SSL-Explorer Community Edition 1.0.0 RC16 Crack + Serial Key (Updated)
SSL-Explorer a browser-based, GPL, SSL VPN solution. This unique remote access solution provides users and businesses alike with a means of securely accessing network resources from outside the network perimeter using only a standard web browser.
Users can now be granted access to their files, intranet applications and email from virtually any location with an internet connection. Using SSL-Explorer you can quickly and simply provide full extranet access to key strategic business partners and external consultants.
Download SSL-Explorer Community Edition Crack
Software developer |
3SP Ltd
|
Grade |
2.8
1404
2.8
|
Downloads count | 13249 |
File size | < 1 MB |
Systems | Windows 2K, Windows XP, Windows Vista, Windows 2003 |
Similarly, your network support staff are also now free to remotely manage servers, routers and other network hardware securely using industry standard encryption technologies to protect key information assets.
No client side software needs to be installed on your users systems and maintenance is centralised and simple.
SSL-Explorer relies on the ubiquitous Java web technology and hence requires just a standard web browser to take advantage of full remote access.
Standard network protocols can be tunnelled through the SSL connection with ease and your email and intranet web/file resources are securely accessible from outside the corporate network with just a single firewall configuration required post-installation.
SSL-Explorer allows you to 'lock-down' your network, leaving just a single port open on your firewall for the maximum possible security.
Here are some key features of "SSL Explorer":
■ Granular policy-based rights management
■ No concurrent user restrictions
■ Remotely browse Windows filesystems via Windows Explorer
■ Microsoft Outlook Web Access 2003 supported - move vulnerable OWA servers out of the DMZ
■ Reverse proxy web forwarding feature
■ Active Directory authentication supported
■ Built-in database authentication supported
■ UNIX authentication supported
■ Configurable authentication schemes
■ Access your desktop remotely
■ Intranet resources may be securely externalized