Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

Continue reading →

PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

Continue reading →

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

also capable of working

Destination of proxies and NAT

A proxy server is designed to mediate between a workstation and a worldwide network.

The proxy computer passes user requests through itself and then returns the results received from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacker hacks. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, you also need an additional program to the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients. Continue reading

How is the editor different from a beta reader, and vice versa
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not? If the readers either weren’t found, or they were silent, but…

...

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a topic of discussion. Yes, what! Everything can be perfectly painted: what kind of pictures, fonts,…

...

How to get more search visibility using other people's resources
Whatever niche you work in, there are probably dozens, hundreds, and even thousands of other sites of similar subjects. Some are your direct competitors, with others your interests overlap partially.…

...

How to make a color palette for a site and not only
In Design Mania, there have already been several publications with similar topics: in a note about color matching services for websites, in addition to inspiration resources, we examined a couple…

...