(12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson Et Al USOO8943 201B2 (12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson et al. (45) Date of Patent: Jan. 27, 2015 (54) METHOD FORESTABLISHING ENCRYPTED (58) Field of Classification Search CHANNEL USPC .......................................... 709/225 229, 245 See application file for complete search history. (75) Inventors: Victor Larson, Fairfax, VA (US); Robert Dunham Short, Leesburg, VA (56) References Cited (US); Edmund Colby Munger, Crownsville, MD (US); Michael U.S. PATENT DOCUMENTS Williamson, South Riding, VA (US) 2,895,502 A 7/1959 Roper et al. 4.405,829 A 9, 1983 RiveSt (73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 FOREIGN PATENT DOCUMENTS U.S.C. 154(b) by 0 days. DE 1992.4575 12/1999 EP O838.930 4f1988 (21) Appl. No.: 13/285,962 (Continued) (22) Filed: Oct. 31, 2011 OTHER PUBLICATIONS (65) Prior Publication Data Exhibit G, Opening Expert Report of Dr. Stuart Stubblebine Regard ing Invalidity of the 135,211, and 504 Patents. US 2012/OO4208.6 A1 Feb. 16, 2012 (Continued) Related U.S. Application Data Primary Examiner — Krisna Lim (60) Continuation of application No. 1 1/679,416, filed on (74) Attorney, Agent, or Firm — McDermott, Will & Emery Feb. 27, 2007, now Pat. No. 8,051,181, which is a continuation of application No. 10/702,486, filed on (57) ABSTRACT Nov. 7, 2003, now Pat. No. 7,188,180, which is a A technique is disclosed for establishing a secure communi cation link between a first computer and a second computer (Continued) over a computer network. Initially, a secure communication mode of communication is enabledata first computer without (51) Int. C. a user entering any cryptographic information for establish G06F 5/73 (2006.01) ing the secure communication mode of communication. H04L 29/06 (2006.01) Then, a secure communication link is established between the (Continued) first computer and a second computer over a computer net (52) U.S. C. work based on the enabled secure communication mode of CPC ............ H04L 45/00 (2013.01); H04L 63/0428 communication. The secure communication link is a virtual (2013.01); H04L 29/12801 (2013.01); H04L private network communication link over the computer net 61/15 (2013.01); H04L 63/1458 (2013.01); work in which one or more data values that vary according to H04L 61/35 (2013.01); H04L 45/24 (2013.01); a pseudo-random sequence are inserted into each data packet. (Continued) 31 Claims, 40 Drawing Sheets 3. 32 S8i secPCRYO) S8:E Ristic R86. 8 & 3. FAs 35 23 E. 3:38 ove RRSR BS1 US 8,943.201 B2 Page 2 Related U.S. Application Data 5,689,641 11/1997 Ludwig et al. - - - 5,740,375 4, 1998 Dunne et al. division of application No. 09/558.209, filed on Apr. 5,757,925 5, 1998 Faybishenko 26, 2000, now abandoned, which is a continuation-in- 5,764,906 6, 1998 Edelstein et al. 6, 1998 Moroney et al. part of application No. 09/504,783, filed on Feb. 15, 37.8 6, 1998 Brendel et al. 2000, now Pat. No. 6,502,135, which is a continuation- 5,781550 7, 1998 Templin et al. in-part of application No. 09/429,643, filed on Oct. 29, 5,787,172 7, 1998 Arnold 1999, now Pat. No. 7,010,604. 5,790,548 8, 1998 Sistanizadeh et al. 370/401 5,796,942 8, 1998 Esbensen (60) Provisional application No. 60/106.261, filed on Oct. 5,805,801 9, 1998 Holloway et al. 30, 1998, provisional application No. 60/137,704, 5,805,803 9, 1998 Birrell et al. 9, 1998 Bellowin et al. filed on Jun. 7, 1999. 352. 9, 1998 Micali 10, 1998 Caronni et al. (51) Int. Cl. 35. 11, 1998 Hughes et al. H04L 29/2 (2006.01) 5,845,091 12, 1998 Dunne et al. H04L 2/707 (2013.01) 5,864,666 1/1999 Shrader H04L 2/70 (2013.01) 5,867,650 2, 1999 Osterman 2, 1999 Beyda et al. H04L 2/703 (2013.01) 2.9 3, 1999 Baehr et al. (52) U.S. Cl. 5,884,038 3, 1999 Kapoor CPC ........ H04L 61/2007 (2013.01); H04L 61/2092 5,884,270 3, 1999 Walker et al. (2013.01); H04L 29/12047 (2013.01); H04L 5,889,863 3, 1999 Weber 4, 1999 Wesinger, Jr. et al. 29/12216 (2013.01); H04L 63/0414 (2013.01); s: 5, 1999 Holloway et al. H04L 45/28 (2013.01); H04L 29/1232 595,087 6, 1999 Hammond et al. (2013.01); H04L 63/1491 (2013.01); H04L 5,918,018 6, 1999 Gooderum et al. ... 709,225 29/12301 (2013.01); H04L 61/6004 (2013.01); 5,918,019 6, 1999 Valencia 8, 1999 Duree et al. H04L 61/2076 (2013.01); H04L 63/0272 392. 9, 1999 Stockwell et al. (2013.01); H04L 63/029 (2013.01); H04L 5950519 9, 1999 Anatoli 29/12783 (2013.01) 5.960204 9, 1999 Yinger et al. USPC ........... 709/225; 709/226; 709/227; 709/228; 5,961,593 10, 1999 Gabber et al. 10, 1999 Apfel et al. 709/229; 709/245 3. 11, 1999 Klaus 11, 1999 Thalheimer et al. (56) References Cited E8 12, 1999 Green et al. 12, 1999 Adelman et al. U.S. PATENT DOCUMENTS 9:25: 12, 1999 Aravamudan et al. 1, 2000 Newlin 4,677,434 A 6, 1987 Fascenda 886. 1, 2000 Li et al. 4,761,334 A 8, 1988 Sagoi et al. 6063 is 1, 2000 Tomoike 4.885,778 A 12, 1989 Weiss 6.06504 1, 2000 Arnold et al. 1, 2000 Huitema 4,920,484 A * 4, 1990 Ranade ......................... 709/245 6.023.50 2, 2000 Epstein 4,933,846 A 6, 1990 Humphrey et al. 6032. 18 2, 2000 Tello et al. 4,952,930 A 8, 1990 Franaszek et al. 6041342 3, 2000 Yamaguchi 4, 2000 Wesinger et al. 5,007,051 A 4, 1991 Dolkas et al. 6055 236 4, 2000 Nessett et al. 5,070,528. A 12/1991 Hawe et al. 6055.5 is 4, 2000 Franklin et al. 5,164,988 A * 1 1/1992 Matyas et al. ................ T13,156 6055.574 4, 2000 Smorodinsky et al. 5,204,961 A 4, 1993 Barlow 6055.575 4, 2000 Paulsen et al. 5,276,735 A 1/1994 Boebert et al. 6,058.250 5/2000 Harwood et al. 5,303,302 A 4, 1994 Burrows 606346 5/2000 Nordman 5,311,593 A 5, 1994 Carmi 6061736 5/2000 Rochberger et al. 5,329,521 A 7, 1994 Walsh et al. 6.065,049 5/2000 Beser et al. 5,341,426 A 8/1994 Barney et al. 6,073.75 6, 2000 Tavs et al. 5,345,439 A 9, 1994 Marston 6079,020 6, 2000 Liu 5,367,643 A 11, 1994 Chang et al. 6,081900 6, 2000 Subramaniam et al. T/2000 Muniyappa et al. 5,412,730 A 5, 1995 Jones 6.10118 8, 2000 Sistanizadeh et al. 5,416,842 A 5, 1995 Aziz 6, 1883 8, 2000 Terada et al. 5,420,926 A 5, 1995 Low et al. 6.1 1971 9, 2000 Alkhatib 5,444,782 A 8/1995 Adams, Jr. et al. 6.19234 9, 2000 Aziz et al. 5,455,861 A 10, 1995 Faucher et al. 6.131121 10, 2000 Mattaway et al. 5,511,122 A 4, 1996 Atkinson 6.147976 11, 2000 Shand et al. 5,530,758 A 6/1996 Marino, Jr. et al. 6.148.342 11, 2000 Ho 11, 2000 Xu et al. 5,559,883. A 9/1996 Williams 6,154,839 11, 2000 Arrow et al. 5,561,669 A 10/1996 Lenney et al. 657,957 12, 2000 Berthaud 5,588,060 A 12, 1996 AZZ 6.158,011 12, 2000 Chen et al. 5,590,285 A 12/1996 Krause et al. 6.168.409 5,623,601 A 4, 1997 Vu J. ww. 1, 2001 Fare 5,625,626 A 4, 1997 Umekita 6,173,399 1, 2001 Gilbrech 5,629,984. A 5/1997 McManis 6,175,867 1, 2001 Taghadoss 5,636,139 A 6/1997 McLaughlin et al. 6,178.409 1, 2001 Weber et al. 5,654,695 A 8, 1997 Olnowich et al. 6,178,505 1, 2001 Schneider et al. 5,682,480 A 10/1997 Nakagawa 6,179,102 1, 2001 Weber et al. 5,689,566 A 1 1/1997 Nguyen 6,182,072 1, 2001 Leak et al. US 8,943.201 B2 Page 3 (56) References Cited 6,643,701 B1 1 1/2003 Aziz et al. 6,671,702 B2 12/2003 Kruglikov et al. U.S. PATENT DOCUMENTS 6,687,551 B2 2/2004 Steindl 6,687,746 B1 2/2004 Shuster et al. 6,182,141 B1 1/2001 Blum et al. 6,687,823 B1 2/2004 Al-Saldan et al. 6,182,227 B1 1/2001 Blair et al. 6,693,878 B1 2/2004 Daruwalla et al. 6,189,102 B 2.2001 Beser 6,701437 B1 3/2004 Hoke et al. 6,195,677 B1 2/2001 Utsumi 6,714,970 B1 3/2004 Fiveash et al. 6,199,112 B1 3, 2001 Wilson 6,717,949 B1 4/2004 Boden et al. 6,202,081 B1 3, 2001 Naudus 6,751,729 B1 6/2004 Giniger et al.
