Net Curtain

September 2003
Management Services;Sep2003, Vol. 47 Issue 9, p30
Academic Journal
Keeping network users away from unauthorized use of networked printers and copiers is as important as giving authorized users instant availability. Sharp has introduced a new secure network interface card to control unauthorized access. The Secure NIC can be put onto most multifunctional devices before they are added to the network. Importantly, all Internet Protocol addresses are concealed to ensure users have access only to the devices they are supposed to be using. The NIC can also be used in conjunction with the Sharp data security kit. That uses 128bit encryption to store data on a printer's hard disk before printing. If unprotected, the hard disk could be removed and be used to gain access to sensitive data by passing on industrial intelligence to undeserving competitors.


Related Articles

  • ALL THAT'S FIT TO LPR. Gibbs, Mark // Network World;06/19/2000, Vol. 17 Issue 25, p68 

    Discusses various aspects of the Line Printer Daemon Protocol (LPR), a protocol for communications between clients that want to print files and servers that host the printers. Internet Engineering Task Force's specifications for the LPR protocol; LPR features of Windows NT and Unix operating...

  • Selecting & Applying Networked Devices. Abram, Frank // Security: Solutions for Enterprise Security Leaders;Aug2003, Vol. 40 Issue 7, p46 

    Lists the key factors that need to be considered in selecting and applying Internet protocol cameras and related networked devices. Identification of the man-to-machine interface; Consideration of how many users and locations will be viewing the camera system; Assessment of the image quality...

  • Groups converge on interoperability specs.  // Electronic News;2/6/95, Vol. 41 Issue 2051, p20 

    Reports on the plans of networking industry groups to develop protocols and interfaces for the information highway. Goal of making equipment and services interoperable.

  • Interface battles tear apart stretched Web. Vizard, Michael // InfoWorld;7/22/96, Vol. 18 Issue 30, p3 

    Comment on the multiple competing interests regarding Internet interfaces. Concern on the growing number of networks on the Internet; Proposals for a quasi-management standard for the World Wide Web; Development of Internet network-management protocols.

  • The Challenges of Enterprise IP. Greenstreet, Debbie; Carman, Melissa // Electronic News;8/20/2001, Vol. 47 Issue 34, p24 

    Discusses the challenges of enterprise Internet Protocol telephone system. Technologies of the system; Significant elements of the system's core technology; Capabilities of the Voice Interface and the Network Interface.

  • Ask Dr. Intranet. Blass, Steve // Network World;02/07/2000, Vol. 17 Issue 6, p53 

    Answers questions concerning computer networks. Stop-and-go printing problem experienced after switching intranet servers to Windows NT 4 with TCP/IP as network protocol; Printers configured with Hewlett-Packard JetAdmin as LPR devices using TCP/IP as their only protocol.

  • Portable has wireless LAN connectivity.  // Frontline Solutions;Oct2000, Vol. 1 Issue 11, p72 

    Introduces the Encore 3N portable printer from Comtec Information Systems. Information on the wireless local area network connectivity feature of the unit; Use of a Dynamic Host Configuration Protocol in data processing; Account of the clamshell design for drop-in paper loading.

  • Open Data-link Interface.  // Network Dictionary;2007, p351 

    A definition of the term "Open Data-Link Interface" (ODI) is presented. It refers to an application programming interface (API) developed by Apple and Novell for writing network drivers. ODI provides rules that establish a vendor-neutral interface between the protocol stack and the adapter...

  • BFD spots router forwarding failures. Kolon, Matt // Network World;3/7/2005, Vol. 22 Issue 9, p33 

    This article discusses on the role of the Bidirectional Forwarding Detection (BFD) protocol in detecting errors from forwarding paths and switching traffic to alternate routes, interfaces or even the entire networks. The BFD protocol is used in maintaining connectivity between the gateway and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics