Then, the graphical user interface application was developed to assist and facilitate the user to access the network securely without having the difficulties to configure and install any software. This access point was implemented by using the combination of The Onion Router (Tor) and Virtual Private Network (VPN) services. This paper aims to design and implement TorVPN as an access point using Raspberry Pi in enhancing security and privacy in Local Area Network (LAN). ![]() ![]() Every person, including organization requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. Network security is designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |