What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

Internet telephony for beginners: where is the truth and where is the myth?
Each user of the World Wide Web has repeatedly wondered how to call over the Internet for free or at a very low price. Many honestly looked through dozens or…

Continue reading →

features are

Internet telephony for beginners: where is the truth and where is the myth?

Each user of the World Wide Web has repeatedly wondered how to call over the Internet for free or at a very low price. Many honestly looked through dozens or even hundreds of offers from various companies offering Internet call services. But the wide variety of confusion became even greater. Internet calls are inexpensivePiotr Marcinski, Shutterstock.com Not so long ago, a similar problem arose with me. Having got a new job, I was forced to make a huge number of calls not only outside the city, but also outside our country. Conventional telephone communications (and even more so cellular) was clearly not suitable for this business, because my salary would definitely not have covered the costs, and I was simply forced to look for an alternative solution. And I must say, I found him! True, the path to it was through thorns of Continue reading

How to protect your password from hacking

Today, passwords play a significant role in human life. Everywhere on the Internet, on every site, each account must have its own password in order for the user to gain access to its data. Losing or breaking a password can often result in a big problem and headache.

This article will focus on passwords, hacking methods and creating passwords.

How do passwords break?
There are always at least two ways to crack a password. This is a banal selection (which takes a huge amount of resources and time, but with proper luck, or rather, with due naivety of the user, it will not Continue reading

VPN on L2TP technology

L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay, X.25 and ATM networks. Despite being similar to the OSI link layer protocol, L2TP is a session layer protocol using UDP port 1701.

The development of the protocol can be traced back to 1997, and in 1999, the RFC2661 standard appeared, describing it. It is believed that L2TP combined the best of both L2F and PPTP.

Scheme of work
To establish a connection, the remote system through the PSTN telephone network initiates a PPP Continue reading

E-Wallet Protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Internet cheating
money Surely everyone who is not the first day on the network, faced with various types of swindle. They ask to send money, download something or go to some link.…

...

Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

...

Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

...