5 examples of designer pain: the most common phrases coming from customers and clients
No matter how many years have passed, and TK for the designer always remains a…

Continue reading →

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact…

Continue reading →

Improving the registration form on the site
On the Internet, the registration procedure is found to us as often as the form…

Continue reading →

accordingly

PPTP VPN

This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.

The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.

A TCP connection is used to service the created PPTP tunnel.

Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading

Improving the registration form on the site
On the Internet, the registration procedure is found to us as often as the form…

...

All the information about you is ... on the Internet
The fact that computers have long and reliably entered the lives of almost every person…

...

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs,…

...