(12) United States Patent (10) Patent No.: US 9,038,163 B2 Larson Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 9,038,163 B2 Larson Et Al USOO90381 63B2 (12) United States Patent (10) Patent No.: US 9,038,163 B2 Larson et al. (45) Date of Patent: *May 19, 2015 (54) SYSTEMS AND METHODS FOR (56) References Cited CONNECTING NETWORK DEVICES OVER COMMUNICATION NETWORK U.S. PATENT DOCUMENTS (71) Applicant: VIRNETX, INC., Zephyr Cove, NV 2,895,502 A 7/1959 Roper et al. (US) 4.405,829 A 9, 1983 RiveSt (72) Inventors: Victor Larson, Fairfax, VA (US); (Continued) Robert Dunham Short, III, Lexington, FOREIGN PATENT DOCUMENTS VA (US); Edmund Colby Munger, DE 1992.4575 12/1999 Tarpon Springs, FL (US); Michael EP O838.930 4f1988 Williamson, South Riding, VA (US) (Continued (73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US) OTHER PUBLICATIONS (*) Notice: Subject to any disclaimer, the term of this EastLake D., Secure Domain Name System Dynamic Update, Apr. patent is extended or adjusted under 35 1997. Internet Engineering Task Force, pp. 1-22.* U.S.C. 154(b) by 0 days. (Continued) This patent is Subject to a terminal dis claimer. Primary Examiner — Jason K. Gee Assistant Examiner — Olanrewaju Bucknor (21) Appl. No.: 13/950,877 (74) Attorney, Agent, or Firm — McDermott Will & Emery (22) Filed: Jul. 25, 2013 LLP (65) Prior Publication Data (57) ABSTRACT US 2013/0311774 A1 Nov. 21, 2013 Related U.S. Application Data Systems and methods for connecting a first network device and a second network device over a communication network (63) Continuation of application No. 13/903,788, filed on are disclosed. An exemplary method includes receiving, from May 28, 2013, which is a continuation of application the first network device, a request to look up a network No. 13/336,790, filed on Dec. 23, 2011, now Pat. No. address of the second network and evaluating the request to 8.458.341, which is a continuation of application No. determine whether an identifier associated with the second network device is registered with a name service that facili (Continued) tates resolving the identifier and further facilitates establish ing direct encrypted communication links. It is determined (51) Int. Cl. whether the second network device is available to communi G06F 9/00 (2006.01) cate through a direct encrypted communication link facili H04L 29/06 (2006.01) tated by the name service, the establishment of the direct (Continued) encrypted communication link between the first network device and the second network device is facilitated. This (52) U.S. Cl. includes provisioning the first network device or the second CPC ........ H04L 63/0435 (2013.01); H04L 12/4641 network device with one or more resources for the direct (2013.01); H04L 29/12066 (2013.01); encrypted communication link. The established direct (Continued) encrypted communication link carries encrypted data com municated between the first network device and the second (58) Field of Classification Search network device, and the first network device is a user device. None See application file for complete search history. 48 Claims, 40 Drawing Sheets projTER PROUTER 128 TARP TERMINAL 10 US 9,038,163 B2 Page 2 Related U.S. Application Data 5,367,643 11, 1994 Chang et al. 5,384,848 1/1995 Kikuchi 13/049,552, filed on Mar. 16, 2011, which is a contin 5,412,730 5, 1995 Jones uation of application No. 1 1/840,560, filed on Aug. 17. 5,416,842 5, 1995 Aziz 5,420,926 5, 1995 Low et al. 2007, now Pat. No. 7,921,211, which is a continuation 5,444,782 8, 1995 Adams, Jr. et al. of application No. 10/714,849, filed on Nov. 18, 2003, 5,455,861 10, 1995 Faucher et al. now Pat. No. 7,418,504, which is a continuation of 5,511,122 4, 1996 Atkinson application No. 09/558,210, filed on Apr. 26, 2000, 5,530,758 6, 1996 Marino, Jr. et al. 5,548,646 8, 1996 Aziz et al. now abandoned, which is a continuation-in-part of 5,559,883 9, 1996 Williams application No. 09/504,783, filed on Feb. 15, 2000, 5,561,669 10, 1996 Lenney et al. now Pat. No. 6,502,135, which is a continuation-in 5,588,060 12, 1996 Aziz part of application No. 09/429,643, filed on Oct. 29. 5,590,285 12, 1996 Krause et al. 5,623,601 4, 1997 1999, now Pat. No. 7,010,604. 5,625,626 4, 1997 Umekita 5,629,984 5, 1997 McManis (60) Provisional application No. 60/106.261, filed on Oct. 5,636,139 6, 1997 McLaughlin et al. 30, 1998, provisional application No. 60/137,704, 5,654.695 8, 1997 Olnowich et al. filed on Jun. 7, 1999. 5,682.480 10, 1997 Nakagawa 5,689,566 11/1997 Nguyen (51) Int. C. 5,689,641 11/1997 Ludwig et al. H04L 2/46 (2006.01) 5,740,375 4, 1998 Dunne et al. 5,757,925 5, 1998 Faybishenko H04L 29/2 (2006.01) 5,764,906 6, 1998 Edelstein et al. H04L 2/70 (2013.01) 5,771,239 6, 1998 Moroney et al. H04L 2/707 (2013.01) 5,774,660 6, 1998 Brendel et al. H04L 2/703 (2013.01) 5,781,550 7, 1998 Templin et al. ............... 370/401 G06F2L/60 (2013.01) 5,787,172 7, 1998 Arnold 5,790,548 8, 1998 Sistanizadeh et al. H04L 2/24 (2006.01) 5,796,942 8, 1998 Esbensen H04L 29/08 (2006.01) 5,805,801 9, 1998 Holloway et al. (52) U.S. C. 5,805,803 9, 1998 Birrell et al. .................... T26, 12 5,805,820 9, 1998 Bellowin et al. CPC. H04L29/12216 (2013.01); H04L 29/12301 5,812,670 9, 1998 Micali (2013.01); H04L 29/1232 (2013.01); H04L 5,822,434 10, 1998 Caronni et al. 29/12594 (2013.01); H04L 29/12783 (2013.01); 5,838,796 11, 1998 Mittenthal H04L 29/12801 (2013.01); H04L 45/00 5,842,040 11, 1998 Hughes et al. (2013.01); H04L 45/24 (2013.01); H04L 45/28 5,845,091 12, 1998 Dunne et al. 5,864,666 1/1999 Shrader (2013.01); H04L 61/1511 (2013.01); H04L 5,867,650 2, 1999 Osterman 61/2007 (2013.01); H04L 61/2076 (2013.01); 5,870,610 2, 1999 Beyda et al. H04L 61/2092 (2013.01); H04L 61/303 5,870,744 2, 1999 Sprague (2013.01); H04L 61/35 (2013.01); H04L 5,878,231 3, 1999 Baehr et al. 61/6004 (2013.01); H04L 63/0272 (2013.01); 5,884,038 3, 1999 Kapoor 5,884,270 3, 1999 Walker et al. H04L 63/0407 (2013.01); H04L 63/0428 5,889,863 3, 1999 Weber (2013.01); H04L 63/08 (2013.01); H04L 5,892,903 4, 1999 Klaus 63/105 (2013.01); H04L 63/1408 (2013.01): 5,898,830 4, 1999 Wesinger, Jr. et al. H04L 63/1416 (2013.01); H04L 63/1458 5,905,859 5, 1999 Holloway et al. 5,915,087 6, 1999 Hammond et al. (2013.01); H04L 63/1466 (2013.01); H04L 5,918,018 6, 1999 Gooderum et al. 63/164 (2013.01); H04L 63/04 (2013.01); 5,918,019 6, 1999 Valencia G06F 21/606 (2013.01); H04L 4I/00 5,940,393 8, 1999 Duree et al. (2013.01); H04L 67/14 (2013.01); H04L 5,950,195 9, 1999 Stockwell et al. 63/0227 (2013.01) 5,950,519 9, 1999 Anatoli 5,960.204 9, 1999 Yinger et al. References Cited 5,961,593 10, 1999 Gabber et al. (56) 5.974.454 10, 1999 Apfel et al. U.S. PATENT DOCUMENTS 5.996,016 11, 1999 Thalheimer et al. 6,003,084 12, 1999 Green et al. .................. 709,227 6,006,259 12, 1999 Adelman et al. 4,677,434 A 6, 1987 Fascenda 6,006,272 12, 1999 Aravamudan et al. 4,761,334 A 8/1988 Sagoi et al. 6,011,579 1, 2000 Newlin 4.885,778 A 12, 1989 Weiss 6,012,088 1, 2000 Li et al. 4,912,762 A 3, 1990 Lee et al. 6,012,100 1, 2000 Frailong et al. 4,920,484 A 4, 1990 Ranade 6,016,318 1, 2000 Tomoike 4,933,846 A 6/1990 Humphrey et al. 6,016,504 1, 2000 Arnold et al. 4,952,930 A 8, 1990 Franaszek et al. 6,016,512 1, 2000 Huitema 4,988,990 A 1/1991 Warrior 2, 2000 Epstein 5,007,051 A 4, 1991 Dolkas et al. 6,023,510 5,070,528 A 12/1991 Hawe et al. 6,032,118 2, 2000 Tello et al. 5,164,988 A 1 1/1992 Matyas 6,041,342 3, 2000 Yamaguchi 5,204,961 A 4, 1993 Barlow 6,052,788 4, 2000 Wesinger et al. 5,276,735 A 1/1994 Boebert et al. 6,055,236 4, 2000 Nessett et al. 5,303,302 A 4, 1994 Burrows 6,055,518 4, 2000 Franklin et al. 5,311,593. A 5, 1994 Carmi 6,055,574 4, 2000 Smorodinsky et al. 5,329,521 A 7, 1994 Walsh et al. 6,055,575 4, 2000 Paulsen et al. 5,341,426 A * 8/1994 Barney et al. ................. 713,171 6,058,250 5/2000 Harwood et al. ............. 709,227 5,345,439 A 9, 1994 Marston 6,061,346 5/2000 Nordman US 9,038,163 B2 Page 3 (56) References Cited 6,438,127 B1 8, 2002 Le Goffet al. 6,449,272 B1 9, 2002 Chuah et al.
