O'Reilly logo

SSL VPN by Joseph Steinberg, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Department of Defense (DoD) Requirements

Erasing temporary information from access devices is not as simple as calling operating-system routines that delete the pertinent files. This is true for three reasons:

  • Today's operating systems offer features that help prevent accidental erasure of important data. Among these features are 'Trash Can' or 'Recycle Bin' capabilities that actually move deleted files to a special folder in which they are stored until the space they occupy is needed for storing other files. Because files can be restored from these special folders and operating systems facilitate such recovery, SSL VPNs should not rely on calling operating system Delete commands to remove sensitive information from access devices.
  • Even when a Trash ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required