473,766 Members | 2,130 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Secure VPN Gateway - a Perl Solution

Hi all.

I just want to make you aware of an exciting new piece of software that is available from
www.ttc4it.co.nz

I think you'll be interested in the software because it has been developed in Perl.

The software provides a very secure means of connecting to remote servers over unsecured
networks like the Internet.

It is like a VPN & Firewall system fused together to provide network port access to
specific servers. The web management interface and the VPN client make this software;
very secure, very easy to manage, and very easy to use.

Special features have been built into it to defeat key logger software and man in the
middle attacks.

This is commercial software but there is a free trial version available that uses Vmware
player to host the Secure VPN Gateway.

Documentation and other details are freely available from www.ttc4it.co.nz

Like all commercial software commercial support is provided. At Ttc4it you wont be
wasting time dealing with help desks. Instead you are plugged in directly to the software
developers. Better support means problems are fixed faster.

Best wishes for the New Year.

David Gempton
Managing Director
TTC LTD.

Jan 3 '07 #1
0 4693

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
3136
by: Sarah Tanembaum | last post by:
I was wondering if it is possible to create a secure database system using RDBMS(MySQL, Oracle, SQL*Server, PostgreSQL etc) and web scripting/programming language(Perl, PHP, Ruby, Java, ASP, etc) combination? I have the following in mind: I wanted to store all my( and my brothers and sisters) important document information such as birth certificate, SSN, passport number, travel documents, insurance(car, home, etc) document, and other...
3
3144
by: NotGiven | last post by:
I am researching the best place to put pictures. I have heard form both sides and I'd like to know why one is better than the other. Many thanks!
3
4557
by: Matt Sollars | last post by:
I've struggled with this problem, and it's lack of examples, for a couple of months now. On several different web applications that we have written, we need to communicate with a credit card merchant servicer. On one of the projects a secure connection was made with a WebRequest object and during the reply, a trust error was received. I can't remember the full details due to the time it's been since that project. The most recent project...
3
2759
by: Bruce W...1 | last post by:
There are lots of examples out there of ASP.NET shopping carts, but they all stop short of SSL. If someone knows of a shopping cart example that get in to code for digital certificates please show me where. I've been researching SSL and digital certificates, not that I have a specific application in mind, I just want to know how to do it. And there seem to be many ways to process credit cards. You could do it all on your server with...
4
3151
by: DierkErdmann | last post by:
Hi, I am trying to query google from within a python script using the Google-Api (pygoogle). The following piece of codes gives me a "SOAPpy.Errors.HTTPError: <HTTPError 502 Bad Gateway>", the full Traceback is shown below. I am aware of the incompatibilities between the Google-Api and older versions of the SOAP-Library; I do have installed a recent version of SOAP (v. 0.11.3) which is said to be supported by Google-API.
6
1640
by: =?Utf-8?B?Q3JhaWc=?= | last post by:
If I have an application that I send out to users, and the application interacts with the database (behind the scenes, no direct sql creation by the users)....do webservices make the app more secure? I always thought of webservices as just a good way to allow users to have an API for them to interact with the database, but are webservices useful if the user never really knows that they are there?
1
1334
by: ilenx | last post by:
i wouldn't consider myself a php newbie, but i'm admittedly a novice. i'm posting secure form data to http://gateway.securenet.com/payment.scrnt, to process a credit card transaction; when i post data via my form, the page displays the return data in the browser. i need to dump that data into a variable rather than onto the screen, so i can access and return the results to the user. i've attempted to use CURL, not sure if i'm doing that...
18
2388
by: Grant Edwards | last post by:
Could whoever is responsible for the gateway that is grabbing my postings off of Usenet and e-mailing them out please fix the headers in the mail messages so that I don't get the bounce messages? While you're at it, might as well fix it for everybody else too. ;) Its a bit rude to send out mass e-mail messages with headers faked up so that the bounce messages go to somebody else.
3
2754
by: zr | last post by:
Hi, Does usage of checked iterators and checked containers make code more secure? If so, can that code considered to be reasonably secure?
0
9404
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10168
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10009
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9838
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
8835
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7381
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6651
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5423
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
2
3532
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.