Recommended publications
  • Protokollsupport
    Reference Guide WinRoute Pro 4.1 SE För version 4.1 Build 22 och sinare Tiny Software Inc. Contents Innehållsförteckning Läs mig först 2 Beskrivning av WinRoute 5 WinRoute sammanfattning...................................................................................... 6 Omfattande protokollsupport .................................................................................. 9 NAT-router............................................................................................................ 10 Introduktion i NAT .................................................................................... 11 Hur NAT fungerar...................................................................................... 12 WinRoutes struktur .................................................................................... 13 Att ställa in NAT på båda gränssnitten ...................................................... 15 Portmappning - paketbefordran ................................................................. 18 Portmappning för system med flera hem (flera IP-adresser)...................... 21 Multi-NAT ................................................................................................. 22 Gränssnittstabell......................................................................................... 24 VPN-support .............................................................................................. 24 Brandvägg med paketfilter.................................................................................... 25 Översikt
    [Show full text]
  • J I Truste Ne Ork
    Internet Security A Jumpstart for Systems Administrators and IT Managers Tim Speed Juanita Ellis Digital Press An imprint of Elsevier Science Amsterdam, Boston • London • New York o Oxford • Paris • San Diego San Francisco • Singapore • Sydney • Tokyo Digital Press is an imprint of Elsevier Science. Copyright © 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Recognizing the importance of preserving what has been written, Elsevier Science prints its books on acid-free paper whenever possible. Library of Congress Cataloging-in-Publication Data ISBN 1-55558-298-2 British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. The publisher offers special discounts on bulk orders of this book. For information, please contact: Manager of Special Sales Elsevier Science 200 Wheeler Road Burlington, MA 01803 Tel: 781-313-4700 Fax: 781-313-4882 For information on all Digital Press publications available, contact our World Wide Web home page at: http://www.digitalpress.com or http://www.bh.com/digitalpress 1098765432 1 Printed in the United States of America To Linda Speed~my split apart. -T.S. To my dad, Charles Ellis. -J.E. This Page Intentionally Left Blank Contents Foreword ix Acknowledgments xi Introduction xiii The Internet and Security I. I The
    [Show full text]
  • Novell Bordermanager 3.9 Installation Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Installation Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com INSTALLATION GUIDE April 05, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Novell Zenworks 6.5 Desktop Management Installation Guide May 19, 2006
    Novell Confidential Manual (ENU) 21 December 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATION GUIDE May 19, 2006 Novell Confidential Manual (ENU) 21 December 2004 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to www.novell.com/info/exports/ for more information on exporting Novell software.
