completed the necessary action
PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.
The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.
A TCP connection is used to service the created PPTP tunnel.
Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading
Enterprise VPN in plain language
Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that are often not understood by less experienced network users. This article will help you understand the basics of VPN technology. We tried to state everything in the simplest language and include at least technical terms in the text.
The acronym VPN stands for Virtual Private Network (Virtual Prvate Network). This technology is designed to organize an internal network within another network with reliable protection of the transfer of all data between users. Typically, the core network for a VPN is the Internet.
In order to imagine the meaning of technology, it is enough to take as a basis any company that has a head office and several branches in different parts of the city or even in different regions of the country. Each branch has its own local area network for data exchange. At the same time, data transfer between branches is carried out through publicly and insecure channels. Continue reading
How is the editor different from a beta reader, and vice versa
Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not?
If the readers either weren’t found, or they were silent, but would you like to know if the book is good and how good it is? Then there is only one way – to give up to the beta reader or editor. It is these personalities that can give a detailed, thoughtful and reasoned response to your novel or story, fairy tale or collection of poems.
But how to decide who exactly to go to? In general, is there any difference who to choose? The question, as practice has shown, is relevant: in letters I was repeatedly asked how the literary editor, beta reader and beta tester differ from each other.
Let’s get it right.
Differences between Editor and Beta Reader Continue reading