26 relations: Authentication, AuthIP, Berkeley Software Distribution, Encryption, Extensible Authentication Protocol, Firewall (computing), HTTPS, Internet Initiative Japan, Linux, Microsoft Azure, Microsoft Open Specification Promise, Microsoft TechNet, Microsoft Windows, MS-CHAP, OpenConnect, OpenVPN, Point-to-Point Protocol, Point-to-Point Tunneling Protocol, Proxy server, Smart card, SoftEther VPN, Transmission Control Protocol, Transport Layer Security, Virtual private network, Windows Vista, Winlogon.
Authentication
Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.
New!!: Secure Socket Tunneling Protocol and Authentication · See more »
AuthIP
AuthIP is a Microsoft proprietary extension of the IKE cryptographic protocol.
New!!: Secure Socket Tunneling Protocol and AuthIP · See more »
Berkeley Software Distribution
Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.
New!!: Secure Socket Tunneling Protocol and Berkeley Software Distribution · See more »
Encryption
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
New!!: Secure Socket Tunneling Protocol and Encryption · See more »
Extensible Authentication Protocol
Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and point-to-point connections.
New!!: Secure Socket Tunneling Protocol and Extensible Authentication Protocol · See more »
Firewall (computing)
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
New!!: Secure Socket Tunneling Protocol and Firewall (computing) · See more »
HTTPS
HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.
New!!: Secure Socket Tunneling Protocol and HTTPS · See more »
Internet Initiative Japan
() was founded in 1992 by Koichi Suzuki, IIJ (Internet Initiative Japan) as Japan’s first ISP.
New!!: Secure Socket Tunneling Protocol and Internet Initiative Japan · See more »
Linux
Linux is a family of free and open-source software operating systems built around the Linux kernel.
New!!: Secure Socket Tunneling Protocol and Linux · See more »
Microsoft Azure
Microsoft Azure (formerly Windows Azure) is a cloud computing service created by Microsoft for building, testing, deploying, and managing applications and services through a global network of Microsoft-managed data centers.
New!!: Secure Socket Tunneling Protocol and Microsoft Azure · See more »
Microsoft Open Specification Promise
The Microsoft Open Specification Promise (or OSP) is a promise by Microsoft, published in September 2006, to not assert its patents, in certain conditions, against implementations of a certain list of specifications.
New!!: Secure Socket Tunneling Protocol and Microsoft Open Specification Promise · See more »
Microsoft TechNet
Microsoft TechNet is a Microsoft web portal and web service for IT professionals.
New!!: Secure Socket Tunneling Protocol and Microsoft TechNet · See more »
Microsoft Windows
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
New!!: Secure Socket Tunneling Protocol and Microsoft Windows · See more »
MS-CHAP
MS-CHAP is the Microsoft version of the Challenge-Handshake Authentication Protocol, CHAP.
New!!: Secure Socket Tunneling Protocol and MS-CHAP · See more »
OpenConnect
OpenConnect is an open-source software application for connecting to virtual private networks (VPN), which implement secure point-to-point connections.
New!!: Secure Socket Tunneling Protocol and OpenConnect · See more »
OpenVPN
OpenVPN is an open-source software application that implements virtual private network (VPN) techniques to create secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities.
New!!: Secure Socket Tunneling Protocol and OpenVPN · See more »
Point-to-Point Protocol
In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communications protocol used to establish a direct connection between two nodes.
New!!: Secure Socket Tunneling Protocol and Point-to-Point Protocol · See more »
Point-to-Point Tunneling Protocol
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks, with many known security issues.
New!!: Secure Socket Tunneling Protocol and Point-to-Point Tunneling Protocol · See more »
Proxy server
In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.
New!!: Secure Socket Tunneling Protocol and Proxy server · See more »
Smart card
A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.
New!!: Secure Socket Tunneling Protocol and Smart card · See more »
SoftEther VPN
SoftEther VPN is free open-source, cross-platform, multi-protocol VPN client and VPN server software, developed as part of Daiyuu Nobori's master's thesis research at the University of Tsukuba.
New!!: Secure Socket Tunneling Protocol and SoftEther VPN · See more »
Transmission Control Protocol
The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.
New!!: Secure Socket Tunneling Protocol and Transmission Control Protocol · See more »
Transport Layer Security
Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.
New!!: Secure Socket Tunneling Protocol and Transport Layer Security · See more »
Virtual private network
A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
New!!: Secure Socket Tunneling Protocol and Virtual private network · See more »
Windows Vista
Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.
New!!: Secure Socket Tunneling Protocol and Windows Vista · See more »
Winlogon
In computing, Winlogon is the component of Microsoft Windows operating systems that is responsible for handling the secure attention sequence, loading the user profile on logon, and optionally locking the computer when a screensaver is running (requiring another authentication step).
New!!: Secure Socket Tunneling Protocol and Winlogon · See more »
Redirects here:
Secure Sockets Tunneling Protocol.
References
[1] https://en.wikipedia.org/wiki/Secure_Socket_Tunneling_Protocol