    [Show full text]
  • Hacking for Dummies.Pdf
    01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page v 01 55784X FM.qxd 3/29/04 4:16 PM Page i Hacking FOR DUMmIES‰ by Kevin Beaver Foreword by Stuart McClure 01 55784X FM.qxd 3/29/04 4:16 PM Page ii Hacking For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 Copyright © 2004 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, e-mail: permcoordinator@ wiley.com. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson Et Al
    USOO8943 201B2 (12) United States Patent (10) Patent No.: US 8,943,201 B2 Larson et al. (45) Date of Patent: Jan. 27, 2015 (54) METHOD FORESTABLISHING ENCRYPTED (58) Field of Classification Search CHANNEL USPC .......................................... 709/225 229, 245 See application file for complete search history. (75) Inventors: Victor Larson, Fairfax, VA (US); Robert Dunham Short, Leesburg, VA (56) References Cited (US); Edmund Colby Munger, Crownsville, MD (US); Michael U.S. PATENT DOCUMENTS Williamson, South Riding, VA (US) 2,895,502 A 7/1959 Roper et al. 4.405,829 A 9, 1983 RiveSt (73) Assignee: VirnetX, Inc., Zephyr Cove, NV (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 FOREIGN PATENT DOCUMENTS U.S.C. 154(b) by 0 days. DE 1992.4575 12/1999 EP O838.930 4f1988 (21) Appl. No.: 13/285,962 (Continued) (22) Filed: Oct. 31, 2011 OTHER PUBLICATIONS (65) Prior Publication Data Exhibit G, Opening Expert Report of Dr. Stuart Stubblebine Regard ing Invalidity of the 135,211, and 504 Patents. US 2012/OO4208.6 A1 Feb. 16, 2012 (Continued) Related U.S. Application Data Primary Examiner — Krisna Lim (60) Continuation of application No. 1 1/679,416, filed on (74) Attorney, Agent, or Firm — McDermott, Will & Emery Feb. 27, 2007, now Pat. No. 8,051,181, which is a continuation of application No. 10/702,486, filed on (57) ABSTRACT Nov. 7, 2003, now Pat. No. 7,188,180, which is a A technique is disclosed for establishing a secure communi cation link between a first computer and a second computer (Continued) over a computer network.
