Комментарии:
So funny how the laptop class ;) thought most people could work from home
Ответитьi kind of lost the plot at the 2nd half of the video
ОтветитьDoes my company need a VPN if all of our data is stored in the cloud?
ОтветитьWhat has happened to me quite a lot is that I would connect to my workplace via VPN in the morning, and then forget to disconnect after end of work. Now my employer knows all the dirty sites I visit.
ОтветитьGreat explanation
ОтветитьMore videos!!!
ОтветитьMan, the way this guy explains thing is so damn difficult to follow.
ОтветитьI still don't understand why you would go through all of this trouble, as opposed to just encrypting the data and sending it over tcp over ip. Why does it need to be wrapped up inside another packet like this. Couldn't students just access school data by connecting through a secure TCP line?
ОтветитьAm I able to use a VPN so I can work out of the US temporarily? US system/connections might not recognize IP addresses from a different country
ОтветитьWhich app on the iPad did you use for drawings?
ОтветитьGreat video, can you address basic security concerns of using a personal cell phone as a wifi hotspot in a public environment.
ОтветитьIs this Computerphile or Applephile?! Every video there's some Apple product featured be it a Mac or iPad! 🤣
Ответитьnice video length
Ответитьcan you also explain in a video how ssh with port forwarding will be working for such a scenario? And under what conditions that is used for remote access rather than using VPNs?
ОтветитьI wonder about the significance of the user having 4 arms
ОтветитьWhat about DNS leaks?
ОтветитьI'm not sure how you had a conversation about how VPN works and didn't talk about GRE or IPSec, but hey, I guess this was intended for a more general audience.
ОтветитьWhat is the difference between proxy server and VPN server
ОтветитьAnd there was me believing that packets were encapsulated within frames and it was the frames that were sent out over a wire to other devices.
ОтветитьNice video duration time! ^^'
ОтветитьHi I need someone to help me on my program project. please.
Ответитьnow I NEED to know why it uses UDP!
Ответитьomfg MS Teams 😵
ОтветитьWhere is the caption??
ОтветитьCan you do a video on Wireguard? its avery special piece of software.
ОтветитьWorst Procreate tutorial EVER ;)
ОтветитьAre those Doctor Who DVD's in the background?
ОтветитьI've measured the performance of VPN and ssh, and ssh is about 6 times faster than the vpn we use at work (at least in one direction), so all I use the vpn for is to setup an ssh tunnel from work to home, then I run the x2go remote desktop over ssh.
ОтветитьTerrible Explanation. I just don't understand what was so understandable in his speech. He couldn't explain it in lesser technical terms. Disappointed with Computerphile
ОтветитьOpens the video, sees Signal, clicks on like immediately <3
ОтветитьAppears to have a PiDP-11 in his dining room on a shelf. I'm unsurprised 😂
ОтветитьClear, concise explanation. Thank you.
Ответитьnot sure most people are working from home..... certainly not the hundreds of thousamds whos industrys have shut down
ОтветитьI like the video because you’re explaining how a VPN works but I do wish you had spoken about the risk of giving a remote user network level access in a corporate use case. What if the user introduces malware into the network via VPN? VPN’s have had their day... time to move away from this type of approach for non admin users. Use a dual app proxy based architecture and improve the security posture and still prove access to private applications hosted in the dc.
ОтветитьPlease add a section on the use of personal devices to connect to corporate resources: risks and mitigation
ОтветитьHow vague
Ответитьwhat are those DVDs on his bookshelf?
Ответитьppl in the future will look back at videos from march 2020 and be like, what the f*ck is going on?
ОтветитьBe kind and turn off your webcam during your Zoom meetings while connected to your company's VPN.
ОтветитьSomewhere in my parents' attic I have the same VHS box set of the Ice Warriors.
ОтветитьDamn he has a complete book just on OSPF routing? Wow!!
ОтветитьI loved this talk, it's funny hearing him trying so hard to not use too technical language to keep it accessible.
ОтветитьI gave up with this bore.
Ответить1337
ОтветитьPerimeter security, what could possibly go wrong...
Ответить