Recommended publications
  • Protokollsupport
    Reference Guide WinRoute Pro 4.1 SE För version 4.1 Build 22 och sinare Tiny Software Inc. Contents Innehållsförteckning Läs mig först 2 Beskrivning av WinRoute 5 WinRoute sammanfattning...................................................................................... 6 Omfattande protokollsupport .................................................................................. 9 NAT-router............................................................................................................ 10 Introduktion i NAT .................................................................................... 11 Hur NAT fungerar...................................................................................... 12 WinRoutes struktur .................................................................................... 13 Att ställa in NAT på båda gränssnitten ...................................................... 15 Portmappning - paketbefordran ................................................................. 18 Portmappning för system med flera hem (flera IP-adresser)...................... 21 Multi-NAT ................................................................................................. 22 Gränssnittstabell......................................................................................... 24 VPN-support .............................................................................................. 24 Brandvägg med paketfilter.................................................................................... 25 Översikt
    [Show full text]
  • J I Truste Ne Ork
    Internet Security A Jumpstart for Systems Administrators and IT Managers Tim Speed Juanita Ellis Digital Press An imprint of Elsevier Science Amsterdam, Boston • London • New York o Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Digital Press is an imprint of Elsevier Science. Copyright © 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Recognizing the importance of preserving what has been written, Elsevier Science prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data ISBN 1-55558-298-2 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. The publisher offers special discounts on bulk orders of this book. For information, please contact: Manager of Special Sales Elsevier Science 200 Wheeler Road Burlington, MA 01803 Tel: 781-313-4700 Fax: 781-313-4882 For information on all Digital Press publications available, contact our World Wide Web home page at: http://www.digitalpress.com or http://www.bh.com/digitalpress 1098765432 1 Printed in the United States of America To Linda Speed~my split apart. -T.S. To my dad, Charles Ellis. -J.E. This Page Intentionally Left Blank Contents Foreword ix Acknowledgments xi Introduction xiii The Internet and Security I. I The
    [Show full text]
  • Novell Bordermanager 3.9 Installation Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Installation Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com INSTALLATION GUIDE April 05, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Novell Zenworks 6.5 Desktop Management Installation Guide May 19, 2006
    Novell Confidential Manual (ENU) 21 December 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATION GUIDE May 19, 2006 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to www.novell.com/info/exports/ for more information on exporting Novell software.
