?
Solved

What software is needed and where can i get it from to start a service similar to the services FindNot.com is offering ?

Posted on 2006-06-12
3
Medium Priority
?
235 Views
Last Modified: 2011-09-20
I want to start a business similar to FindNot.com but i don't know what software i should be running. I am using Linux based dedicated servers some of them RedHat 8.0 , Redhat 9.0 and a few Fedora Core 2. Please tell me what software should i be using to start a vpn server on linux that will allow windows users to connect using a username and password and browse the internet using a ip address alocated by the server.
0
Comment
Question by:dmxmangone
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
pablouruguay earned 2000 total points
ID: 16886750
the best vpn server is http://www.openvpn.net
or you can use ipsec embeeded in OpenSwan and Strongswan
0

Featured Post

 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question