Virtual Private Network (VPN) refers to a method of creating a private (encrypted) communication path between two devices, even if this path is over the private Internet. With VPN, if an attacker captures the conversation between two endpoints, he will only see encrypted packets that have no relevance and do not reveal their true content.
VPNs are usually maintained by dedicated devices called VPN concentrators, which have the main purpose of initiating and ending VPN tunnels and doing all the necessary encryption/decryption processes. In small environments, these operations can be accomplished by dedicated software applications. VPN concentrators can come . . .
The content below this message is for members only.