Sentriant™ AG

Total Page:16

File Type:pdf, Size:1020Kb

Sentriant™ AG Extreme Networks Data Sheet ™ Sentriant AG While efforts to improve network security have been focused on locking down the network perimeter and securing critical internal network assets, the security of endpoint devices, which make up the majority of networks, have gone largely untouched. Attackers, however, are increasingly targeting endpoint devices, such as LAN workstations, remote access laptops and home computers to compromise networks. Their motivation is simple: endpoint devices typically bypass standard perimeter security measures and connect directly into the network. Extreme Networks® Sentriant™ AG verifies that Endpoint policy compliance—protects the network by making endpoint devices, such as laptops and desktops, certain that endpoint devices are free from threats and accessing the network are free from security in compliance with IT security policies. threats and in compliance with the organization’s security standards. It systematically tests end- point devices for compliance with organizational Noncompliant Endpoint Remediation security policies, quarantining non-compliant • Flexible access policies machines before they can damage the network. • Agent-less solution Sentriant AG dramatically reduces the cost and • Protection for remote and local connections effort of securing those devices—devices used by remote employees and contractors using VPN Comprehensive Yet Scalable Solution or dial-up, devices connecting to the network directly, and devices connecting through • Deep endpoint testing wireless networks—including devices your IT • Simple, easy deployment group may not own or adequately control. • Flexible enforcement options Target Applications Powerful Enterprise Integration • Wireless and mobile computing • Enterprise Integration Framework • Regulatory compliance for security initiatives • Sharing endpoint compliance data • Quarantines endpoint devices that are not in compliance • Acting on input from other systems • Remote access using devices that are not controlled by the organization Endpoint security—Safeguarding your network. Extreme Networks Data Sheet Noncompliant Endpoint Remediation Sentriant AG intercepts device connections and examines the connecting device to see if it meets the organization’s policies for security such as security settings, patches and antivirus safeguards. Devices not meeting policy can be denied access or quarantined. Flexible Access Policies • Sentriant AG agent—Tests method, while on remote access or VPN endpoint through installed client connections, the agent-less option might be Using Sentriant AG, administrators the desirable method. create access policies that define which applications and services are permitted The agent-less option is ideal for testing ® Protects Remote and Local and specify the actions to be taken when Windows 2000 and Windows XP Pro devices do not comply. Sentriant AG machines. It offers zero-maintenance device Connections administration as no client needs to be tracks all testing and connection activity Sentriant AG also protects the LAN from installed or supported on the endpoint. and produces a range of reports for threats by remote users or from internal auditors, managers and IT staff. users. Any machine that poses a risk can be The ActiveX plug-in tests all Microsoft– quarantined, whether that machine is supported Windows operating systems and connecting from an external location via a Agentless Solution foreign endpoints where an installed agent VPN, or connecting locally (see Figure 1). Sentriant AG is very simple to deploy is impractical. because it does not require an agent to VPN connections secure information, but be installed on endpoint devices. Sentriant AG agent also tests all Microsoft– they do not protect your network from However, for organizations that prefer an supported Windows operating systems and infected devices or malicious traffic. agent-based approach, Sentriant AG can be used for internal legacy devices such Sentriant AG identifies remote devices that provides that alternative too. There are as those running Windows 98 or NT. three options for testing endpoint pose a threat and quarantines the device. devices: Administrators can prioritize the order that Sentriant AG also protects from threats by • Agent-less—No client-side agent testing options are applied as devices initially internal users (see Figure 2). Compliant required on endpoint connect to the network. For example, on an devices are allowed LAN access while internal network, the Sentriant AG agent • ActiveX plugin—Tests endpoint noncompliant devices are quarantined. through web browser might be selected as the preferred testing Sentriant AG Firewall VPN and Pass RAS Up-to-date Corporate-owned LAN Computer Internet Cable Fail Modem Unpatched Home Computer New Connections Tested by Sentriant AG ! Quarantine Deny access completely or give limited access Figure 1: Protection from Remote Users DHCP Sentriant AG Server Firewall 1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 17 19 20 21 22 23 24 1 2 3 4 5 6 7 8 9 11 12 13 14 15 16 17 19 20 21 22 23 