Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Improving the registration form on the site
On the Internet, the registration procedure is found to us as often as the form of authorization on sites. You have to register to perform: in all kinds of web…

Continue reading →

Internet fraud
A proverb says: "Forewarned - means armed." Not listening to her is stupid. Nowadays, the Internet is playing an increasingly important role in people's lives, and is of undoubted benefit.…

Continue reading →

also capable of working

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacker hacks. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, you also need an additional program to the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients. Continue reading

PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

...

If you blocked the site at work
So a person is arranged that the productivity of his activity is directly related to how often he rests, how much time he devotes to relaxation. Any office employee during…

...

How to write articles. To help copywriters
Today, more and more people are trying themselves in copywriting. This is both good and bad. Good - because, as they say, the more professional the party, the more interesting…

...

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

...