetic analysis of VP7, VP4, VP6, VP1–VP3, and NSP1–NSP5 identified 26G, 5P, 13I, 5R, 5C, 5M, 8A, 10N, 6T, 4E, and 7H genotypes, respectively. The analysis supports the previously proposed cutoff values for the VP7, VP6, NSP1, and NSP3 gene segments (80%, 81%, 76% and 78%, respectively) and suggests new cutoff values for the VP4, VP1, VP2, VP3, NSP2, NSP4, and NSP5 (80%, 78%, 79%, 77% 83%, 76%, and 79%, respectively). Reassortment events were detected between the porcine RVB strains from our study. This research describes the genome constellations for the complete genome of Group B rotaviruses in different host species.
39

Mufida, Elly, Dedi Irawan und Giatika Chrisnawati. „Remote Site Mikrotik VPN Dengan Point To Point Tunneling Protocol (PPTP) Studi Kasus pada Yayasan Teratai Global Jakarta“. Jurnal Matrik 16, Nr. 2 (25.07.2017): 9. http://dx.doi.org/10.30812/matrik.v16i2.7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Technology VPN (Virtual Private Network) allows everyone to be able to access the local network from outside by using the internet. Through the VPN, the user can access the resources within the local network, gain rights and settings are the same as physically being in a place where the local network is located. Data security and secrecy of data transmission from unauthorized access in transmission on the Internet becomes the main standard in the VPN, so that the VPN is always included will be the main feature is the encryption and tunneling.
40

Triyansa, Farizal, und Irwan Agus Sobari. „Implementasi Jaringan VPN Menggunakan L2TP Dengan IP Sec Pada PT Datindo Infonet Prima“. Computer Science (CO-SCIENCE) 2, Nr. 2 (28.07.2022): 82–89. http://dx.doi.org/10.31294/coscience.v2i2.1168.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Perancangan ini berlatar belakang oleh adanya kebutuhan suatu jaringan yang mengkhususkan user tertentu untuk mengakses data lokal dari suatu server. Tepatnya teknologi VPN sangat berperan penting dalam dunia komunikasi sekarang ini, dikarenakan VPN mampu membuat jaringan lokal dengan menggunakan fasilitas publik. Dengan adanya VPN perusahaan bisa menjalin suatu koneksi data yang mudah dan bersifat aman. VPN dapat memungkinkan untuk terbentuknya suatu jaringan data privasi yang dapat di akses melalui jaringan publik yaitu internet, Hanya yang mendapatkan otoritas sajalah yang dapat mengakses VPN tersebut. L2TP (Layer 2 Tunneling Protocol) menawarkan solusi keamanan yang cukup baik dengan cara membuat tunnel (terowongan) pada jaringan publik. Penggunaan L2TP itu sendiri tidak lepas dengan pengaruh sistem keamanan yang makin berkembang pesat, Oleh karenanya dengan menambahkan proses L2TP dengan IPsec diharapkan mampu menangani kasus masalah dari sistem kemanan jaringan
41

Li, Song, Qian Zou und Wei Huang. „VPN Packet Loss-Oriented Dynamic Control“. Applied Mechanics and Materials 340 (Juli 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amm.340.710.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Through security protocols and virtual private network tunneling for data confidentiality, message integrity, and endpoint authentication. Users can access anywhere Internet VPN service within the group. VPN tunneling technology VPN gateway group is exposed to internal services in the Internet, malicious users are using client terminal allows officers to attack the internal services group. So we must study to the control is based on the model, combined with VPN network traffic characteristics, the topological feature model of security and safety technology and related technologies. Study on dynamic access control packet loss model in this article, you can study can greatly increase VPN security, confidentiality of data on. Due to the introduction of the concept of dynamic control, we can more accurately control the packet loss and improve system performance.
42

