tag:blogger.com,1999:blog-32385853264461785682024-03-13T14:40:56.919-07:00Aplusproxy BlogTopics on the Internet filters and ways to bypass the filters. Live proxies and proxy tools for free use.Unknownnoreply@blogger.comBlogger66125tag:blogger.com,1999:blog-3238585326446178568.post-23252052597138427862009-04-12T21:24:00.000-07:002009-04-15T05:58:26.754-07:00[daily-proxies] Anonymous proxy for Mondayenjoy <a href="http://unblockallweb.info">http://unblockallweb.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-83946482728182147712009-04-12T01:35:00.000-07:002009-04-15T06:01:34.704-07:003 new proxies for Tuesday /14 / 2009<a href="http://bypassmore.com">http://bypassmore.com</a><br> <a href="http://netplore.info">http://netplore.info</a><br> <a href="http://bypassmore.info">http://bypassmore.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-42467025885333256672009-04-10T07:01:00.001-07:002009-04-10T19:15:23.364-07:00New myspace proxyEnjoy <a href="http://proxymojo.info/">http://proxymojo.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-30673680580547642932009-04-09T22:25:00.000-07:002009-04-10T04:12:39.678-07:003 new proxies for Fri Apr 10, 2009<a href="http://handbagsitalian.info/">handbagsitalian.info</a> <br><a href="http://exploreship.info/">exploreship.info</a> <br><a href="http://mortgageteen.com/">mortgageteen.com</a> <br>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-20942153236680888002009-04-09T12:49:00.000-07:002009-04-10T04:11:45.517-07:00[proxysites] New Free Proxy!<a href="http://www.surfcat.info">http://www.surfcat.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-43728160966518408702009-04-08T08:57:00.000-07:002009-04-09T04:04:56.958-07:003 Fresh proxies , Super fast , Wed Apr 8, 2009 11:54 am update<a href="http://schoolnick.info/">schoolnick.info</a><br /><a href="http://schoolvoice.info/">schoolvoice.info</a><br /><a href="http://schoolarrow.info/">schoolarrow.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-87026894104397308562009-04-07T18:51:00.000-07:002009-04-08T03:49:31.730-07:00New Myspace proxies<a href="http://smsdotaz.cz/">http://smsdotaz.cz</a> and <a href="http://www.get2thatsite.info/">http://www.get2thatsite.info</a><br /><br />enjoy these new proxies!Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-43631275123918357772009-04-06T13:35:00.000-07:002009-04-07T06:21:17.822-07:00New Free Proxy!<a href="http://www.surfpen.info">http://www.surfpen.info</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-54716177281585704412009-04-06T11:33:00.000-07:002009-04-07T06:19:36.242-07:003 Fast and new PROXIES for Mon Apr 6, 2009<a href="http://www.bestplay.info/">http://www.bestplay.info</a><br /><a href="http://www.newplay.info/">http://www.newplay.info</a><br /><a href="http://www.freeproxyline.com/">http://www.freeproxyline.com</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-36210143988607749592009-04-06T08:01:00.000-07:002009-04-07T06:17:45.180-07:00Two new proxies!<a href="http://www.urlpop.info/">http://www.urlpop.info</a> and <a href="http://www.proxyed.info/">http://www.proxyed.info</a> - enjoy these two new anonymous proxiesUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-11865958185736978592009-04-05T04:52:00.000-07:002009-04-06T05:54:15.102-07:002 new proxies<a href="http://hidemybutt.net/">hidemybutt.net</a><br /><a href="http://runfreeproxy.com/">runfreeproxy.com</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-62721136421047318422009-04-03T04:10:00.000-07:002009-04-03T04:21:08.681-07:003 NEW PROXIES FOR Fri Apr 3, 2009 6:55 am<a href="http://www.thissiteisblocked.info/"><b>http://www.thissite<wbr>isblocked.<wbr>info </b></a><br /><a href="http://www.bebo-access.info/"><b>http://www.bebo-<wbr>access.info </b></a><br /><b><a href="http://www.privacyadvocate.info/">http://www.privacya<wbr>dvocate.info</a><br /></b><b></b>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-88470396264026733932008-10-30T06:48:00.000-07:002008-10-30T06:50:17.944-07:00Challenge and VPNAt present, many units are faced with this challenge: branch offices, distributors, partners, customers and business trip called at any time after the company's public access network resources, which include: the company's internal information office OA, ERP systems, CRM Systems, project management systems. Now many companies through the use of IPSec VPN to ensure the company headquarters and branch offices and mobile workers a secure connection between. <br />IPSec VPN for many users, IPSec VPN solution for the high cost and complexity of the structure is a headache. The existence of the following facts: in the deployment and use of hardware and software client, a large number of needs assessment, deployment, training, upgrades and support for users, whether they are economically and technically is a very big burden, long-range Solutions and expensive in-house application integration, IT professionals are no serious challenges. As a result of IPSec VPN over the