    [Show full text]
  • Hacking for Dummies.Pdf
    01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page v 01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page ii Hacking For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
    [Show full text]
  • Supported Log File Formats
    Supported Log File Formats Vendor/Product Log Format Analyzer Analyzer Vantage & Live Standard Premium & Vantage Giga Analyzer Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked Logs Yes Yes No Yes Allied Telesyn ATI Level 3 No No Yes No Switch Model 9812 Apache HTTP Server - Yes Yes Yes Yes Access Log Applied Data Control Native Log Yes Yes No Yes Arkoon SMTP No Yes Yes Yes Arkoon Web (WELF) Yes Yes Yes Yes Arkoon Arkoon Yes *New Yes *New No Yes *New Firewall Astaro Native Syslog Yes Yes Yes Yes 3 Avirt Proxy Native Log Yes Yes Yes Yes AVM AVM Ken! Yes *New Yes *New No Yes *New Barracuda Networks Spam Firewall No No Yes *New No (CSV Format) Barracuda Networks Spam Firewall No No Yes *New No (Syslog Format) Bintec VPN Bintec VPN 25 No No Yes No Bloxx Proxy Server W3C Log No No Yes *New No Bluecoat Proxy SG Yes Yes Yes Yes Common Log Bluecoat Proxy SG Yes Yes Yes Yes Squid Native Log Bluecoat Proxy SG W3C Yes Yes Yes Yes Log Bluecoat Instant No No Yes *New No Messaging Log W3C Bluecoat Websense Yes Yes No Yes BlueReef Virtual Server SQUID Native Yes Yes Yes Yes Log Borderware Firewall Yes Yes Yes *New Yes Borderware Direct Packet No No Yes *New No Borderware Mail Yes Yes Yes *New Yes BT Proxy Native Log Yes Yes No Yes CacheFlow Proxy Squid Log Yes Yes No Yes CacheXpress Squid Log Yes Yes Yes Yes CC Proxy Native Log Yes 1 Yes Yes Yes Checkpoint Firewall-1 Yes 1 *Mod Yes *Mod Yes No Checkpoint Firewall Yes 1 *Mod Yes *Mod Yes No Custom Checkpoint NG Yes 1 *Mod Yes *Mod Yes No CipherTrust
    [Show full text]
  • Novell Bordermanager 3.9 Administration Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Administration Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com ADMINISTRATION GUIDE April 5, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Log & Event Manager
    Log & Event Manager Copyright © 1995-2012 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of SolarWinds. All right, title, and interest in and to the software and documentation are and shall remain the exclusive property of SolarWinds and its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, the SolarWinds & Design, ipMonitor, LANsurveyor, Orion, and other SolarWinds marks, identified on the SolarWinds website, as updated from SolarWinds from time to time and incorporated herein, are registered with the U.S. Patent and Trademark Office and may be registered or pending registration in other countries. All other SolarWinds trademarks may be common law marks or registered or pending registration in the United States or in other countries. All other trademarks or registered trademarks contained and/or mentioned herein are used for identification purposes only and may be trademarks or registered trademarks of their respective companies. Microsoft®, Windows®, and SQL Server® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Novells Guide to Bordermanager Pdf, Epub, Ebook
    NOVELLS GUIDE TO BORDERMANAGER PDF, EPUB, EBOOK J.D. Marymee, Sandy Stevens | 384 pages | 01 Jan 1998 | John Wiley & Sons Inc | 9780764545405 | English | Foster City, United States pdfFiller. On-line PDF form Filler, Editor, Type on PDF, Fill, Print, Email, Fax and Export All of the information presented in this book has been gathered from hands-on, real world experiences of the authors. A best-seller that once showed you how to reign in a panther can now show you …. Today, software engineers need to know not only how to program effectively but also how to …. You Will Learn Python 3! Zed Shaw has perfected the world's best system for learning Python …. If you think you should have access to this content, click the button to contact our support team. Contact us. To read the full version of this content please select one of the options below. You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account. To rent this content from Deepdyve, please click the button. Rent from Deepdyve. Join us on our journey Platform update page Visit emeraldpublishing. This retrieval method along with NetWare's fast file IO and other proprietary code made BorderManager's proxy engine one of the fastest in existence. This makes it possible for the customer to choose which NetWare or Linux kernel the services will run on. At this time Novell all but announced the end of development for the NetWare kernel numerous public and private statements that there is no bit future for NetWare and that Linux is the path to bit computing for OES.
