If you blocked the site at work
So a person is arranged that the productivity of his activity is directly related to…

Continue reading →

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

Continue reading →

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

Continue reading →

authenticate

VPN Basic Concepts and Classification

The term VPN (Eng. “Virtual Private Network”) refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network, usually the Internet.

Although data is transferred to a VPN over networks with a low level of trust, thanks to the use of cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.

VPN implementation and structure Continue reading

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems,…

...

All the information about you is ... on the Internet
The fact that computers have long and reliably entered the lives of almost every person…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they…

...