limit, a large number of enterprises that are IPSec VPN is a high cost, complexity, or even impossible to implement a program. In order to maintain competitiveness, the elimination of internal islands of information, many companies and enterprises related to the needs of different organizations and individuals between the transmission of information, so many companies in need of a simple implementation without the need to change the existing structure of the network, operating costs Low solution. <br />HLINK VPN features <br />1.USB (KEY) Plug and Play <br />2. To support the multi-binding <br />3. Own address resolution <br />4. Efficiency, security, stability <br />5. Expansion of flexible, free <br />6. Improve the competence of management <br />7.'s Low-cost solution for VPN <br />8.'s Maintenance-free VPN solutionUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-4196224478387501182008-10-28T04:49:00.000-07:002008-10-28T04:52:35.839-07:00What Are VPN Stand For?VPN is the use of public networks to build private networks, which is specially designed hardware and software directly through the sharing of the IP network established to complete the tunnel. We usually WAN as a VPN solution, but it can also be used simply LAN. VPN similar to the dial-up connection or a direct point-to-point leased line connections, even though it is based on switching and routing of the way. <br /><br />It can be said that, VPN is the Intranet (internal network) in an extension of the public network, which can provide the same private network security, manageability and transmission performance, and the construction, operation and maintenance of the network from internal IT sector stripped out by the operators to be responsible for. <br /><br />VPN is based on the actual network (physical or network) on the basis of a functional network. It uses the network of public enterprises as the backbone of low-cost advantages of public networks at the same time overcome the lack of confidentiality of the weaknesses in the VPN network, the public network at both ends of the network in the public network to transmit information, information on its safety are dealt with , To ensure data integrity, authenticity and the private nature. <br /><br />VPN is the network share to establish private network technology. The reason is called a virtual network as a whole mainly due to the VPN network between any two nodes do not have to connect the traditional network of professionals required for the construction of the physical point-to-point link, but in the framework of public network services provided by the ISP business The network platform of the logic of the network. User data through the ISP in the public network (Internet) to establish the logic of the tunnel (Tunnel), that is a virtual point-to-point line for the transmission. Through the encryption and authentication technologies to ensure user data in the internal network of public safety on-line transmission network in order to realize the proprietary nature. <br /><br />VPN is a network of business on the Internet and other public network, an extension of it in the public network to create a secure private connection, so let's remote users, branch offices, business partners and so on with the company's corporate network linking a The expansion of the enterprise network.Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-3238585326446178568.post-45719405409873923142008-10-25T17:29:00.000-07:002008-10-25T17:31:26.683-07:00What is VPN and Why should use VPN?VPN stands for Virtual Private Network, and is an increasingly popular form of proxy for security and to stay anonymous on net. VPN Hosting is about creating private network or tunnel over the public network "internet". Each VPN tunnel is totally anonymous on the public internet and it helps to keep your activities anonymous and safe. VPN hosting is an attractive option for people concerned about their security and privacy.<br /><br />VPN Provides You:<br /><br />* Provides a layer of security and anonymity.<br />* Prevents local ISP from regulating your connection.<br />* Prevents harassment from people tracking you by your IP address.<br />* Safe/encrypted connection between your computer and the Internet.<br />* Access blocked sites and bypass proxy and content filters.<br />* Internet Service Provider won't know you are using it.<br />* Your office or school won't know you are using it either!<br />* Bypass Skype/MSN blocks.<br />* Skype sound quality may improve with a VPN connection.<br />* Visit all blocked/censored websites.