How to write articles. To help copywriters
Today, more and more people are trying themselves in copywriting. This is both good and bad. Good - because, as they say, the more professional the party, the more interesting…

Continue reading →

Overview of modern antiviruses
Of all the threats to the security of user information, viruses stand apart. These small malicious programs, if not handled carefully, can steal or destroy any data. But it turns…

Continue reading →

E-wallet protection
When comparing the degree of protection of client programs of Yandex.Money and Webmoney payment systems, it turned out that the latter offers more reliable means of protecting client data. However,…

Continue reading →

accordingly

PPTP VPN

This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network.

The work of PPTP is to implement PPP frames in IP packets for transferring them to any IP network, including the Internet. In addition, this technology can be used to create a tunnel between local networks.

A TCP connection is used to service the created PPTP tunnel.

Brief specification
The protocol specification was published in 1999 in RFC2637, but the IETF community has not ratified it.
Less secure than IPSec, PPTP establishes a PPP session using the GRE protocol. The 1723 TCP port is used to control and initiate the GRE connection. Redirecting PPTP to the firewall is difficult because the protocol requires two sessions to be established simultaneously. Continue reading

Destination of proxies and NAT
A proxy server is designed to mediate between a workstation and a worldwide network. The proxy computer passes user requests through itself and then returns the results received from Inetrnet.…

...

What is important for the internet user?
What is important for the internet user? Speed ​​and price? Aw, users! Speed, price and service are said by users. Support - the most literate pronounce weightily. You are at…

...

PPTP VPN
This protocol allows you to implement a secure point-to-point connection by creating a tunnel in an insecure network. The work of PPTP is to implement PPP frames in IP packets…

...