How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Steve Herrod Your Own Question

Steve Herrod
Steve Herrod, System Administrator
Category: Networking
Satisfied Customers: 3292
Experience:  Fully conversant with Networking (LAN/WAN) and associated systems (Active Directory/Firewalls etc)
65126503
Type Your Networking Question Here...
Steve Herrod is online now
A new question is answered every 9 seconds

Need Part 1 by Wednesday 14 Nov at 9pm EST. Part 1: Research

This answer was rated:

Need Part 1 by Wednesday 14 Nov at 9pm EST.

Part 1: Research VPNs and discuss what they are and some common techniques used to try and subvert their security. List references and must be 500 words


Need Part 2 by Sunday 18 Nov at 9pm EST.

Part 2: Research and discuss the principle of exploits based on buffer-overflow attacks. How can buffer-overflow attacks be avoided? List references

Steve Herrod :

Sure - no problem!

Steve Herrod :

Here is the VPN doc

Steve Herrod :

Cheers

Steve Herrod :

Steve

Steve Herrod :

Just finishing part 2 and with in 15 mins or so

Steve Herrod :

Cheers

Steve Herrod :

Steve

Customer:

outstanding job! thanks once again!

Steve Herrod and 2 other Networking Specialists are ready to help you