<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ru">
	<id>https://wiki.mininuniver.ru/index.php?action=history&amp;feed=atom&amp;title=~Delete_39623</id>
	<title>~Delete 39623 - История изменений</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mininuniver.ru/index.php?action=history&amp;feed=atom&amp;title=~Delete_39623"/>
	<link rel="alternate" type="text/html" href="https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;action=history"/>
	<updated>2026-04-27T08:48:44Z</updated>
	<subtitle>История изменений этой страницы в вики</subtitle>
	<generator>MediaWiki 1.32.0</generator>
	<entry>
		<id>https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=492229&amp;oldid=prev</id>
		<title>Moderator: Moderator переименовал страницу Xbox vpn в ~Delete 39623: Spam</title>
		<link rel="alternate" type="text/html" href="https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=492229&amp;oldid=prev"/>
		<updated>2025-12-27T01:39:43Z</updated>

		<summary type="html">&lt;p&gt;Moderator переименовал страницу &lt;a href=&quot;/index.php/Xbox_vpn&quot; class=&quot;mw-redirect&quot; title=&quot;Xbox vpn&quot;&gt;Xbox vpn&lt;/a&gt; в &lt;a href=&quot;/index.php/~Delete_39623&quot; title=&quot;~Delete 39623&quot;&gt;~Delete 39623&lt;/a&gt;: Spam&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ru&quot;&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Предыдущая&lt;/td&gt;
				&lt;td colspan=&quot;1&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Версия 01:39, 27 декабря 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-notice&quot; lang=&quot;ru&quot;&gt;&lt;div class=&quot;mw-diff-empty&quot;&gt;(нет различий)&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;</summary>
		<author><name>Moderator</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=492228&amp;oldid=prev</id>
		<title>Moderator: Spam cleanup</title>
		<link rel="alternate" type="text/html" href="https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=492228&amp;oldid=prev"/>
		<updated>2025-12-27T01:39:41Z</updated>

		<summary type="html">&lt;p&gt;Spam cleanup&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ru&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;← Предыдущая&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #222; text-align: center;&quot;&gt;Версия 01:39, 27 декабря 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Строка 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Строка 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;At this time, know-how is VPN (Virtual Private Community - Virtual Personal Network) has won common recognition and any administrator considers it his duty to arrange the VPN-channels for employees doing the job exterior the office environment (Determine one).&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;Content removed&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;VPN can be an association of person machines or area networks in a virtual network that assures the integrity and security of data transmitted. It's got the qualities with the chosen personal networks and allows data transfer amongst two personal computers via an intermediate network (world wide web perform), these kinds of as World-wide-web.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[http://hotvpnsolutions.com/ Protection WiFi]&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;VPN contains a variety of economical positive aspects in excess of other methods of remote access. To begin with, people can accessibility the corporate network devoid of adding do her dial-up connection, so there's no really need to use modems. 2nd, you can dispense with leased lines.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[http://hotvpnsolutions.com/ Unblock Website]&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;With use of cyberspace, any person can simply connect for the place of work of his organization. It should be famous which the accessibility on the data doesn't signify their vulnerability. Protection Process VPN - a protect which safeguards all corporate facts from unauthorized accessibility. For starters, information is transmitted in encrypted form. Read through the info can only important holder towards the cipher. One of the most usually made use of encryption algorithm is Triple DES, which offers a triple encryption (168 bits), employing about three different keys.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Authentication involves checking information integrity and authentication of users concerned inside the VPN. The primary makes sure that the data reaches its meant recipient is during the form during which had been sent. The most popular algorithms for verification of data integrity - MD5 and SHA1. Up coming, the process checks no matter if the data is adjusted whilst in motion about the networks, by blunder or maliciously. Therefore, VPN will involve the establishment of protected against unauthorized accessibility tunnels concerning many nearby place networks and remote consumers.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;To build a VPN, you need to have at equally ends on the line of communication amongst the outgoing encryption and decryption of incoming targeted visitors. They'll run on dedicated components products and on PCs with functioning programs these as Windows, Linux or NetWare.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Entry management, authentication and encryption - vital components of a protected connection.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Fundamentals of tunneling&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;Tunneling (tunneling), and encapsulation (encapsulation), - a mode of transmission of helpful info via an intermediate community. These data might be frames (or packets) of a different protocol. When encapsulating a body is not transmitted on the node made because of the sending condition, and is particularly offered with the added header which has information regarding the route, permitting encapsulated packets to go through an intermediate network (Web). For the conclude of the tunnel frames and transmitted to your recipient.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;This process (together with the encapsulation and transmission of packets) is definitely the tunneling. Rational route of motion of the encapsulated packet towards the transit network is referred to as a tunnel.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #222; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;VPN is effective depending on the protocol PPP (Point-to-Point Protocol). The PPP protocol is intended to transmit info over phone lines and dedicated connections, &amp;quot;point to place.&amp;quot; PPP encapsulates packets IP, IPX and NetBIOS in PPP frames and sends them by using &amp;quot;point to point.&amp;quot; The PPP protocol can be utilized by routers connected by a dedicated channel, or even the consumer and also the server RAS, related by a remote relationship.&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Moderator</name></author>
		
