![]() In case you’re unfamiliar with these differences, let’s briefly discuss them. Likewise, you need to understand the limitations of peer-to-peer networks. For example, you need to know what security features exist in normal (client/server) networks, but not in peer-to-peer networks. In this Daily Drill Down, I’ll discuss several techniques that you can use to enhance your network’s security.īefore you can even begin to discuss security in a peer-to-peer environment, it’s necessary to have a good understanding of peer-to-peer networking. You can use some techniques to implement a degree of security on a peer-to-peer network. However, if you need to secure resources on a peer-to-peer network, all is not lost. That’s because peer-to-peer networks are insecure by their very nature. When it comes to network security, peer-to-peer networks present a special challenge.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |