VPN & Remote Working - Computerphile

Поділитися
Вставка
  • Опубліковано 24 бер 2020
  • As we move towards a remote working culture, Dr Steve Bagley remotely connects to explain what VPN is & how it works.
    / computerphile
    / computer_phile
    This video was filmed by Dr Steve Bagley and Sean Riley and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

КОМЕНТАРІ • 189

  • @drewlop
    @drewlop 4 роки тому +296

    7:40
    i set up VPNs all the time at my previous job and always wondered why IPSec used TCP over UDP, but it never pertained directly to solving a problem so i never looked it up.
    please count this as my vote for a followup video on UDP over TCP :)

    • @OutrageousOctopus
      @OutrageousOctopus 4 роки тому +16

      I work as a 1st line technician at an MSP... All i have been doing the past week and a half is setting up VPN connections and remote access!

    • @pnedkov
      @pnedkov 4 роки тому +47

      It is redundant to encapsulate twice with TCP. You get all the benefits that TCP provides by encapsulating with TCP just once. The second TCP encapsulation will just add an additional and unnecessary network overhead. Look it up for more details. HTH

    • @drewlop
      @drewlop 4 роки тому +17

      pn
      That makes sense, thanks for replying. I guess, then, the point of encapsulating in UDP just boils down to the speed advantage (no need for handshaking and error checking since you’re doing that post-decap anyway) and increased amount of data per packet thanks to smaller header size

    • @tekvax01
      @tekvax01 4 роки тому +1

      @@OutrageousOctopus mee too!

    • @Rickety3263
      @Rickety3263 4 роки тому +48

      KnuckleTips I had a joke about UDP, but you may not get it.

  • @goofyrice
    @goofyrice 4 роки тому +84

    Can you do a series on the regular guests' bookshelves? Their favorite computer and non-computer books? I'm always interested in the background shelves in the videos.

  • @EmileAI
    @EmileAI 4 роки тому +152

    He even has this paper on his iPad...

    • @DrSteveBagley
      @DrSteveBagley 4 роки тому +19

      Amazing what you can do with a little bit of PostScript programming…
      %!PS-Adobe-2.0
      /w 1920 def
      /h 1080 def
      /step 10 def
      /dvsn step 8 mul def
      /margin 36 def
      /gap 4 def
      /biggap 24 def
      /close 4 def
      > setpagedevice
      0 h translate
      1 -1 scale
      0.5 0.8 0.5 setrgbcolor
      /y biggap def
      {
      0 1 close
      {
      0.25 setlinewidth
      margin y moveto
      1920 margin sub y lineto
      stroke
      /y y gap add def
      } for
      /y y biggap gap sub add def
      y 1080 ge { exit } if
      } loop
      0.775 0.80 0.75 setrgbcolor
      biggap 9 add 48 1080 biggap add
      {
      newpath
      dup dup 18 exch moveto
      18 exch 9 0 360 arc
      dup w 18 sub exch moveto
      w 18 sub exch 9 0 360 arc
      fill
      } for
      showpage

    • @BruceGrembowski
      @BruceGrembowski 4 роки тому +2

      @@DrSteveBagley Programming in PostScript? Kudos!

    • @muhammadsiddiqui2244
      @muhammadsiddiqui2244 4 роки тому +1

      What is so special about this?

  • @harrytsang1501
    @harrytsang1501 4 роки тому +26

    Brady is keeping all his dozens of channels alive from the comfort of his home

  • @xliquidflames
    @xliquidflames 4 роки тому +16

    The first time I used a VPN to work from home and realized I could access all the network resources like drives, printers, and servers, I was blown away. Now they have apps for vpns. It's such a cool concept.

  • @harstar12345
    @harstar12345 4 роки тому +12

    I loved this talk, it's funny hearing him trying so hard to not use too technical language to keep it accessible.

  • @michaelwirtzfeld7847
    @michaelwirtzfeld7847 4 роки тому +1

    Clear, concise explanation. Thank you.

  • @Tularis
    @Tularis 4 роки тому +65

    It really annoys me that most people these days think a VPN is just for tunnelling out your internet connection to hide your browsing....

    • @themasterofdisastr1226
      @themasterofdisastr1226 4 роки тому +31

      ....and send it directly to an unknown company, who cannot be trustet with your data (or as much as your isp for that matter)
      I can't see any Problem there

    • @voynich7119
      @voynich7119 4 роки тому +11

      I think we can blame that one on Nord VPN.

    • @IanZamojc
      @IanZamojc 4 роки тому +14

      Count yourself lucky that they know what a VPN is at all. Would you rather be the head of IT having to explain to 1000 employees suddenly working from home what a VPN is as you frantically are issuing them all access credentials?

    • @Tularis
      @Tularis 4 роки тому +7

      Ian Zamojc that has been my entire week...

    • @DusteDdekay
      @DusteDdekay 4 роки тому +6

      @@IanZamojc I'd prefer they knew nothing over having misunderstood the idea completely "oh, for watching american netflix in europe!" easier teaching without some (wrong) presumptions already present.

  • @thesquarezminecraft
    @thesquarezminecraft 4 роки тому +1

    This is the most stable camera work i have ever seen on computerphile

  • @gregf9160
    @gregf9160 4 роки тому +6

    I always had the idea Dr. Bagley was a Doctor Who fan. Now I'm delighted to have that confirmed ;)

    • @IIARROWS
      @IIARROWS 4 роки тому

      I thought all English nerds are Doctor Who fans.

    • @gregf9160
      @gregf9160 4 роки тому

      @@IIARROWS Sadly, no. He's not a nerd either, he's a proper, respected academic.

    • @squirlmy
      @squirlmy 4 роки тому

      @@gregf9160 IDK, in America respected academics are nerds. I suppose you designate them as "boffins". We have no such differentiation. Even "geek" has widened into nearly any enthusiast of anything.

  • @strayling1
    @strayling1 4 роки тому

    Love that PDP 11 front panel.

  • @TheStevenWhiting
    @TheStevenWhiting 4 роки тому +4

    Funny the quality of the mobile video, where all the adverts for video chats on mobiles are always shown as perfect with no buffering ever.

    • @Megaranator
      @Megaranator 4 роки тому

      the connection must have been limited by something, I have never seen that bad video call

  • @stoneskull
    @stoneskull 4 роки тому

    Very informative. Thank you.

  • @georgeprout42
    @georgeprout42 4 роки тому +12

    Classic Dr Who and Star Trek box sets in the dining room? I approve 🍻

  • @Xclann
    @Xclann 4 роки тому +3

    Would be interested in seeing you do a video on BeyondCorp!

  • @dietalkaa
    @dietalkaa 4 роки тому +25

    On the next video would be nice if you spoke about layer 2 and layer 3 tunneling vpn. I think it would be interesting for a lots of people.

    • @TheSam1902
      @TheSam1902 4 роки тому +8

      Even better, talk about the poor man's "vpn" solution: THE SSH DYNAMIC PORT FORWARDING

    • @dietalkaa
      @dietalkaa 4 роки тому +2

      @@TheSam1902 Yes. absolutely. I have been using SSH all the time. Even SSH layer 2 tunneling on many many sites of my hobby link network project

    • @barnumcapote8215
      @barnumcapote8215 4 роки тому +1

      @@TheSam1902 gotta love the power of SSH!

  • @lajya01
    @lajya01 4 роки тому +3

    There are also virtual desktops that you can use. Your home PC becomes a "dumb" terminal running a client program connecting to a corporate virtualization server. A 2-factor authentication (RSA SecurID) is still used just like a VPN.

  • @alameachan
    @alameachan 4 роки тому

    I'm at the same time relieved and disappointed, that the video hasn't at least partially been shot in vertical video format.

  • @RK-ly5qj
    @RK-ly5qj 4 роки тому +1

    This would be a great begining of a materials regarding NETWORK PROTOCOLS. Forst VPN how it work but more specificly. Like 1 phase 2 phase etc etc. :)

  • @Krack3nTehC0D3z
    @Krack3nTehC0D3z 4 роки тому

    Hi Steve, I'm an IT student in Upstate NY and we're taught the importance of using precise terminology. To that point, at 6:00 I believe you meant to say "Ethernet Frame," if I'm not mistaken. I also didn't quite understand your particular usage of "Ethernet Header" and wonder if "Frame" would again be the more appropriate term. Thanks for the video!

    • @struanmurray2625
      @struanmurray2625 4 роки тому +1

      He used the correct terminology: Packet refers to the whole thing; Frame is just the particular section of the packet; Header is the starting contents of the frame. The ethernet header in this case would contain the checksum and Mac addresses.

  • @Epbentenrock
    @Epbentenrock 4 роки тому +3

    So im guessing you guys are going to cover the different types of vpn.
    such as pptp, sstp, l2tp, ipsec / ike.
    as well as other remote access systems such as windows remote desktop protocol (and gateways), virtual network computing (and their gateways).
    the diffrences, which is better for what application.
    if so i can see you getting a lot more views, as you will have many technicians, engineers and the few manager who understood it, using the videos to get funding to implement them.

  • @justinbieber9656
    @justinbieber9656 4 роки тому +1

    can you also explain in a video how ssh with port forwarding will be working for such a scenario? And under what conditions that is used for remote access rather than using VPNs?

  • @chetanpatel1464
    @chetanpatel1464 2 роки тому

    Great explanation

  • @willz5570
    @willz5570 3 роки тому

    Great video, can you address basic security concerns of using a personal cell phone as a wifi hotspot in a public environment.

