Archive for June, 2011

SSTP: The problem with TCP over TCP, Part 2

Posted: 30th June 2011 by VPN Haus in TCP

All of these items are critical factors contributing to the TCP protocol’s overall success. The problems begin, however, when congestion controls from the outer TCP protocol interfere with those of the inner one and vice versa. TCP divides a data stream into segments which are sent as individual Internet Protocol (IP) datagrams. Each segment carries [...]

SSTP: The problem with TCP over TCP, Part 1

Posted: 28th June 2011 by VPN Haus in TCP

TCP over TCP: Issues and Concerns The Transmission Control Protocol (TCP) is undoubtedly a fundamental component in all modern day networks. The difficultly with TCP, however, begins when operating a TCP tunnel within TCP itself, which is often the case when operating VPNs in order to protect one’s online privacy. A TCP tunnel is an [...]

What We’re Reading, Week of 6/20

Posted: 24th June 2011 by VPN Haus in Highlights

TechNewsWorld, Securing SCADA Systems: Where do we start? Telecomasia.net, IPv6: What are you waiting for? International Business Times, Security Breaches Becoming a Near Certainty For Businesses Help Net Security, Disk encryption is an IT security priority TMCnet.com, IPv6 and Security: Top Switchover Threats Organizations Should Watch For Over The Next Six Months Share this:EmailFacebookPrint

This week, we feature the final part of our conversation with Martin Rosner, director of standardization at Philips – North America. Rosner chairs Continua Health Alliance security and privacy discussions and contributes to relevant security initiatives within the healthcare industry. Continua Health Alliance is a non-profit, open industry organization of more than 230 healthcare and technology [...]

What We’re Reading, Week of 6/13

Posted: 17th June 2011 by VPN Haus in Highlights

IT-Director, Managing the risk for mobile IT users Campus Technology, U Akron Implements New VPN Client for Secure Remote Access from 64-Bit Computers Fox Business, IPv6 Changes Security: Is Your Business Ready? CNET, Scammers turning to phone calls to gain PC access ITBusinessEdge, Making sure IPv6 and IPv4 co-exist reliably and securely Share this:EmailFacebookPrint