<br />* Prevent your ISP from bandwidth throttling for torrent and other P2P networks<br />* Unblock All PortsUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-49488161077151344782008-10-24T07:51:00.000-07:002008-10-24T07:54:10.910-07:00Why should use a firewall? part 2To prevent internal leakage of information: <br /><br />By using a firewall on the internal network division, can focus on the internal network segment isolation, limiting the focus of local or network security issues sensitive to the impact of the global network. In addition, privacy is very concerned about the internal network, an internal network, not the details of the profile may contain a clue about security caused by external attacker interest, even while the storm omitted some of the internal network security holes . Use a firewall can be hidden within those disclose details such as Finger, DNS, and other services. Finger show hosts of all the registered user name, real name, the last time to log on and use the type of shell, and so on. Finger but very easy to show that the information was informed by the attacker. An attacker could use the system to know the frequency of the system if there is to connect Internet users, whether or not the system in the attack to draw attention, and so on. Similarly, the firewall can block related to the internal network of DNS information, so a host of domain names and IP addresses will not be understood by the outside world. <br />In addition to security, the firewall also has the support of Internet service characteristics of the enterprise network technology system VPN (virtual private network). <br />English firewall called "FireWall", it is one of the most important network of protective equipment. From a professional perspective, the firewall is located in two (or more) network, network access control between the set pieces Yi Zuzu. <br />In the network firewall is often shown in the chart below are two icons appear. The very image of the icon on the left, like a wall, like real. And the icon on the right side from the firewall to filter mechanism to visualize, there are icons in the icon of a diode. Diodes and we know that it is conducting a one-way, this is vividly illustrated with a single firewall wizard transparency. It now appears that some mechanism for filtering firewall conflicts, but it fully reflects the firewall in the early design idea, as well as a large extent reflects the current firewall filtering mechanisms. Fire because the initial design idea is always the internal network of trust, and the external network is not always trusted, so the firewall is only the first external filter incoming communications, and internal communications issued by the users not to limit . Of course, the current firewall filtering mechanism in the changes, not only for external communications issued by the network to connect to filter internal users to connect to issue some of the requests and needs of the same packet filtering firewall, but still only in line with the security strategy Communication through, it can be said to have "unilateral connecting" sexual. <br />Firewall refers to the original meaning of the ancient wooden structure of the building and use of housing, in order to prevent the occurrence and spread of fire, it will be solid and a pile of stones in the surrounding housing as a barrier, the protective structures to be known as the "firewall." In fact, the firewall and work together with the "door." If there are no doors, the people room how communication, the Room of these people, how can it get? When the fire broke out, those who fled the scene, how do? This is equivalent to the door on us by talking about the firewall "security strategy", so here we are talking about a firewall is not the actual wall solid walls, but with some small holes in the wall. These small hole is left to those used to allow communication in these small holes in the installation of a filtering mechanism, which is described above, "one of the universal guide."Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-37207984762271666872008-10-23T04:40:00.000-07:002008-10-23T04:42:33.812-07:00Why should use a firewall?The firewall is the network security barrier: A firewall (as chokepoint, control point) can enhance an internal network enormously the security, and through filters the unsafe service to reduce the risk. Because only then undergoes the careful choice the application agreement to be able through the firewall, therefore the network environment becomes safer. If the firewall may forbid such as the well known unsafe NFS agreement to pass in and out is protected the network, like the exterior aggressor is impossible to use these frail agreements to attack the internal network. At the same time the firewall may protect the network to be exempt from based on route's attack, like in IP option source route attack and ICMP heavy direction detection heavy directional way. The firewall should be possible to reject all above type attack the text and informs the firewall manager. The firewall may strengthen the cyber security policy: Through take the firewall as the central safety program disposition, can possess the security software (for example password, encryption, status authentication, audit and so on) to dispose on the firewall. With disperses the network security problem to each main engine