Tuesday, October 07, 2014

ISAserver.org - What's the Buzz on Web Caching? (Part 1)

ISAserver.org - What's the Buzz on Web Caching? (Part 1)

Hi Security World,


---------------------------------------------------------
---------------------------------------------------------


Just Published
-----------------------------------------------------------------
What's the Buzz on Web Caching? (Part 1) (on 7 Oct. 2014 by Deb Shinder)
http://www.isaserver.org/articles-tutorials/configuration-general/whats-buzz-web-caching-part1.html
In this article we'll take a brief look at what web caching is and the history of web caching.



Recent Articles & Tutorials
-----------------------------------------------------------------
How to configure Forefront UAG as an SSTP VPN Server (on 23 Sept. 2014 by Marc Grote)
http://www.isaserver.org/articles-tutorials/general/how-configure-forefront-uag-sstp-vpn-server.html
In this article I will show you how to use Forefront UAG to provide VPN clients access to internal resources with an SSTP VPN connection.

Protecting Against DoS Attacks with the TMG Firewall (on 9 Sept. 2014 by Deb Shinder)
http://www.isaserver.org/articles-tutorials/configuration-security/protecting-against-dos-attacks-tmg-firewall.html
In this article, we'll talk about what flood attacks are and how they can be used to generate a denial of service condition. We'll then go over what the TMG firewall has to offer to help protect you against flood attacks.

Techniques for Blocking Anonymous Public Proxies using Forefront Threat Management Gateway (TMG) 2010 (on 26 Aug. 2014 by Richard Hicks)
http://www.isaserver.org/articles-tutorials/configuration-security/techniques-blocking-anonymous-public-proxies-using-forefront-threat-management-gateway-tmg-2010.html
In this article we'll look at ways to prevent access to anonymous public proxies using the Forefront TMG 2010 firewall.

TMG Firewall Access Control Policies and Rules (Part 4) (on 12 Aug. 2014 by Deb Shinder)
http://www.isaserver.org/articles-tutorials/general/tmg-firewall-access-control-policies-and-rules-part4.html
In this article we’ll discuss how we enable communications between Networks through the use of Network relationships and routing rules.





ISAserver.org Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.isaserver.org/articles-tutorials/)
- Products (http://www.isaserver.org/software/)
- Reviews (http://www.isaserver.org/articles-tutorials/product-reviews/)
- Free Tools (http://www.isaserver.org/software/Free-Tools/)
- Blogs (http://www.isaserver.org/blogs/)
- Forums (http://forums.isaserver.org/)
- Contact Us (http://www.isaserver.org/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- WindowSecurity.com (http://www.windowsecurity.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=6
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1
ISAserver.org
is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@ISAserver.org
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright ISAserver.org 2014. All rights reserved.

No comments:

Post a Comment