24 STACK NO STACK NO Internet CONSOLE CONSOLE Edge Switch Core Switch Fail Pass ! Quarantine New Connections Tested by Sentriant AG Figure 2: Protection for internal LAN Connections © 2006 Extreme Networks, Inc. All rights reserved. Sentriant AG—Page 2 Extreme Networks Data Sheet Comprehensive and Scalable Solution Sentriant AG is a powerful endpoint security solution that provides deep and comprehensive testing of endpoint devices. At the same time, it is easily deployed, supports industry standards and scales to meet the needs of the largest organizations. Flexible Enforcement Options – Software required and software Linux operating system, so the installation not allowed—Defined by process is fast, easy and completely self- Sentriant AG supports IEEE 802.1x, administrator contained. Because Sentriant AG requires DHCP, inline and other enforcement – Worms, viruses and Trojans— no client-side agents, setup, administra- schemes for maximum deployment Checks for the presence of dozens tion and deployment is greatly simplified. options and easy integration with existing of attacks and infections security systems. These industry-wide Sentriant AG easily scales from the initiatives enable the network infrastruc- Simple, Easy Deployment smallest to the largest networks. Most ture to enforce security policy compli- importantly, the solution is cost-effective. ance on all devices seeking to access Sentriant AG installs on a dedicated network computing resources. server. Installation includes the hardened Sentriant AG also adds extensive policy compliance and enforcement features in order to verify that the applications and Network Protection services running on endpoint devices comply with security and access policies. Feature Benefit Figure 3 highlights the key features and Tests endpoints as they connect to the network Mitigates network damage caused by infected or benefits of the Sentriant AG. unsafe endpoints Test library updated as frequently as hourly Automatically protects against newly released threats Deep Endpoint Testing Multiple test categories, dozens of tests Protects from the range of endpoint-specific threats Access policies consist of one or more Fast custom test creation through open API Organization-specific testing tests to assess operating system Flexible enforcement options (grant, deny or quarantine Does not inhibit the flow of business integrity, verify that key hotfixes and access) driven by corporate security policies patches have been installed, verify that Offers range of enforcement on a per access policy basis, Graduated enforcement anti-virus and other security applications from passive monitoring (no enforcement) to strict are present and up-to-date and detect enforcement; allows controlled rollout of Sentriant AG the presence of other malware. Any Unlimited number of customizable access policies tailored to, Provides tailored testing/enforcement for variety of incidence of potentially dangerous for example, the level of threat, operating system and user types (e.g., visitors, executive staff and Windows applications such as file sharing, Peer-to- organizational requirements 2000 users) Peer (P2P), or spyware is also checked. Enterprise Integration Framework: Leverages existing network security investments • Allows import/export of security compliance data Administrators can also create custom • Allows third-party systems to control Sentriant AG functions tests through Sentriant AG’s Application Programming Interface (API). Sentriant Compliance and Reporting AG ships with dozens of out-of-the box Tests endpoints against user-defined access policies Verifies that endpoints conform to security policy(s) tests in the following categories: Regularly retests endpoints while logged in on administrator- Eliminates threat from endpoints that become non- specified schedules compliant while connected • Operating systems—Tests for services packs and hotfixes Endusers of non-compliant endpoints informed of the steps Reduces administrative overhead required to bring devices into compliance • Browser security policy—Verifies Detailed reporting meets the needs of auditors, managers and Documents security/compliance status browser security settings match the IT staff members organization’s policy Administration • Security settings—Tests for Offers three flexible endpoint testing methods: Maximizes protection/endpoint coverage with macros, services, Windows security • Agent-less minimal demands on IT resources
Recommended publications
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • System Administration Guide for Cisco Unity Connection Release 7.X Revised May 2009
    System Administration Guide for Cisco Unity Connection Release 7.x Revised May 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-17017-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Cheat Sheet – Common Ports (PDF)
