The Internet. Network of things?
Have you heard anything about the Internet of things? I am sure that few people know about this concept. I also did not know until I accidentally heard a broadcast…

Continue reading →

Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

Continue reading →

Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

Continue reading →

sent through

VPN on L2TP technology

L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay, X.25 and ATM networks. Despite being similar to the OSI link layer protocol, L2TP is a session layer protocol using UDP port 1701.

The development of the protocol can be traced back to 1997, and in 1999, the RFC2661 standard appeared, describing it. It is believed that L2TP combined the best of both L2F and PPTP.

Scheme of work
To establish a connection, the remote system through the PSTN telephone network initiates a PPP Continue reading

Enterprise VPN in plain language
Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that…

...

E-Wallet Protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Windows undocumented features
In this article I want to talk about some of the undocumented and hidden features of Windows. And also some windows secrets, windows descriptions and windows tricks. 1.) To warm…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...