1
VPN Reviews / Re: ZenMate - a free privacy protection plugin for Chrome
« on: June 15, 2015, 03:27:52 PM »
You can visit their site here: https://zenmate.com/
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
All of the above.
A VPN...allows you to access resources inside of another network, by connecting your computer to the network through a "tunnel".
You can get access to a share on a server
And other servers...
And other workstations.
And remote to a desktop if you want, or to a server..using RDP
You can launch an application and get access to the database on a server
Basically you can do everything you could do...if your computer was connected to that office network. Just...a bit slower. Because you're connected at the slow rate of going across the internet.
There are software VPNs...software VPN server...a service like RRAS running on the server. And you have software VPN clients...even built into Windows....PPTP, IPSec.
And you have hardware VPN appliances...a hardware VPN server....handles all the connections and processing power. And you can have a piece of hardware be the VPN client also. Many routers support being clients.
Using the hardware VPN server and hardware VPN tunnels (like a router on each end)...you can create full time VPN tunnels...and this is one of the ways we make "wide area networks"...WANs. Satellite/branch offices networks are connected to the "mothership" office....so they can access resources just like their buildings were connected...because in essence, their networks are connected.
Cache poisoning attacks
Normally, a networked computer uses a DNS server provided by the computer user's organization or an Internet service provider (ISP). DNS servers are generally deployed in an organization's network to improve resolution response performance by caching previously obtained query results. Poisoning attacks on a single DNS server can affect the users serviced directly by the compromised server or indirectly by its downstream server(s) if applicable.
To perform a cache poisoning attack, the attacker exploits a flaw in the DNS software. If the server does not correctly validate DNS responses to ensure that they are from an authoritative source (for example by using DNSSEC) the server will end up caching the incorrect entries locally and serve them to other users that make the same request.
This technique can be used to direct users of a website to another site of the attacker's choosing. For example, an attacker spoofs the IP address DNS entries for a target website on a given DNS server, replacing them with the IP address of a server he controls. He then creates files on the server they control with names matching those on the target server. These files could contain malicious content, such as a computer worm or a computer virus. A user whose computer has referenced the poisoned DNS server would be tricked into accepting content coming from a non-authentic server and unknowingly download malicious content.
DNS Screwup Accidentally Extends Great Firewall Of China To Chile And The US?
A bit surprised this story didn't get more attention, but apparently some sort of DNS networking "error" meant that certain computers in both the US and Chile came up against the infamous Great Firewall of China -- meaning many sites were suddenly inaccessible (and, one assumes, Google sent folks to Google Hong Kong):
Security experts are not sure exactly how this happened, but it appears that at least one ISP recently began fetching high-level DNS (domain name server) information from what's known as a root DNS server, based in China. That server, operated out of China by Swedish service provider Netnod, returned DNS information intended for Chinese users, effectively spreading China's network censorship overseas. China tightly controls access to a number of Web sites, using technology known colloquially as the Great Firewall of China.
The issue was reported Wednesday by Mauricio Ereche, a DNS admin with NIC Chile, who found that an unnamed local ISP reported that DNS queries for sites such as Facebook.com, Twitter.com and YouTube.com -- all of which have been blocked in China -- were being redirected to bogus addresses.
I'm reminded of the case when Pakistan tried to block YouTube and ended up blocking YouTube around the globe. Just a bit of a scary reminder of how fragile and interconnected the internet can be at times.
Free Servers
Some of our servers are free, and they are truly free - you won’t pay a dime no matter how long you stay connected to these servers. But please note that usually the free servers are quite crowded, for obvious reasons: we all love free stuff, and the network speed and ping on them is low most of the time.
http://digiex.net/
1.2 What is it not?
Your Freedom is not a VPN software. It does not provide a connection to a
private network but to the Internet.