Darojat, Agus, und Ida Nurhaida. „ANALISA QOS ADMINISTRATIVE DISTANCE STATIC ROUTE PADA FAILOVER VPN IPSEC“. Jurnal Ilmu Teknik dan Komputer 3, Nr. 1 (14.01.2019): 11. http://dx.doi.org/10.22441/jitkom.2020.v3.i1.002.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Sebuah jaringan komputer yang memiliki satu koneksi virtual Private virtual (VPN) tunnel sangat rentan terhadap gangguan yang disebabkan oleh beberapa hal diantaranya kualitas dari internet yang tidak stabil maupun gangguan koneksi fisik kabel dan bencana berskala besar yang menyebabkan kegagalan komunikasi dalam kasus IPsec VPN. Untuk menanggulangi masalah tersebut diperlukan solusi yaitu failover. Pendekatan failover adalah perpindahan jalur ketika komunikasi utama ke jalur kedua secara otomatis. Ketika komunikasi antara perangkat yang dihubungkan virtual Private virtual (VPN) mendeteksi kegagalan maka perangkat tersebut akan melakukan routing ulang untuk menentukan rute jalur baru. Dengan adanya metode failover VPN Ipsec ini dapat memberikan ketersediaan koneksi data center dengan kantor yang berada di area pelosok dikarenakan insfrastruktur jaringan yang kurang memadai dapat memanfaatkan jaringan internet 4G sebagai jaringan ISP untuk tunnel VPN backup.
43

Mira, Des, und Romi Wiryadinata. „Implementasi Jaringan VPN Berbasis Mikrotik“. Jurnal Ilmu Komputer dan Bisnis 11, Nr. 2 (16.11.2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.232.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Penelitian ini bertujuan untuk mengetahui rancang bangun sistem VPN Server pada Kecamatan Walantaka, salah satu instansi Pemerintah Daerah Pemprov Banten yang berada di Kota Serang untuk keamanan jaringan sehingga dapat membangun suatu komunikasi data yang aman dan cepat. Metode yang digunakan adalah enkripsi terdiri atas tiga tahapan yaitu 1) observasi dan wawancara; 2) penerapan metode dan 3) implementasi VPN. Hasil penelitian menunjukkan bahwa VPN dapat digunakan sebagai akses jaringan privat dengan menggunakan mikrotik sebagai router jaringan internet, selain itu file sharing dan remote desktop dapat dilakukan melalui VPN pada jaringan internet Kecamatan Walantaka Pemerintah Daerah Pemprov Banten.
44

Desmira, Desmira, und Romi Wiryadinata. „Implementasi Jaringan VPN Berbasis Mikrotik: Studi Kasus pada Kantor Kecamatan Walantaka“. Jurnal Ilmu Komputer dan Bisnis 11, Nr. 2 (22.11.2020): 2455–64. http://dx.doi.org/10.47927/jikb.v11i2.8.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Penelitian ini bertujuan untuk mengetahui rancang bangun sistem VPN Server pada Kecamatan Walantaka, salah satu instansi Pemerintah Daerah Pemprov Banten yang berada di Kota Serang untuk keamanan jaringan sehingga dapat membangun suatu komunikasi data yang aman dan cepat. Metode yang digunakan adalah enkripsi terdiri atas tiga tahapan yaitu 1) observasi dan wawancara; 2) penerapan metode dan 3) implementasi VPN. Hasil penelitian menunjukkan bahwa VPN dapat digunakan sebagai akses jaringan privat dengan menggunakan mikrotik sebagai router jaringan internet, selain itu file sharing dan remote desktop dapat dilakukan melalui VPN pada jaringan internet Kecamatan Walantaka Pemerintah Daerah Pemprov Banten..
45

Musril, Hari Antoni. „Desain Virtual Private Network (VPN) Berbasis Open Shortest Path First (OSPF)“. InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 3, Nr. 2 (15.03.2019): 83–88. http://dx.doi.org/10.30743/infotekjar.v3i2.1055.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Akses terhadap sebuah jaringan lokal yang bersifat terbatas untuk pihak tertentu dapat dilakukan dari jaringan publik dengan memanfaatkan Virtual Private Network (VPN). Akses tersebut dilakukan melalui internet dengan memanfaatkan VPN. Hal itu membuat pengguna bisa memanfaatkan semua resources jaringan lokal yang dapat diakses tanpa batasan waktu dan lokasi. OSPF routing diperlukan untuk menghubungkan semua router dalam jaringan yang menggunakan VPN. OSPF routing pada jaringan VPN bisa saling mengkoneksikan beberapa gedung di lokasi yang berbeda dengan satu jaringan. Penelitian ini menghasilkan prototipe skema jaringan yang menghubungkan dua lokasi yang dipisahkan oleh jarak yang jauh, namun dapat terhubung baik secara nyata maupun secara virtual.
46