    COMMON PORTS packetlife.net TCP/UDP Port Numbers 7 Echo 554 RTSP 2745 Bagle.H 6891-6901 Windows Live 19 Chargen 546-547 DHCPv6 2967 Symantec AV 6970 Quicktime 20-21 FTP 560 rmonitor 3050 Interbase DB 7212 GhostSurf 22 SSH/SCP 563 NNTP over SSL 3074 XBOX Live 7648-7649 CU-SeeMe 23 Telnet 587 SMTP 3124 HTTP Proxy 8000 Internet Radio 25 SMTP 591 FileMaker 3127 MyDoom 8080 HTTP Proxy 42 WINS Replication 593 Microsoft DCOM 3128 HTTP Proxy 8086-8087 Kaspersky AV 43 WHOIS 631 Internet Printing 3222 GLBP 8118 Privoxy 49 TACACS 636 LDAP over SSL 3260 iSCSI Target 8200 VMware Server 53 DNS 639 MSDP (PIM) 3306 MySQL 8500 Adobe ColdFusion 67-68 DHCP/BOOTP 646 LDP (MPLS) 3389 Terminal Server 8767 TeamSpeak 69 TFTP 691 MS Exchange 3689 iTunes 8866 Bagle.B 70 Gopher 860 iSCSI 3690 Subversion 9100 HP JetDirect 79 Finger 873 rsync 3724 World of Warcraft 9101-9103 Bacula 80 HTTP 902 VMware Server 3784-3785 Ventrilo 9119 MXit 88 Kerberos 989-990 FTP over SSL 4333 mSQL 9800 WebDAV 102 MS Exchange 993 IMAP4 over SSL 4444 Blaster 9898 Dabber 110 POP3 995 POP3 over SSL 4664 Google Desktop 9988 Rbot/Spybot 113 Ident 1025 Microsoft RPC 4672 eMule 9999 Urchin 119 NNTP (Usenet) 1026-1029 Windows Messenger 4899 Radmin 10000 Webmin 123 NTP 1080 SOCKS Proxy 5000 UPnP 10000 BackupExec 135 Microsoft RPC 1080 MyDoom 5001 Slingbox 10113-10116 NetIQ 137-139 NetBIOS 1194 OpenVPN 5001 iperf 11371 OpenPGP 143 IMAP4 1214 Kazaa 5004-5005 RTP 12035-12036 Second Life 161-162 SNMP 1241 Nessus 5050 Yahoo! Messenger 12345 NetBus 177 XDMCP 1311 Dell OpenManage 5060 SIP 13720-13721
    [Show full text]
  • Protocol Filter Planning Worksheet, V7.X
    Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger
    [Show full text]
  • Procurve Network Access Controller 800
    ProCurve Network Access Controller 800 The ProCurve Network Access Controller (NAC) 800 combines a RADIUS- based authentication server and the ability to validate the integrity of the systems connecting to the network, allowing network administrators to secure the network from unauthorized users and systems that pose a threat to the network resources. ProCurve Network Access Controller 800 (J9065A) ProCurve Network Access Controller 800 Features and benefits Resiliency and high availability Management • Enforcement server resiliency and redundancy: enable high network availability • Centralized endpoint policy management: for mission-critical LAN deployments; endpoint testing policies are centrally enforcement servers continue to provide managed by a single management server and authentication and endpoint testing services in shared by up to ten enforcement servers the absence of a management server and can be configured in clusters to provide • Administration console: a Web-based console redundancy and load-balancing for endpoint provides an easy-to-use interface for testing configuring endpoint policies and enforcement clusters as well as a dashboard-style interface Security for viewing the status of endpoint integrity testing • Built-in RADIUS server: can perform authentication services or act as a proxy server • Default testing policies: default testing for a remote RADIUS authentication service policies provide a great starting point for endpoint testing and can be easily utilized as • Supports standard-based or a local the basis
    [Show full text]
  • The Most Dangerous Code in the World: Validating SSL Certificates In
    The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software Martin Georgiev Subodh Iyengar Suman Jana The University of Texas Stanford University The University of Texas at Austin at Austin Rishita Anubhai Dan Boneh Vitaly Shmatikov Stanford University Stanford University The University of Texas at Austin ABSTRACT cations. The main purpose of SSL is to provide end-to-end security SSL (Secure Sockets Layer) is the de facto standard for secure In- against an active, man-in-the-middle attacker. Even if the network ternet communications. Security of SSL connections against an is completely compromised—DNS is poisoned, access points and active network attacker depends on correctly validating public-key routers are controlled by the adversary, etc.—SSL is intended to certificates presented when the connection is established. guarantee confidentiality, authenticity, and integrity for communi- We demonstrate that SSL certificate validation is completely bro- cations between the client and the server. Authenticating the server is a critical part of SSL connection es- ken in many security-critical applications and libraries. Vulnerable 1 software includes Amazon’s EC2 Java library and all cloud clients tablishment. This authentication takes place during the SSL hand- based on it; Amazon’s and PayPal’s merchant SDKs responsible shake, when the server presents its public-key certificate. In order for transmitting payment details from e-commerce sites to payment for the SSL connection to be secure, the client must carefully verify gateways; integrated shopping carts such as osCommerce, ZenCart, that the certificate has been issued by a valid certificate authority, Ubercart, and PrestaShop; AdMob code used by mobile websites; has not expired (or been revoked), the name(s) listed in the certifi- Chase mobile banking and several other Android apps and libraries; cate match(es) the name of the domain that the client is connecting Java Web-services middleware—including Apache Axis, Axis 2, to, and perform several other checks [14, 15].