    [Show full text]
  • Novell Zenworks Desktop Management? 17 Automatisches Importieren Und Entfernen Von Arbeitsstationen
    Novell Confidential Manual (DEU) 6 October 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATIONSHANDBUCH 11.02.05 Novell Confidential Manual (DEU) 6 October 2004 Rechtliche Belange Novell, Inc., leistet keinerlei Gewähr bezüglich des Inhalts oder Gebrauchs dieses Handbuchs. Insbesondere werden keine ausdrücklichen oder stillschweigenden Gewährleistungen hinsichtlich der handelsüblichen Qualität oder Eignung für einen bestimmten Zweck übernommen. Novell, Inc. behält sich weiterhin das Recht vor, diese Dokumentation zu revidieren sowie ihren Inhalt jederzeit und ohne vorherige Ankündigung zu ändern. Novell, Inc. gibt ebenfalls keine Erklärungen oder Garantien in Bezug auf Softwareprodukte und schließt insbesondere jegliche ausdrückliche oder stillschweigende Garantie auf Marktgängigkeit oder Eignung für einen bestimmten Zweck aus. Außerdem behält sich Novell, Inc. das Recht vor, Novell-Software jederzeit ganz oder teilweise zu ändern, ohne dass für Novell, Inc. die Verpflichtung entsteht, Personen oder Organisationen von diesen Änderungen in Kenntnis zu setzen. Die Ausfuhr bzw. die Wiederausfuhr dieses Produkts ist nur im Rahmen gültiger Gesetze bzw. Richtlinien, darunter die US-Exportbestimmungen bzw. Gesetze Ihres Heimatlands, gestattet. Copyright © 2005 Novell, Inc. Alle Rechte vorbehalten. Ohne ausdrückliche schriftliche Genehmigung des Herausgebers darf kein Teil dieser Veröffentlichung reproduziert, fotokopiert, übertragen oder in einem Speichersystem verarbeitet werden. Novell, Inc., besitzt die Rechte auf geistiges Eigentum für die Technologie, die in dem in dieser Dokumentation beschriebenen Produkt enthalten ist. Diese Rechte auf geistiges Eigentum umfassen möglicherweise insbesondere ein oder mehrere Patente in den USA, die unter http://www.novell.com/ company/legal/patents aufgeführt sind (ohne darauf beschränkt zu sein). Diese Rechte umfassen möglicherweise außerdem ein oder mehrere andere Patente oder laufende Patentanträge in den USA und in anderen Ländern.
    [Show full text]
  • Appendix a Practical Technical Implementation
    Optimising Internet Bandwidth in Developing Country Higher Education Appendix A Practical technical implementation 1. Web caching A Web proxy server is a server on the local network that keeps copies of recently retrieved or often used Web pages, or parts of pages. When the next person retrieves these pages, they are served from the local proxy server instead of from the Internet. This results in faster Web access in most cases. Bandwidth usage can also be reduced. When a proxy server is implemented, the administrator should also be aware that some pages are not cacheable – for example, pages that are the output of server-side scripts. Loading of Web pages is also affected. Where previously the page would begin to load slowly, first showing some text and then displaying the graphics one by one, in a network with a proxy server, there could be a delay when nothing seems to happen, and then the page will load almost at once. The time it takes to load the whole page might take 10 seconds, whereas without a proxy server it may take 30 seconds, but unless this is explained to some impatient users, they may say the proxy server has made things slower. It is usually the task of the network administrator to deal with user perception like these. 1.1 Proxy server products Squid. Open source Squid is the de facto standard at universities. It is free, reliable, easy to use and can be enhanced with for example content filtering and advertisement blocking. Squid produces logs that can be analysed using software such as Sawmill (commercial) or Awstats, Webalizer (Open Source), both of which produce good graphical reports.
    [Show full text]
  • Proxy Server
    From Wikipedia, the free encyclopedia Proxy server Proxy server Types and functions Proxy servers implement one or more of the following functions: Caching proxy server A caching proxy server accelerates service Schematic representation of a proxy server, requests by retrieving content saved from a where the computer in the middle acts as the previous request made by the same client or proxy server between the other two. even other clients. Caching proxies keep loc- al copies of frequently requested resources, In computer networks, a proxy server is a allowing large organizations to significantly server (a computer system or an application reduce their upstream bandwidth usage and program) that acts as a go-between for re- cost, while significantly increasing perform- quests from clients seeking resources from ance. Most ISPs and large businesses have a other servers. A client connects to the proxy caching proxy. These machines are built to server, requesting some service, such as a deliver superb file system performance (often file, connection, web page, or other resource, with RAID and journaling) and also contain available from a different server. The proxy hot-rodded versions of TCP. Caching proxies server evaluates the request according to its were the first kind of proxy server. filtering rules. For example, it may filter The HTTP 1.0 and later protocols contain traffic by IP address or protocol. If the re- many types of headers for declaring static quest is validated by the filter, the proxy (cacheable) content and verifying content provides the resource by connecting to the freshness with an original server, e.g.
    [Show full text]