Internet cheating
money Surely everyone who is not the first day on the network, faced with various types of swindle. They ask to send money, download something or go to some link.…

Continue reading →

But what if the DropBox features are lacking?
DropBox is one of the most famous and popular services for creating your own data warehouse in the Internet space. It is very convenient to have such an “online flash…

Continue reading →

Children and social networks: how not to fall into the trap
What parents should do to protect their child in the virtual world No matter how parents try to limit the use of gadgets, universal informatization cannot be stopped: computers, tablets,…

Continue reading →

communication

Enterprise VPN in plain language

Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that are often not understood by less experienced network users. This article will help you understand the basics of VPN technology. We tried to state everything in the simplest language and include a minimum of technical terms in the text.

The acronym VPN stands for Virtual Private Network (Virtual Prvate Network). This technology is Continue reading

VPN on L2TP technology

L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay, X.25 and ATM networks. Despite being similar to the OSI link layer protocol, L2TP is a session layer protocol using UDP port 1701.

The development of the protocol can be traced back to 1997, and in 1999, the RFC2661 standard appeared, describing it. It is believed that L2TP combined the best of both L2F and PPTP.

Scheme of work
To establish a connection, the remote system through the PSTN telephone network initiates a PPP Continue reading

Overview of modern antiviruses

Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns out to be the easiest to defend against them. The Internet is teeming with dozens of different antivirus programs that offer us a quick and easy solution to the problem. But how good are these programs? How to make a specific choice?

Laboratory Research – Clean Water Cheating
Very often you can find on the Internet studies of various laboratories or some scientists there, which talk Continue reading

Practical Internet Marketing
When it comes to Internet marketing, many people have a mess in their heads from completely scattered concepts. Someone trying to talk about Internet marketing is actually talking about search…

...

E-Wallet Protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

...

But what if the DropBox features are lacking?
DropBox is one of the most famous and popular services for creating your own data warehouse in the Internet space. It is very convenient to have such an “online flash…

...