    [Show full text]
  • The Complete Solutions Guide for Every Linux/Windows System Administrator!
    Integrating Linux and Windows Integrating Linux and Windows By Mike McCune Publisher : Prentice Hall PTR Pub Date : December 19, 2000 ISBN : 0-13-030670-3 • Pages : 416 The complete solutions guide for every Linux/Windows system administrator! This complete Linux/Windows integration guide offers detailed coverage of dual- boot issues, data compatibility, and networking. It also handles topics such as implementing Samba file/print services for Windows workstations and providing cross-platform database access. Running Linux and Windows in the same environment? Here's the comprehensive, up-to-the-minute solutions guide you've been searching for! In Integrating Linux and Windows, top consultant Mike McCune brings together hundreds of solutions for the problems that Linux/Windows system administrators encounter most often. McCune focuses on the critical interoperability issues real businesses face: networking, program/data compatibility, dual-boot systems, and more. You'll discover exactly how to: Use Samba and Linux to deliver high-performance, low-cost file and print services to Windows workstations Compare and implement the best Linux/Windows connectivity techniques: NFS, FTP, remote commands, secure shell, telnet, and more Provide reliable data exchange between Microsoft Office and StarOffice for Linux Provide high-performance cross-platform database access via ODBC Make the most of platform-independent, browser-based applications Manage Linux and Windows on the same workstation: boot managers, partitioning, compressed drives, file systems, and more. For anyone running both Linux and Windows, McCune delivers honest and objective explanations of all your integration options, plus realistic, proven solutions you won't find anywhere else. Integrating Linux and Windows will help you keep your users happy, your costs under control, and your sanity intact! 1 Integrating Linux and Windows 2 Integrating Linux and Windows Library of Congress Cataloging-in-Publication Data McCune, Mike.
    [Show full text]
  • Xfire Hopman
    ToTo findfind outout howhow ServiceService ProvidersProviders oror OperatorsOperators cancan buildbuild wirelesswireless meshedmeshed networknetwork solutionssolutions usingusing HoplingHopling TechnologiesTechnologies productsproducts visitvisit www.hopling.comwww.hopling.com oror callcall +31+31 3636 538538 42364236 hopling Technologies Xfire Hopman - Network Element Manager The Power Behind Wireless Communications Rapid deployment of new services with consistent Quality of Service Xfire Hopman The Xfire Hopman Network Element Manager is a centralized network HM.01.110 management system that delivers sophisticated management information nd and control of elements in a wireless meshed network. The Xfire Hopman llan Ho manages the nodes, bridges, gateways in a wireless meshed network on a in ade single platform and provides a complete management solution, enabling you M to easily integrate and interoperate the system with existing or new hardware devices and other network management systems. By using the Xfire Hopman , operators and service providers can gain access to the wireless network to diagnose and control Brochure Version 1.3 –DecemberVersion 1.3 Brochure 2005 network elements, identify nodes, bridges, gateways, set up network parameters, and monitor network performance. The Xfire Xfire Hopman Hopman provides network topology for a Network Element Manager true representation of the network and real-time network status. Functionality • Reduces operational expense by simplifying element management processes. • Streamlines the wireless meshed network management through a common interface . • Speeds node, bridge, gateway element provisioning with point-and-click operations to establish end-to-end network connectivity rapidly. • Ensures consistent, simplified logical provisioning of individual nodes, bridges, gateways through a series of pull-down menus . • Provides performance quality and reliability by establishing a variety of traps for alarm indications and statistics logging for all elements in the wireless meshed network.
