Internet marketing
Internet marketing provides unique opportunities by providing communication with target audiences, as well as the ability to communicate with an international audience. Let's turn to the history. So until 1990,…

Continue reading →

Internet fraud
A proverb says: "Forewarned - means armed." Not listening to her is stupid. Nowadays, the Internet is playing an increasingly important role in people's lives, and is of undoubted benefit.…

Continue reading →

Advertising as a key method for attracting a person to a service
Advertising, well known, is becoming the engine of commerce. Indeed, advertising, in conditions of free competition and a market economy, no matter how high-quality a product is, becomes the main…

Continue reading →

personal experience

VPN Basic Concepts and Classification

The term VPN (Eng. “Virtual Private Network”) refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network, usually the Internet.

Although data is transferred to a VPN over networks with a low level of trust, thanks to the use of cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.

VPN implementation and structure Continue reading

Enterprise VPN in plain language

Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that are often not understood by less experienced network users. This article will help you understand the basics of VPN technology. We tried to state everything in the simplest language and include a minimum of technical terms in the text.

The acronym VPN stands for Virtual Private Network (Virtual Prvate Network). This technology is Continue reading

VPN on L2TP technology

L2TP is a tunneling protocol used to create virtual networks. Its main advantage is the ability to create virtual networks not only over IP networks, but also in Frame Relay, X.25 and ATM networks. Despite being similar to the OSI link layer protocol, L2TP is a session layer protocol using UDP port 1701.

The development of the protocol can be traced back to 1997, and in 1999, the RFC2661 standard appeared, describing it. It is believed that L2TP combined the best of both L2F and PPTP.

Scheme of work
To establish a connection, the remote system through the PSTN telephone network initiates a PPP Continue reading

What could the Internet become in the future?
In the world, it seems, there is not a single corner left without an Internet connection. He is in the jungle of the Amazon, in Antarctica, in the deserts of…

...

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

...

E-Wallet Protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Book or internet?
Many are confident that in the near future the computer will completely supplant the book. And I am convinced that this will never happen. Computers and the Internet are crowding…

...