on compares, firewall's centralism safety control is more economical. For example when network visit, a dense password system and other status authentication system definitely may not need to disperse on each main engine, but concentrates on a firewall body. Carry on the monitoring audit visit to the network access and: If under all visits after the firewall, that the firewall can record these to visit and to make the diary record, simultaneously can also provide the network service condition the statistical data. When has the suspicious movement, the firewall can carry on the suitable warning, and provides the network whether to receive the monitor and the attack detailed information. Moreover, collects a network the use and misuses the situation is also very important. The first reason is may the clear firewall whether can resist aggressor's survey and the attack, and clear firewall's control to be whether sufficient. But the network use statistics and so on speaking of the network demand analysis and the threat analysis are also very important.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-73682543536244857472008-10-22T05:52:00.000-07:002008-10-22T05:55:33.487-07:00Firewall ABC 2Has a very good firewall protection. Intruder must first pass through the firewall security line of defense in order to access the target computer. You can configure the firewall into a number of different levels of protection. A high level of protection may be to prohibit certain services, such as video streaming, and so on, but at least it is to protect your own choice. <br />There are different types of firewall. A hardware firewall can be a part of their own, you can connect to the Internet and the computer to insert all of them. A firewall can also run on separate machines, the machines behind it as a network of agents and all the computer firewall. Finally, even direct the machine on the Internet can use personal firewall. <br />Of course, since the intention to understand the easy-to-digest, it is necessary to take a look at the concept of a firewall. Firewall is a car in the name of the parts. In the car, use a firewall to separate passengers and the engine, so that once the fire engine, the firewall will not only protect the safety of passengers, while at the same time so that drivers can continue to control the engine. Another computer terminology, of course not be interpreted that way, we can come to understand the analog network, the so-called "firewall" refers to an internal network and the public access network (such as the Internet) separate ways, it is actually A separation technology. Firewall is a network of communications in both the implementation of an access control measure, it allows you to "consent" and the data you enter the network at the same time you will "not agree" and the data out to the maximum Network to prevent hackers access to your network. In other words, if not through the firewall, the company's in-house who will not be able to access Internet, Internet on people and companies can not carry out internal communications.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-50320465213429154882008-10-21T04:51:00.000-07:002008-10-21T04:53:06.898-07:00Firewall ABCThe definition of a firewall <br /> Referring to the so-called firewall is a software and hardware combination, intranet and extranet, private network and public network interface between the structure of barrier protection. Is a method of acquiring the image of security, It is a kind of computer hardware and software, so that the Internet and Intranet set up a secure gateway between the (Security Gateway), so as to protect the internal network from unauthorized users of the intrusion, firewall services from the main access rules, verification tools, including Gateway filtering and application of 4 parts, a firewall is located in the computer and connect its network between the hardware or software (which uses less hardware firewall, such as the Department of Defense, as well as large rooms and other places before, because it Expensive). The inflow and outflow of all the computer network were to go through the firewall. <br /><br />The firewall function <br />It flows through the firewall on the network to scan, which can filter out some of the attacks, so that they will be executed on the target computer. Turn off the firewall can not use the port. But it can also prohibit the outflow of port-specific communications, blockade Trojan horse. Finally, it can be prohibited from special visit to the site in order to prevent intruders from unknown to all communications.