    [Show full text]
  • DVD-Ofimática 2014-07
    (continuación 2) Calizo 0.2.5 - CamStudio 2.7.316 - CamStudio Codec 1.5 - CDex 1.70 - CDisplayEx 1.9.09 - cdrTools FrontEnd 1.5.2 - Classic Shell 3.6.8 - Clavier+ 10.6.7 - Clementine 1.2.1 - Cobian Backup 8.4.0.202 - Comical 0.8 - ComiX 0.2.1.24 - CoolReader 3.0.56.42 - CubicExplorer 0.95.1 - Daphne 2.03 - Data Crow 3.12.5 - DejaVu Fonts 2.34 - DeltaCopy 1.4 - DVD-Ofimática Deluge 1.3.6 - DeSmuME 0.9.10 - Dia 0.97.2.2 - Diashapes 0.2.2 - digiKam 4.1.0 - Disk Imager 1.4 - DiskCryptor 1.1.836 - Ditto 3.19.24.0 - DjVuLibre 3.5.25.4 - DocFetcher 1.1.11 - DoISO 2.0.0.6 - DOSBox 0.74 - DosZip Commander 3.21 - Double Commander 0.5.10 beta - DrawPile 2014-07 0.9.1 - DVD Flick 1.3.0.7 - DVDStyler 2.7.2 - Eagle Mode 0.85.0 - EasyTAG 2.2.3 - Ekiga 4.0.1 2013.08.20 - Electric Sheep 2.7.b35 - eLibrary 2.5.13 - emesene 2.12.9 2012.09.13 - eMule 0.50.a - Eraser 6.0.10 - eSpeak 1.48.04 - Eudora OSE 1.0 - eViacam 1.7.2 - Exodus 0.10.0.0 - Explore2fs 1.08 beta9 - Ext2Fsd 0.52 - FBReader 0.12.10 - ffDiaporama 2.1 - FileBot 4.1 - FileVerifier++ 0.6.3 DVD-Ofimática es una recopilación de programas libres para Windows - FileZilla 3.8.1 - Firefox 30.0 - FLAC 1.2.1.b - FocusWriter 1.5.1 - Folder Size 2.6 - fre:ac 1.0.21.a dirigidos a la ofimática en general (ofimática, sonido, gráficos y vídeo, - Free Download Manager 3.9.4.1472 - Free Manga Downloader 0.8.2.325 - Free1x2 0.70.2 - Internet y utilidades).
