Chapter 31. Virtual Private Networks (VPNs)

IN THIS CHAPTER

If you have reached this stage in this book and have paid careful attention to the preceding chapters on security and server management, it’s clear you have an active interest in being a security-conscious network citizen. Even if you’re not a network administrator, you have learned the importance of keeping the transactions associated with your everyday computing as secure as possible. You use SSH for your remote terminal operations, you encrypt your POP3 and IMAP email traffic, and you implement a secure password policy. Your online life is about as secure as it can be.

However, that all changes as soon ...

Get FreeBSD6 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.