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-84538982732944397402008-10-20T06:53:00.000-07:002008-10-20T06:54:58.813-07:00PrivoxyPrivoxy is a model of belt filtration function agent server, in view of HTTP, HTTPS agreement, frequently with Tor combination use. Through Privoxy super filtration function, user, thus may protect the privacy, carry on the filtration to the homepage content, to manage cookies, as well as detains each kind of advertisement and so on. Privoxy may serve as the single plane, may also apply the multiuser network. <br /><br />Privoxy based on Internet Junkbuster, carries on the issue according to GNU General Public License. May in Linux, Windows, Mac OS X, AmigaOS, BeOS, as well as on each kind of Unix moves. <br /><br />The newest stable version 3.0.8 issued in January 19, 2008.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-76295817352328969122008-10-19T06:06:00.000-07:002008-10-19T06:08:39.694-07:00Default GatewayFor a TCP / IP protocol configuration, is a direct arrival of the IP router's IP address. Default gateway can be configured in the IP routing table to create a default path.<br />IP address of the router to give the name of the local network and connect the machines must be out of traffic to this address in order to pass beyond the local network, so that the address be outside the local subnet IP address of the "gateways." Also Recently, the gateway is used when the host or network routing table heading input does not exist in the local routing table when they host the packet is sent to there.<br />Gateway (Gateway) is a network connection to another network's "gateway."<br />In accordance with different standards, there are many gateways. TCP / IP protocol, the gateway is the most commonly used, here we are<br />Said the "gateway" refer to TCP / IP protocol under the Gateway.<br />Gateway then in the end what is it? Gateway is essentially a network to other network IP address. A network such as network and B, Network A range of IP addresses "192.168.1.1 ~ 192. 168.1.254", for the subnet mask 255.255.255.0; Network B of the IP address of the range "192.168.2.1 ~ 192.168. 2.254 ", as a subnet mask of 255.255.255.0. In the absence of routers, the two networks can not be carried out between the TCP / IP communications, even if the two network connections on the same switch (or hub) on, TCP / IP protocol will be based on subnet Mask (255.255.255.0) to determine the two networks in a host of different network. In order to achieve these two communications networks, through Gateway. A network if the host was found in the packet is not the purpose of hosting the local network, put forward the packet to its own gateway, and then forwarded by the gateway to the network gateway B, B network gateway and then sent to the network B of a host (such as shown in the attached map). Network B to A network packet forwarding process. Therefore, only set up the gateway IP address, TCP / IP protocol can be achieved between the different networks to communicate with each other. Then the IP address of the machine, which is the IP address? Gateway is the IP address of the routing of the IP address of the device, with the routing equipment router, routing protocol enabled server (essentially the equivalent of a router), the proxy server (also The equivalent of a router).<br />What is the default gateway<br />If you understand what is the gateway, the default gateway is also a good understanding. Just like that there will be a room door,<br />A host to a number of gateways. The default gateway is the meaning of a host can not be used if the gateway, put the packet sent to default gateway specified by the gateway to deal with the packet. Gateway is now used by the host, in general refers to the default gateway.<br />How to set the default gateway<br />A computer's default gateway is not designated by the casual, must be properly designated, or a computer will<br />Gateway is not a packet sent to the computer, which can not compete with other computer communications network. Gateway's default settings are automatic and manual settings set in two ways.<br />1. Settings manually<br />Manual settings apply to the relatively small number of computers, TCP / IP parameters remain basically unchanged, for example, only a few dozen to Taiwan<br />Computer. Because this would require each of the networks linked to a computer set up on the "default gateway" very hard, because once the migration and other factors led to the need to modify the default gateway IP address to the network will bring big trouble So is not recommended to use.<br />In Windows 9x, set the default gateway is in the "Network Places" on the right-click in the pop-up menu, click<br />"Properties" on the network Properties dialog box, select the "TCP / IP protocol," click on "Properties" and "default gateway" to fill in a new tab in the default gateway IP address it.<br />Need to pay special attention to is this: By default gateway must be a computer's own network segment of IP addresses, and can not fill in the other<br />Segment of IP addresses.<br />2. Automatically set<br />Is automatically set to use DHCP server automatically to the computer network, the distribution of IP address, subnet mask and default gateway<br />. The benefit is that once the network's default gateway has changed, as long as a DHCP server to change the default setting of the gateway, then all the computer networks are a new default gateway IP address. This method is suitable for large-scale network, TCP / IP parameters may change in the network.