PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

Continue reading →

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

IP address in plain language
Currently, more and more computer owners in the world are becoming users of local networks or the World Wide Web. At the same time, each PC is assigned its own…

Continue reading →

leave a comment

Security in Firefox Browser

When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the “global web” there is a huge number of fraudulent sites and simply dishonest personalities. To protect their users, Mozilla developers put a huge amount of effort. They came out and went out well, but they did the most important thing – they gave a start to their users. Simple and intuitive add-ons (plug-in) began to appear quite quickly. It is about such plugins that will be discussed in this article.

Written both by craftsmen and professional programmers, these plugins perform one, but very important function – to warn the user about the danger that awaits him. They work quite simply, in fact in two stages. The first step is to track complaints or recommendations of a particular site and by comparing their number we get a positive or negative reaction to the site. Some programs simply suggest that the site is dangerous, others allow you to see why, but they are based on the same algorithm – collecting and displaying information. Continue reading

Creating an Effective Hero Image Image for a Website
Does the user only need 50 milliseconds to form an opinion on any site? Web developers and designers really have very little time to make a good impression on a…

...

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

...

Creating an Effective Hero Image Image for a Website
Does the user only need 50 milliseconds to form an opinion on any site? Web developers and designers really have very little time to make a good impression on a…

...

Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

...