Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The…

Continue reading →

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide…

Continue reading →

completed the necessary action

PPTP VPN

This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.

The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.

A TCP connection is used to service the created PPTP tunnel.

Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading

Enterprise VPN in plain language

Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that are often not understood by less experienced network users. This article will help you understand the basics of VPN technology. We tried to state everything in the simplest language and include at least technical terms in the text.

The acronym VPN stands for Virtual Private Network (Virtual Prvate Network). This technology is designed to organize an internal network within another network with reliable protection of the transfer of all data between users. Typically, the core network for a VPN is the Internet.

In order to imagine the meaning of technology, it is enough to take as a basis any company that has a head office and several branches in different parts of the city or even in different regions of the country. Each branch has its own local area network for data exchange. At the same time, data transfer between branches is carried out through publicly and insecure channels. Continue reading

How is the editor different from a beta reader, and vice versa

Each writer is waiting for feedback on his works. And it’s wonderful if the responses appear. And if not?

If the readers either weren’t found, or they were silent, but would you like to know if the book is good and how good it is? Then there is only one way – to give up to the beta reader or editor. It is these personalities that can give a detailed, thoughtful and reasoned response to your novel or story, fairy tale or collection of poems.

But how to decide who exactly to go to? In general, is there any difference who to choose? The question, as practice has shown, is relevant: in letters I was repeatedly asked how the literary editor, beta reader and beta tester differ from each other.

Let’s get it right.

Differences between Editor and Beta Reader Continue reading

Turbologo - an online service for creating logos
For a company, a company logo is not just an element of style. This, in…

...

5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

...

Interesting features of UI design in different countries
When you create an interface design for applications / sites operating in different countries, you…

...