Creating BAT files
People who are familiar with the term batch file know that BAT files can significantly simplify life and save time if you can write and use them correctly. In this…

Continue reading →

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

Continue reading →

VPN Basic Concepts and Classification

The term VPN (Eng. “Virtual Private Network”) refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network, usually the Internet.

Although data is transferred to a VPN over networks with a low level of trust, thanks to the use of cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connection: network-to-network, node-to-network and node-to-node.

VPN implementation and structure
The use of cryptography tools allows you to use the basic network protocols (UDP, TCP, etc.) unchanged, and most often to create a VPN, the PPP protocol is encapsulated in another protocol, for example, IP or Ethernet. With a good level of implementation and application of specialized software, VPN provides a high level of information encryption and genuine anonymity on the Internet.
Structurally, a VPN consists of two functional parts: an “internal” network (there may be several) and an “external” network (usually the Internet). The remote user connects to the VPN through the access server, which is included in both the “internal” and the “external” network. In this case, the server will require the user to authenticate and then authenticate, after which he will be endowed with the necessary permissions on the network.

VPN classification
There are several VPN classifications for various basic parameters.
By the method of implementation
Software solution. For the functioning of the VPN, a PC with specialized software is used.
Hardware and software solution. To implement a VPN, a set of special software and hardware is used. Due to this approach, high performance and security are provided.

Integrated Solution. VPN implementation is provided by a hardware-software complex that simultaneously solves the problems of organizing a firewall, filtering traffic, etc.

By degree of security
Trusted. Implemented when you need to create a virtual subnet as part of a large network. In this case, the transmission medium is considered trustworthy, and security problems are considered irrelevant.
Protected. This is the most popular type of VPN, with the help of which secure and reliable networks are created on the basis of unreliable networks, for example, the Internet.

By appointment
Extranet VPN. Virtual networks into which “external” users can connect – clients or customers. Since they are less trusted than company employees, there is a need to create certain rules restricting the access of “external” users to confidential or commercial information.
Remote Access VPN. It is implemented to provide a secure channel between the corporate network and a user connected to the secure network from the outside, for example, from a home PC.

Internet VPN Implemented by providers to provide access to clients connecting on the same physical channel.

Intranet VPN. It combines a number of branches of one company geographically distributed into a secure network to exchange information through open channels.

Client / Server VPN. Protects data transferred between nodes of a corporate network (but not networks). It is usually implemented for nodes located in the same network segment, for example, the client machine and the server. This option is used to divide one physical network into several logical ones.

By protocol type
There are VPN implementations on the market for TCP / IP, AppleTalk, and IPX networks. However, the most relevant trend is the transition to TCP / IP, so most solutions only support it.
Today, there are several popular VPN implementations, among which are worth mentioning PPTP, OpenVPN, L2TP, PPPoE, IPSec. By the way, large Internet providers often offer services to business clients for organizing a VPN. We offer this technology to ordinary users. Try it for free!

Reading books on a computer. How to read books on a computer?
I welcome all fans to read interesting and useful books, as well as those who are just interested in how you can read books on a computer. In the past…


Internet speed check (monthly statistics)
Checking the speed of the Internet is a fairly simple task if a single measurement is required. There are a ton of online tests on the Internet for this. But…


Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…


Forum Communication
The Internet has become an integral part of life. Since the Internet is an American invention, many terms have no direct analogues in the Russian language. For example, cookie. In…