On Tue, Mar 6, 2012 at 12:34 PM, michael-dev wrote:
> Hi,
>
> just to give you feedback that your thread is actually followed.
This is great!
> I believe the different types of configuration are good and correct and
> that a good threat analysis is a basic step to proper security, though I
> can
Hi,
just to give you feedback that your thread is actually followed.
I believe the different types of configuration are good and correct and
that a good threat analysis is a basic step to proper security, though I
cannot say much about the isolation tricks on Windows. The important
think is, a
OK,
I will continue to discuss this with my-self, as apparently what I am
showing is not significant enough to have a proper technical
discussion. There is nothing wrong in open mind to other
possibilities, evaluate and with rational select the best approach.
For the lazy people of us, I added ins
Hello Again,
To make it easier to understand and help to demonstrate the
technology, I created skeleton[1] for the alternative I suggested.
It uses the COM+ infrastructure to achieve what we need avoiding
complex programming.
We have two COM+ objects:
OpenVPNUI.Network - runs under user belongs
Hello,
Following recent discussion on Windows platform, I open a new thread.
I don't think this topic is Windows specific as the security
principals are the same.
VPN client product has [at least] two different type of configuration.
1. Standalone configuration.
2. Enterprise configuration.
Th