OpenVPN Ready for Business?
June 6, 2007
AntiOnline Spotlight: A question about this open source VPN software yields meaningful insight into the world of corporate security. Also, Ubuntu experiences; efficient network design; and adventures in botched data recovery.
I really think you should consider securing things on both ends of the VPN and using several layers of security
If you want some semblance of security with remote users, users should run on limited accounts from machines that are secure, maybe even using a hardware VPN solution, point to point, each user has a VPN router on their end.
Guess it depends on budget, how many users and what type of activity and transactions they will be doing.
The Great Ubuntu Migration
For older systems I'd go with Slackware or FreeBSD, they still run on 486s. For GUI stuff though, it depends what you use. Gnome and KDE are going to eat up RAM, and Enlightenment could, but I have gotten it to run fine on a 433 MHz Celeron with 192 MBs RAM.
FVWM2 would run probably the same on a 486 as it would on a Pentium, or even P2, and there are others with less eye candy that can go back to the 486 machines and be fine on.
Efficient Network Design
Blunted One seeks some answers...
I have been presented with the task of coming up with a couple of budgets to upgrade/revamp our network.
Such things that have been a problem are that the File server, app server is slow to access if you are on the other side of our office due to the fact (as far as I can tell) that there are only two Gbit Ethernet ports connecting one side of the office to the other even though over half of our staff is connected through those lines to the main network/server closet.
Since we push a ton of data -- I am talking many Gigabytes a day all over the network -- I was thinking what would be best to resolve these issues and get our network up to a lighting pace...
Verification of single sign on system integration
Botched Data Recovery
Also, be sure catch up on today's posts. Not a member? Join today.