Top Web Design Articles, Downloads, and Inspiration
We continue the annual tradition and publish the most interesting notes for the "last season". Earlier in Design Mania, you could already see a similar article for 2017 and a…

Continue reading →

Local Area Networks and the Internet
When a local area network is connected to the global Internet, one of the PCs, called a server, becomes a kind of conductor and connects to the Internet using a…

Continue reading →

How to make a website footer: design options, why you need it, tips
Home »Web Design» How to make a footer of a site: design options, why it is needed, tips How to make a website footer: design options, why you need it,…

Continue reading →

but this information

1 2 3 8

Enterprise VPN in plain language

Today, many who are interested in computer technology and communications have heard about such a popular technology as VPN. However, most of the articles describe subtle nuances of technology that are often not understood by less experienced network users. This article will help you understand the basics of VPN technology. We tried to state everything in the simplest language and include at least technical terms in the text.

The acronym VPN stands for Virtual Private Network (Virtual Prvate Network). This technology is designed to organize an internal network within another network with reliable protection of the transfer of all data between users. Typically, the core network for a VPN is the Internet.

In order to imagine the meaning of technology, it is enough to take as a basis any company that has a head office and several branches in different parts of the city or even in different regions of the country. Each branch has its own local area network for data exchange. At the same time, data transfer between branches is carried out through publicly and insecure channels. Continue reading

VPN Basic Concepts and Classification

The term VPN (Eng. “Virtual Private Network”) refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network, usually the Internet.

Although data is transferred to a VPN over networks with a low level of trust, thanks to the use of cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.

VPN implementation and structure Continue reading

What is a firewall and why is it needed?

We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English – fire wall), or as it is also called brandmauer (with German – fire wall) in Russian has two names that display its purpose (inter) firewall. This is a screen that protects the user from influences coming from outside. When connecting to the Internet, having a firewall is not a luxury, and indeed such a risk is hardly justified, it will most likely lead to raking up a bunch of viruses, or even just to reinstall the system.

In addition, the firewall performs the function of blocking access by unauthorized persons to your computer via the network. This is not to say that the standard Windows Firewall is bad, it is quite suitable for the initial level of protection. But this is if you do not store important information on your computer or do not work with means of payment via the Internet. If you are interested in the security of your data, then changing the Firewall will not be a stupid idea. Our article, in fact, is written based on what would help you, ordinary users, to choose a firewall that suits you. Continue reading

1 2 3 8
If you blocked the site at work
So a person is arranged that the productivity of his activity is directly related to how often he rests, how much time he devotes to relaxation. Any office employee during…

...

Personal Data Security
What is personal information and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

...

Internet Marketing Cost Effectiveness
What are the main steps in the online sale process? Advertising tools attract potential customers to the site. Tools can be different: seo, contextual advertising, display advertising, advertising on social…

...