? If there are,
what affect, if any will these encryption methods have on our overall
network security.
Yes. Search VPN.
--
Jose Celestino | http://xpto.org/~japc/files/japc-pgpkey.asc
Don't summarize. Don't abbreviate. Don't
) are on common PCs, Celeron at 300 if I recall it...
http://www.freeswan.org
--
Jose Celestino | http://xpto.org/~japc/files/japc-pgpkey.asc
Lately, the only thing keeping me from becoming a serial killer is my distaste
for manual labor
,
Leon
-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.8 for non-commercial use http://www.pgp.com
iQA/AwUBPCWJJNqAgf0xoaEuEQJk6ACgoMZGQadBjlaq3BnjMbu5WxU9JjwAnAku
SKwvfVlup+n4o9kYRVpwNG6Z
=omtJ
-END PGP SIGNATURE-
--
Jose Celestino [EMAIL PROTECTED
itself comes with a handful of
useful examples that do what you whant.
-Kumar
--
Jose Celestino [EMAIL PROTECTED]
-
Dyslexics retyping hosts file on servers