    [Show full text]
  • Supported Log File Formats
    Supported Log File Formats Vendor/Product Log Format Analyzer Analyzer Vantage & Live Standard Premium & Vantage Giga Analyzer Giga 3Com 3Com Firewall Yes Yes Yes Yes 8e6 R2000 Yes Yes Yes Yes 8e6 R3000 Yes Yes Yes Yes Aladin Esafe Blocked Logs Yes Yes No Yes Allied Telesyn ATI Level 3 No No Yes No Switch Model 9812 Apache HTTP Server - Yes Yes Yes Yes Access Log Applied Data Control Native Log Yes Yes No Yes Arkoon SMTP No Yes Yes Yes Arkoon Web (WELF) Yes Yes Yes Yes Arkoon Arkoon Yes *New Yes *New No Yes *New Firewall Astaro Native Syslog Yes Yes Yes Yes 3 Avirt Proxy Native Log Yes Yes Yes Yes AVM AVM Ken! Yes *New Yes *New No Yes *New Barracuda Networks Spam Firewall No No Yes *New No (CSV Format) Barracuda Networks Spam Firewall No No Yes *New No (Syslog Format) Bintec VPN Bintec VPN 25 No No Yes No Bloxx Proxy Server W3C Log No No Yes *New No Bluecoat Proxy SG Yes Yes Yes Yes Common Log Bluecoat Proxy SG Yes Yes Yes Yes Squid Native Log Bluecoat Proxy SG W3C Yes Yes Yes Yes Log Bluecoat Instant No No Yes *New No Messaging Log W3C Bluecoat Websense Yes Yes No Yes BlueReef Virtual Server SQUID Native Yes Yes Yes Yes Log Borderware Firewall Yes Yes Yes *New Yes Borderware Direct Packet No No Yes *New No Borderware Mail Yes Yes Yes *New Yes BT Proxy Native Log Yes Yes No Yes CacheFlow Proxy Squid Log Yes Yes No Yes CacheXpress Squid Log Yes Yes Yes Yes CC Proxy Native Log Yes 1 Yes Yes Yes Checkpoint Firewall-1 Yes 1 *Mod Yes *Mod Yes No Checkpoint Firewall Yes 1 *Mod Yes *Mod Yes No Custom Checkpoint NG Yes 1 *Mod Yes *Mod Yes No CipherTrust
    [Show full text]
  • Novell Bordermanager 3.9 Administration Guide Novdocx (ENU) 29 January 2007
    Novell BorderManager 3.9 Administration Guide novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Novell BorderManager 3.9 www.novell.com ADMINISTRATION GUIDE April 5, 2007 novdocx (ENU) 29 January 2007 January 29 (ENU) novdocx Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes. Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
    [Show full text]
  • Log & Event Manager
    Log & Event Manager Copyright © 1995-2012 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the written consent of SolarWinds. All right, title, and interest in and to the software and documentation are and shall remain the exclusive property of SolarWinds and its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds, the SolarWinds & Design, ipMonitor, LANsurveyor, Orion, and other SolarWinds marks, identified on the SolarWinds website, as updated from SolarWinds from time to time and incorporated herein, are registered with the U.S. Patent and Trademark Office and may be registered or pending registration in other countries. All other SolarWinds trademarks may be common law marks or registered or pending registration in the United States or in other countries. All other trademarks or registered trademarks contained and/or mentioned herein are used for identification purposes only and may be trademarks or registered trademarks of their respective companies. Microsoft®, Windows®, and SQL Server® are registered trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]
  • Novells Guide to Bordermanager Pdf, Epub, Ebook
    NOVELLS GUIDE TO BORDERMANAGER PDF, EPUB, EBOOK J.D. Marymee, Sandy Stevens | 384 pages | 01 Jan 1998 | John Wiley & Sons Inc | 9780764545405 | English | Foster City, United States pdfFiller. On-line PDF form Filler, Editor, Type on PDF, Fill, Print, Email, Fax and Export All of the information presented in this book has been gathered from hands-on, real world experiences of the authors. A best-seller that once showed you how to reign in a panther can now show you …. Today, software engineers need to know not only how to program effectively but also how to …. You Will Learn Python 3! Zed Shaw has perfected the world's best system for learning Python …. If you think you should have access to this content, click the button to contact our support team. Contact us. To read the full version of this content please select one of the options below. You may be able to access this content by logging in via Shibboleth, Open Athens or with your Emerald account. To rent this content from Deepdyve, please click the button. Rent from Deepdyve. Join us on our journey Platform update page Visit emeraldpublishing. This retrieval method along with NetWare's fast file IO and other proprietary code made BorderManager's proxy engine one of the fastest in existence. This makes it possible for the customer to choose which NetWare or Linux kernel the services will run on. At this time Novell all but announced the end of development for the NetWare kernel numerous public and private statements that there is no bit future for NetWare and that Linux is the path to bit computing for OES.
