dc.contributor.author | Faheem, Muhammad | |
dc.contributor.author | Shaukat, Hamza | |
dc.contributor.author | Ali Gilani, Muhammad Ahmad | |
dc.contributor.author | Bibi, Iqra | |
dc.contributor.author | Sohail, Zaryab | |
dc.date.accessioned | 2020-11-03T08:20:04Z | |
dc.date.available | 2020-11-03T08:20:04Z | |
dc.date.issued | 2018-07 | |
dc.identifier.other | TCC-26 / BETE-51 | |
dc.identifier.other | PTC-337 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/8859 | |
dc.description.abstract | The project will first implement different methods to sniff client data from different VPN servers to check vulnerabilities like anonymity, IP leakages and DNS hijacking etc. Using the data acquired from the results, we will analyze the security lapses and vulnerabilities in any particular VPNs, and then this project will further lead to a design of a customized VPN, secure in all parameters. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Argos VPN | en_US |
dc.type | Technical Report | en_US |