<br />Another automatic access to the gateway through a proxy server to install software (such as MS Proxy) of client<br />To automatic, its principles and methods are similar and DHCP. Due to limited space, no longer on the details.<br />If you look at the beginning of routing knowledge, they would easily understand,<br />Into the command-line mode:<br />C: \> route print<br />There will be a route:<br />0.0.0.0 0.0.0.0 default IP Gateway Interface (machine IP) hop<br />For example, my machine:<br />0.0.0.0 0.0.0.0 192.168.100.254 192.168.100.233 1<br />Means: the needs of all packets transmitted, are the default gateway IP (Interface) sent out, of course, is to return from there afterUnknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-52753045079232430802008-10-18T07:20:00.000-07:002008-10-18T07:21:52.950-07:00IPsecThe IP level is in the TCP/IP network most essential one, IP takes the network level agreement, its safety mechanism may provide the transparent cover type safekeeping of security to its upper formation each kind using the service. Therefore, the IP security is the entire TCP/IP security foundation, is the network security core. IPSec is the present only one kind can provide the safety control for any form Internet correspondence the agreement. The IPSec permission provides the security which one by one data stream or connects one by one, can therefore realize the very careful safety control. Regarding the user, then may regarding different need to define the different rank safekeeping of security (i.e. different protection intensity IPSec channel). IPSec was the network data transmission provides the data confidentiality, the data integrity, the data origin authentication, anti-to rebroadcast and so on safe service, caused the data when through the public network transmission, did not need the worry to monitor, to tamper with and fabricates. IPSec is through uses each kind of encryption algorithm, the confirmation algorithm, the seal agreement and some special safekeeping of security mechanism realizes these goals, but these algorithms and the parameter are the preservation in carry on IPSec correspondence both sides SA (Security Association, security alliance), when in both sides SA establishment match, the both sides might carry on IPSec to correspond. Has mainly used the IPSec technology in hypothesized private network (VPN).Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-27085337997453257692008-10-17T06:34:00.000-07:002008-10-17T06:36:56.024-07:00Virtual Data NetworksThe telecommunication domain is promoting many organizations to need to use between the long-distance place establishing the virtual data network the technology, these technologies mainly use in the campus environment, the urban region, the macrozonality, or the global region. The virtual data network all place all systems carried on the entire interconnection for the organization to provide compared to having rented the owner-use circuit and the establishment private network expense low many ways. Its goal is provides local area network's speed on WAN. The packet switching service, for example the frame relay and the exchange type many megabit digital data services (SMDS, is providing the virtual data networking capability and to owner-use circuit's replacement demand. These services provide have the microsecond exchange capacity band width. The customer only need use for them serves carries on the payment. These services by long-distance telecommunication bureau, for example AT& T, MCI, and USSprint, as well as value-added network (VAC), for example CompuServe, Infonet and Tymenet and so on provide. Circuit switching service, for example exchange - 56, exchange - 384K (AT& T), exchanges T1 and exchanges T3, now with these telecommunication services equally also very popular use few expenses, now some very small place may also include in a very big business data network. Moreover, individual demand is not now high, this is because these telecommunication services have processed the exchange element. Through the packet switching service, sole “the data pipeline” transmits the data from the customer place to the telecommunication bureau, then transmits again from this telecommunication bureau to other places. However, the network management personnel considered when entrusts with many network managements a public telecommunication bureau produces loses the control the question, although these telecommunication bureaus can also provide about these service suitable management information.