Hidayat, Arif. „ANALYSIS AND DISTANCE ACCESS DESIGN FAR WITH VPN TECHNOLOGY IN BMT OFFICE. MENTARI EAST LAMPUNG“. IJISCS (International Journal of Information System and Computer Science) 3, Nr. 2 (07.12.2019): 64. http://dx.doi.org/10.56327/ijiscs.v3i2.742.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Along with the widespread use of the internet, many companies then switch to using the internet as part of their network to save costs. However, security issues are still a major factor in the reliability of a network. Virtual Private Network (VPN) is one way that can be used to create a private network and long-distance connections (remote access) with a high level of security over public networks or the Internet. The conclusions of this study are a) analysis and design of remote access with VPN technology in the Mentari East Lampung BMT Office, b) the resulting management of IP Address distribution for connections between branches using VPN, c) the creation of a VPN account management function for connection between branch BMT office. Mentari East Lampung, d) has successfully tested the VPN account login from the Client side.
47

Gustiawan, Mokhamad, und Ali Akbar Rismayadi. „Remote Access Virtual Private Network Menggunakan Layer 2 Tunneling Protocol Berbasis Mikrotik“. Jurnal Nasional Komputasi dan Teknologi Informasi (JNKTI) 5, Nr. 4 (28.08.2022): 674–84. http://dx.doi.org/10.32672/jnkti.v5i4.4612.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
Abstrak - Dishub Bandung merupakan kantor dilingkungan Pemkot Bandung, kantor ini memiliki komputer yang masih terdapat user yang terpisah secara fisik dari jaringan Lan dan teknisi setiap monitoring komunikasi data dengan mengakses mikrotik dan access point untuk mengetahui kondisi jaringan, dan hanya dapat dilakukan teknisi ketika sedang berada dalam jaringan lokal. Masalahnya ketika teknisi sedang berada pada jaringan publik, maka tidak dapat mengakses mikrotik dan access point tersebut. Penelitian menggunakan metode NDLC dengan penggabungan sistem protokol VPN L2TP dan port forward yang ada di mikrotik. VPN L2TP yang dapat membantu menghubungkan dua mikrotik yang berbeda dalam satu jaringan private yang aman dan memungkingkan data terenkripsi dengan aman. Teknisi mendapatkan IP Public kantor sehingga dapat di port forward untuk membuka akses terhadap perangkat pada jaringan lokal agar dapat diakses melalui jaringan publik melalui remote address VPN. Keamanan data dan ketertutupan transmisi data dari akses yang tidak berhak dalam transmisinya pada internet menjadi standar utama dalam VPN, sehingga dalam VPN selalu disertakan akan fitur utama yaitu enkripsi dan tunneling.Kata Kunci : VPN, L2TP, Mikrotik, Remote, Port Forward Abstract - Dishub Bandung is an office within the Bandung City Government, this office has a computer that still has a user who is physically separated from the Lan network and technicians every monitoring data communication by accessing mikrotik and access points to find out network conditions, and can only be done by technicians when they are in the local network. The problem is that when the technician is on the public network, it cannot access the proxy and access point. The study used the NDLC method by combining the L2TP VPN protocol system and the forward port in mikrotik. L2TP VPN that can help connect two different mikrotik in one secure private network and securely stop encrypted data. Technicians get a public IP of the office so that it can be ported forward to open access to devices on the local network so that they can be accessed through the public network through a VPN remote address. Data security and the ability to transmit data from unauthorized access to the internet are the main standards in VPNs, so in VPNs there are always included the main features of encryption and tunneling.Keywords : VPN, L2TP, Mikrotik, Remote, Port Forward
48

Hudda, Shreeram. „Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection“. Defence Science Journal 71, Nr. 4 (01.07.2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
49

Roberson, Shannon, Mohammad Abdus Salam, Mathieu Kourouma und Osman Kandara. „Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic“. International Journal of Computer Science and Information Technology 14, Nr. 1 (28.02.2022): 63–74. http://dx.doi.org/10.5121/ijcsit.2022.14105.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
VPN usage across the world has increased due to the COVID-19 pandemic. With companies trying to lay the course through this unfamiliar state, corporations had to implement a Business Continuity Plan which included several elements to maintain a scalable and robust VPN connection. During this time of uncertainty, best practices need to be deployed by corporations and government entities more than ever. The purpose of this study is to highlight the necessary path SD Telecom would take to ensure a secure, reliable network during global traffic surge. Specific VPN solutions, access needs, and eligibility requirements vary based on the end user. The question being investigated is: How does a major telecom company carefully extent VPN services during a novel pandemic? It is hoped this study will inform Information Security personnel and employees about the process and procedures for scaling VPN during a major crisis.
50

Umaroh, Lia, und Machsun Rifauddin. „IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG“. BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, Nr. 2 (11.12.2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Annotation:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.

Zur Bibliographie