When working on the Internet, the highest priority should be to ensure the safety of users. Indeed, in the “global web” there is a huge number of fraudulent sites and simply dishonest personalities. To protect their users, Mozilla developers put a huge amount of effort. They came out and went out well, but they did the most important thing – they gave a start to their users. Simple and intuitive add-ons (plug-in) began to appear quite quickly. It is about such plugins that will be discussed in this article.
Written both by craftsmen and professional programmers, these plugins perform one, but very important function – to warn the user about the danger that awaits him. They work quite simply, in fact in two Continue reading
The term VPN (Eng. “Virtual Private Network”) refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network, usually the Internet.
Although data is transferred to a VPN over networks with a low level of trust, thanks to the use of cryptography, the level of trust in a VPN can be arbitrarily high. Among the cryptography tools used are encryption, means to protect against changes in transmitted messages, public key infrastructure and authentication. Depending on the final destination, the VPN implements three types of connections: network-to-network, node-to-network and node-to-node.
VPN implementation and structure Continue reading