    [Show full text]
  • Novell Zenworks Desktop Management? 17 Automatisches Importieren Und Entfernen Von Arbeitsstationen
    Novell Confidential Manual (DEU) 6 October 2004 Novell ZENworks® Desktop Management 6.5 www.novell.com INSTALLATIONSHANDBUCH 11.02.05 Novell Confidential Manual (DEU) 6 October 2004 Rechtliche Belange Novell, Inc., leistet keinerlei Gewähr bezüglich des Inhalts oder Gebrauchs dieses Handbuchs. Insbesondere werden keine ausdrücklichen oder stillschweigenden Gewährleistungen hinsichtlich der handelsüblichen Qualität oder Eignung für einen bestimmten Zweck übernommen. Novell, Inc. behält sich weiterhin das Recht vor, diese Dokumentation zu revidieren sowie ihren Inhalt jederzeit und ohne vorherige Ankündigung zu ändern. Novell, Inc. gibt ebenfalls keine Erklärungen oder Garantien in Bezug auf Softwareprodukte und schließt insbesondere jegliche ausdrückliche oder stillschweigende Garantie auf Marktgängigkeit oder Eignung für einen bestimmten Zweck aus. Außerdem behält sich Novell, Inc. das Recht vor, Novell-Software jederzeit ganz oder teilweise zu ändern, ohne dass für Novell, Inc. die Verpflichtung entsteht, Personen oder Organisationen von diesen Änderungen in Kenntnis zu setzen. Die Ausfuhr bzw. die Wiederausfuhr dieses Produkts ist nur im Rahmen gültiger Gesetze bzw. Richtlinien, darunter die US-Exportbestimmungen bzw. Gesetze Ihres Heimatlands, gestattet. Copyright © 2005 Novell, Inc. Alle Rechte vorbehalten. Ohne ausdrückliche schriftliche Genehmigung des Herausgebers darf kein Teil dieser Veröffentlichung reproduziert, fotokopiert, übertragen oder in einem Speichersystem verarbeitet werden. Novell, Inc., besitzt die Rechte auf geistiges Eigentum für die Technologie, die in dem in dieser Dokumentation beschriebenen Produkt enthalten ist. Diese Rechte auf geistiges Eigentum umfassen möglicherweise insbesondere ein oder mehrere Patente in den USA, die unter http://www.novell.com/ company/legal/patents aufgeführt sind (ohne darauf beschränkt zu sein). Diese Rechte umfassen möglicherweise außerdem ein oder mehrere andere Patente oder laufende Patentanträge in den USA und in anderen Ländern.
    [Show full text]
  • Appendix a Practical Technical Implementation
    Optimising Internet Bandwidth in Developing Country Higher Education Appendix A Practical technical implementation 1. Web caching A Web proxy server is a server on the local network that keeps copies of recently retrieved or often used Web pages, or parts of pages. When the next person retrieves these pages, they are served from the local proxy server instead of from the Internet. This results in faster Web access in most cases. Bandwidth usage can also be reduced. When a proxy server is implemented, the administrator should also be aware that some pages are not cacheable – for example, pages that are the output of server-side scripts. Loading of Web pages is also affected. Where previously the page would begin to load slowly, first showing some text and then displaying the graphics one by one, in a network with a proxy server, there could be a delay when nothing seems to happen, and then the page will load almost at once. The time it takes to load the whole page might take 10 seconds, whereas without a proxy server it may take 30 seconds, but unless this is explained to some impatient users, they may say the proxy server has made things slower. It is usually the task of the network administrator to deal with user perception like these. 1.1 Proxy server products Squid. Open source Squid is the de facto standard at universities. It is free, reliable, easy to use and can be enhanced with for example content filtering and advertisement blocking. Squid produces logs that can be analysed using software such as Sawmill (commercial) or Awstats, Webalizer (Open Source), both of which produce good graphical reports.
    [Show full text]