pptp 中文意思是什麼

pptp 解釋
點到點隧道協議
  1. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  2. Pptp : point to point tunneling protocol

    點對點通道協議
  3. Layer 2 tunneling protocol ( l2tp ), a more secure version of point - to - point tunneling protocol ( pptp )

    第二層隧道協議( l2tp ) ,是一種比點對點隧道協議( pptp )更安全的版本。
  4. After introducing the correlative knowledge of vpn, such as tcp / ip protocols, encryption technology and so on, the article discusses in detail the ipsec protocol and the two main protocols of vpn : pptp and l2tp

    本文在介紹tcp / ip協議、加密技術等與vpn相關知識的基礎上,較詳細論述了ipsec協議和vpn的兩個主要協議:點到點隧道協議( pptp )和層2隧道協議( l2tp ) 。
  5. This update resolves the " unchecked buffer in pptp implementation could enable denial of service " security vulnerability in windows xp. download now to prevent an attacker from disrupting service on a server that offers private networking and uses the pptp protocol

    此修正檔可以解決windows xp與windows xp service pack 1 sp1中可能發生的pptp執行中的未檢查沖區可能導致阻斷服務安全性問題。
  6. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用非vpn傳輸數據高,因為一個組織依靠vpn擴展其可信的內部邊界,允許外部分支訪問內部網路,破壞隧道的安全性等於破壞了所有內部網路。
  7. The point - to - point tunneling protocol ( pptp ) was designed to solve this problem of creating and maintaining a vpn over a public tcp / ip network using the common point - to - point protocol ( ppp )

    作為一種比較成熟的vpn技術, pptp被世界上許多用戶廣泛採用構建vpn 。設計pptp的目的是在公共網路上使用ppp協議建立和維護vpn 。
  8. This dissertation presented a theoretical work as well as an experimental implementation of the l2tp carried out at the sichuan network communication key laboratory. this project was spurred by idea of extending the application of the tunneling technique to a broad area as a result of a preliminary study on tunneling techniques, especially on l2f, pptp and l2tp ( commonly referred to as l2tpv2 )

    本論文所反映的工作,是四川省網路通信技術重點實驗室「二層隧道協議課題組」的共同成果,該項目起因是試圖對早期版本的隧道傳輸技術( l2f 、 pptp和l2tp )的非對稱應用模式推廣到對稱應用模式,以及將該思想應用於其他層協議的隧道傳輸。
  9. This is achieved by allowing the user to tunnel through the internet or another public network using a protocol such as microsoft point - to - point tunneling protocol pptp available with the microsoft windows nt version 4. 0 or microsoft windows 2000 operating system, or layer two tunneling protocol l2tp available with the windows 2000 operating system

    其實現方法是允許用戶使用如microsoft windows nt 4 . 0或microsoft windows 2000操作系統中的microsoft點對點隧道協議( pptp )或者windows 2000操作系統中的第二層隧道協議( l2tp ) ,將internet或另一公用網路作為通道。
  10. Pptp point to point tunneling protocol

    點對點通道協議
分享友人