    [Show full text]
  • Protection and Restriction to the Internet
    Protection and restriction to the internet Dear wireless users, To allow all our users to enjoy quality browsing experience, our firewall has been configured to filter websites/applications to safeguards the interests of our student community in ensuring uninterrupted access to the Internet for academic purposes. In the process of doing this, the firewall will block access to the applications listed in the table below during peak hours ( Weekdays: 8:30am to 5pm ) which: o may potentially pose security hazards o result in excessive use of bandwidth, thereby reducing access to online and educational resources by the larger student community o could potentially result in violation of Malaysian Laws relating to improper and illegal use of the Internet Nevertheless, you may access the restricted websites/applications if they do not potentially pose any security hazards or violation of Malaysian law from our lab computers during our operation hours (Weekdays: 8:30am – 9:30pm) or you may access via the wireless@ucti or wireless@APU network from your mobile devices after the peak hours. Internet services provided by the University should mainly be used for collaborative, educational and research purposes in support of academic activities carried out by students and staff. However, if there are certain web services which are essential to students' learning, please approach Technology Services to discuss how access could be granted by emailing to [email protected] from your university email with the following details: • Restricted website/application
    [Show full text]
  • Xfire Hopbase
    ToTo findfind outout howhow enterprises,enterprises, operatorsoperators andand serviceservice providersproviders can can buildbuild WirelessWireless solutionssolutions usingusing HoplingHopling TechnologiesTechnologies productsproducts visitvisit www.hopling.comwww.hopling.com or or callcall +31+31 3636 548548 68686868 hopling Technologies Xfire Hopbase - Network Services Manager The Power Behind Wireless Communications Create seamless broadband networks Xfire Hopbase A wireless meshed network based on Hopling HB.01.110 Technologies nodes needs to be connected to at least one broadband Internet connection. User nd llan authentication is performed at the interconnection of Ho the wireless meshed network and the broadband in ade connection. This authentication is necessary because Xfire Hopbase M in principle the wireless meshed network is open to Network Services Manager anyone that is capable of connecting to a standard Hopling Technologies node. To prevent any unauthorized users from using the networks resources, such as browsing the Internet and using FlyerVersion 1.4–December 2005 Mesh Routing Email services, authentication takes place by the A major advantage of Hopling Xfire Hopbase Network Services Manager (Bandwidth Technologies’ Mesh Routing over Controller, Database-, DNS-, Login-, Radius- traditional Point-to-Point links is Security- and VPN-services). Only users which are that each node added to the successfully authenticated can use the network. network enhances the network as Authentication can take place via Radius or through a whole. With the self healing the Hopling Technologies’ “Direct User Control” mesh routing algorithms the protocol. network has no single point of failure, ensuring a reliable VPN server solution wireless seamless connection for your customers. Secure user authentication is performed in two steps: 1) A wireless customer connects to the nearest Hopling Technologies node.
    [Show full text]
  • DVD-Libre 2007-12 DVD-Libre Diciembre De 2007 De Diciembre
    (continuación) Java Runtime Environment 6 update 3 - Java Software Development Kit 6 update 3 - JClic 0.1.2.2 - jEdit 4.2 - JkDefrag 3.32 - jMemorize 1.2.3 - Joomla! 1.0.13 - Juice Receiver 2.2 - K-Meleon 1.1.3 - Kana no quiz 1.9 - KDiff3 0.9.92 - KeePass 1.04 Catalán - KeePass 1.09 - KeePass 1.09 Castellano - KeyJnote 0.10.1 - KeyNote 1.6.5 - Kicad 2007.07.09 - Kitsune 2.0 - Kompozer 0.7.10 - Kompozer 0.7.10 Castellano - KVIrc 3.2.0 - Launchy 1.25 - Lazarus 0.9.24 - LenMus 3.6 - Liberation Fonts 2007.08.03 - lightTPD 1.4.18-1 - Lilypond 2.10.33-1 - Linux DVD-Libre Libertine 2.6.9 - LockNote 1.0.4 - Logisim 2.1.6 - LPSolve IDE 5.5.0.5 - Lynx 2.8.6 rel2 - LyX 1.5.2-1 - LyX 1.5.2-1 cdlibre.org Bundle - Macanova 5.05 R3 - MALTED 2.5 - Mambo 4.6.2 - Maxima 5.13.0 - MD5summer 1.2.0.05 - Media Player Classic 6.4.9.0 Windows 9X / Windows XP - MediaCoder 0.6.0.3996 - MediaInfo 0.7.5.6 - MediaPortal 0.2.3.0 - 2007-12 MediaWiki 1.11.0 - Memorize Words Flashcard System 2.1.1.0 - Mercurial 0.9.5 - Minimum Profit 5.0.0 - Miranda IM 0.7.3 Windows 9X / Windows XP - Miro 1.0 - Mixere 1.1.00 - Mixxx 1.5.0.1 - mod_python 3.3.1 (py 2.4 - ap 2.0 / py 2.4 - ap 2.2 / py 2.5 - ap 2.0 / py 2.5 - ap 2.2) - Mono 1.2.4 - MonoCalendar 0.7.2 - monotone 0.38 - Moodle DVD-Libre es una recopilación de programas libres para Windows.
    [Show full text]