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-8943625812916212202008-10-16T05:12:00.000-07:002008-10-16T05:13:27.382-07:00What is VPNVPN's full name in English is the "Virtual Private Network", is translated through the "virtual private network." As the name suggests, virtual private network, we can understand it as a virtual enterprise out of line. It can be a special encrypted communication protocols in the Internet connection in different places at two or more enterprises to establish a network between the proprietary communication lines, is set up like a line, but it does not The real need to lay fiber optic cable like the physical line. It can be compared to apply for telephone line, but not for the cost of laying lines, there was no need to buy routers and other hardware equipment. VPN router technology used to be one of the important technologies currently in the switch, firewall software, such as equipment or WINDOWS2000 also features VPN support, saying, VPN is the core of the use of public networks in the establishment of virtual private network. <br />Virtual Private Network (VPN) is defined as through a public network (usually the Internet) to establish a temporary and safe connection is through a confusing network of public security, stability of the tunnel. Virtual Private Network is the expansion of the Intranet. Virtual Private Network can help remote users, branch companies, business partners and suppliers with the company's internal network to connect the establishment of credible security and guarantee the security of data transmission. Virtual private networks can be used for the growing global mobile users Internet access in order to achieve a secure connection; corporate Web site can be used to achieve secure communications between virtual private leased circuits, for cost-effective to connect to business partners and customers secure Extranet Virtual Private Network. We combine the following site related to Cisco and Microsoft VPN on the articles you for this information, more and a wealth of relevant aspects of our content will be added for days after. <br />For different user requirements, VPN There are three solutions: remote access virtual network (Access VPN), virtual enterprise network (Intranet VPN) and the expansion of enterprise virtual network (Extranet VPN), the three types of VPN with traditional long-distance Access network, enterprise and corporate Intranet network partners and corporate networks posed by the Extranet (external expansion) corresponds to.Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-3238585326446178568.post-16407442532629853462008-10-14T06:34:00.000-07:002008-10-14T06:38:11.531-07:00Basic Knowledge of ProxyEnglish name: Proxy Server, <br />Function: Deputy users access to network information. The image that it is a transit point for the network information. <br />Under normal circumstances, we use the Web browser to connect directly to other Internet sites to obtain information network, is directly connected to the purpose of the site server, and then by the purpose of the site server to send back information. Proxy server is in the range of browsers and Web servers between another server, it has been following the browser rather than directly to the Web server to get back to the page, but issued a request for a proxy server, the signal will be sent to the proxy server, By the proxy server to get the browser and the information they need to send to your browser. <br />Www.51an.com in the URL box you want to visit the Web site address, click agent will open a new browser window to link a proxy server, you can wait a few seconds, if the link can not appear at this time, and other server error, please above Try to choose the other server, proxy server because of the large consumption of resources, and there are time-sensitive, so sometimes can not open, we must try several times a proxy server. Automatic Updates can be used day-to-date server. <br />Most of the proxy server has a buffer function, just like a big Cache, it has a lot of storage space, it will continue to get new data stockpile to its local memory, the browser if the requested data in it Machines already exist on memory and up-to-date, it will not re-check the data from the Web server, and the memory directly on the data to the user's browser, which can significantly increase the speed and efficiency of the browser. <br />More importantly: the proxy server is the Internet gateway provided by the link level is an important safety feature, which is mainly in the open systems interconnect (OSI) layer model of dialogue in order to play the role of the firewall. <br />For these reasons, most of the proxy server is used to connect INTERNET (Internet) and INTRANET (LAN). At the national level, the so-called China Public Multimedia Information Network and Education Network is an independent state-level large-scale local area network, and is isolated from the Internet. For a variety of needs, some groups or individuals in the network between the two set up a proxy server, if we know the address of the proxy server, you can use it to reach Web site abroad.Unknownnoreply@blogger.com0