	</entry>
	<entry>
		<id>https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=43075&amp;oldid=prev</id>
		<title>Xbox vpn: Новая: At this time, know-how is VPN (Virtual Private Community - Virtual Personal Network) has won common recognition and any administrator considers it his duty to arrange the VPN-channels fo...</title>
		<link rel="alternate" type="text/html" href="https://wiki.mininuniver.ru/index.php?title=~Delete_39623&amp;diff=43075&amp;oldid=prev"/>
		<updated>2012-03-24T17:34:26Z</updated>

		<summary type="html">&lt;p&gt;Новая: At this time, know-how is VPN (Virtual Private Community - Virtual Personal Network) has won common recognition and any administrator considers it his duty to arrange the VPN-channels fo...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Новая страница&lt;/b&gt;&lt;/p&gt;&lt;div&gt;At this time, know-how is VPN (Virtual Private Community - Virtual Personal Network) has won common recognition and any administrator considers it his duty to arrange the VPN-channels for employees doing the job exterior the office environment (Determine one).&lt;br /&gt;
&lt;br /&gt;
VPN can be an association of person machines or area networks in a virtual network that assures the integrity and security of data transmitted. It's got the qualities with the chosen personal networks and allows data transfer amongst two personal computers via an intermediate network (world wide web perform), these kinds of as World-wide-web.&lt;br /&gt;
&lt;br /&gt;
[http://hotvpnsolutions.com/ Protection WiFi]&lt;br /&gt;
&lt;br /&gt;
VPN contains a variety of economical positive aspects in excess of other methods of remote access. To begin with, people can accessibility the corporate network devoid of adding do her dial-up connection, so there's no really need to use modems. 2nd, you can dispense with leased lines.&lt;br /&gt;
&lt;br /&gt;
[http://hotvpnsolutions.com/ Unblock Website]&lt;br /&gt;
&lt;br /&gt;
With use of cyberspace, any person can simply connect for the place of work of his organization. It should be famous which the accessibility on the data doesn't signify their vulnerability. Protection Process VPN - a protect which safeguards all corporate facts from unauthorized accessibility. For starters, information is transmitted in encrypted form. Read through the info can only important holder towards the cipher. One of the most usually made use of encryption algorithm is Triple DES, which offers a triple encryption (168 bits), employing about three different keys.&lt;br /&gt;
&lt;br /&gt;
Authentication involves checking information integrity and authentication of users concerned inside the VPN. The primary makes sure that the data reaches its meant recipient is during the form during which had been sent. The most popular algorithms for verification of data integrity - MD5 and SHA1. Up coming, the process checks no matter if the data is adjusted whilst in motion about the networks, by blunder or maliciously. Therefore, VPN will involve the establishment of protected against unauthorized accessibility tunnels concerning many nearby place networks and remote consumers.&lt;br /&gt;
&lt;br /&gt;
To build a VPN, you need to have at equally ends on the line of communication amongst the outgoing encryption and decryption of incoming targeted visitors. They'll run on dedicated components products and on PCs with functioning programs these as Windows, Linux or NetWare.&lt;br /&gt;
&lt;br /&gt;
Entry management, authentication and encryption - vital components of a protected connection.&lt;br /&gt;
&lt;br /&gt;
Fundamentals of tunneling&lt;br /&gt;
&lt;br /&gt;
Tunneling (tunneling), and encapsulation (encapsulation), - a mode of transmission of helpful info via an intermediate community. These data might be frames (or packets) of a different protocol. When encapsulating a body is not transmitted on the node made because of the sending condition, and is particularly offered with the added header which has information regarding the route, permitting encapsulated packets to go through an intermediate network (Web). For the conclude of the tunnel frames and transmitted to your recipient.&lt;br /&gt;
&lt;br /&gt;
This process (together with the encapsulation and transmission of packets) is definitely the tunneling. Rational route of motion of the encapsulated packet towards the transit network is referred to as a tunnel.&lt;br /&gt;
&lt;br /&gt;
VPN is effective depending on the protocol PPP (Point-to-Point Protocol). The PPP protocol is intended to transmit info over phone lines and dedicated connections, &amp;quot;point to place.&amp;quot; PPP encapsulates packets IP, IPX and NetBIOS in PPP frames and sends them by using &amp;quot;point to point.&amp;quot; The PPP protocol can be utilized by routers connected by a dedicated channel, or even the consumer and also the server RAS, related by a remote relationship.&lt;/div&gt;</summary>
		<author><name>Xbox vpn</name></author>
		
	</entry>
</feed>