How to choose an internet provider?
If you are reading this article, then most likely you cannot imagine life without the…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small…

Continue reading →

Enterprise VPN in plain language
Today, many who are interested in computer technology and communications have heard about such a…

Continue reading →

accordingly

PPTP VPN

This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.

The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.

A TCP connection is used to service the created PPTP tunnel.

Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading

Effective B2B website designs for 2019
If you are producing a product / service that is in demand in a particular…

...

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect…

...

What is important for the internet user?
What is important for the internet user? Speed ​​and price? Aw, users! Speed, price and…

...