  • @Gastell0
    @Gastell0 4 роки тому

    reverse proxy is also a more flexible way to scale access to corp web resources securely (well, as long as you keep up with latest web security standards and have a per client machine certificate)

  • @NoEgg4u
    @NoEgg4u 4 роки тому +25

    Although VPNs offer excellent solutions for securely connecting to remote networks, VPNs also introduce a risk:
    At the office, the IT personnel are responsible for computer security.
    They can enforce group policies, ensure that everyone is running company approved anti-virus software, etc.
    At home, the company often has zero control over the computer being used to establish a VPN connection. That home computer could be compromised with a key-logger, etc.
    For such a connection, the company should be purchasing the home system, and should be enforcing the same conditions on that computer, as though that computer was in the office.
    When the employee parts ways with the company, then that home computer, which is company property, goes back to the company.

    • @Meegoue
      @Meegoue 4 роки тому +24

      If a company allows you to connect to their VPN server, they better limit those connections only to work laptops, which they do have control over.
      The place I worked at, basically gave everyone their own laptop, which they used both at home and at work. You come to work, connect it to extenal displays and peripherals, and use it like a normal desktop. Then at the end of the work day, you take it home with you. So there is no "office machine" / "home machine" distinction, it's just your work laptop.

    • @Fulmynato
      @Fulmynato 4 роки тому +10

      That's the reason why the IT company where I work provide laptops to its employees. And as far as I know is common procedure for most big IT companies.

    • @SMJSmoK
      @SMJSmoK 4 роки тому +2

      You either hand out laptops (if you're rich) or (if you're not that rich) you treat those home PCs as BYOD's - let them into a specific subnet and only open specific ports from there etc.

    • @Demonslay335
      @Demonslay335 4 роки тому +1

      @@SMJSmoK With the upsurge of remote requirements like this, we had some large NFP's who couldn't exactly fork over dozens of laptops on the drop of a dime (plus availability right now is scarce). One possible solution we were theorizing was to deploy a standardized VM - essentially a domain-joined guest image that you do have full GPO control over. It mitigates many (but admittedly not all) of the concerns of the host system being compromised.

  • @TheRealGuywithoutaMustache
    @TheRealGuywithoutaMustache 4 роки тому

    A fascinating topic no doubt

  • @thenasadude6878
    @thenasadude6878 4 роки тому

    Please add a section on the use of personal devices to connect to corporate resources: risks and mitigation

  • @tekvax01
    @tekvax01 4 роки тому +9

    Steve! Could you also cover services such as Teamviewer and Citrix, and also tunnelling through an SSH connection?

    • @quangho8120
      @quangho8120 4 роки тому

      Second this. I never managed to figure out how to actually use UDP in applications

  • @nullify.
    @nullify. 4 роки тому +13

    Next video should be about protein folding (A la Folding@Home)

  • @swagatochatterjee7104
    @swagatochatterjee7104 4 роки тому +1

    Damn he has a complete book just on OSPF routing? Wow!!

  • @tomhorsley6566
    @tomhorsley6566 4 роки тому +1

    I've measured the performance of VPN and ssh, and ssh is about 6 times faster than the vpn we use at work (at least in one direction), so all I use the vpn for is to setup an ssh tunnel from work to home, then I run the x2go remote desktop over ssh.

    • @Demonslay335
      @Demonslay335 4 роки тому

      I assume you have some safe-guards, such as fail2ban, certificate authentication, etc., vs just having port 22 wide open with only password auth?

  • @Aemilindore
    @Aemilindore 4 роки тому

    Can you do a video on Wireguard? its avery special piece of software.

  • @TheBrian7872
    @TheBrian7872 4 роки тому +3

    Opens the video, sees Signal, clicks on like immediately

  • @johnSmith-up5ey
    @johnSmith-up5ey 4 роки тому

    Are those Doctor Who DVD's in the background?

  • @Omnifarious0
    @Omnifarious0 4 роки тому +10

    One quibble... Message Authentication Codes (not to be confused with the MAC in 'MAC address') are not digital signatures, though they do usually use hashes. MACs are what's used to make sure the messages are not modified in transit.

    • @Demonslay335
      @Demonslay335 4 роки тому

      If you're using an HMAC however, you technically ARE signing it - signing the hash's integrity.

    • @Omnifarious0
      @Omnifarious0 4 роки тому +1

      @@Demonslay335 - I consider a feature of a 'signature' to be non-repudiatable. This is not the case with HMAC. The recipient knows the HMAC key and could forge a message that appeared to be from you.

    • @Demonslay335
      @Demonslay335 4 роки тому +1

      @@Omnifarious0 Ah, fair point. You're right then, as actually signing the HMAC (with an asynchronous key) would be separate.

    • @Omnifarious0
      @Omnifarious0 4 роки тому +1

      @@Demonslay335 - Asymmetric you mean? 🙂

    • @Demonslay335
      @Demonslay335 4 роки тому

      @@Omnifarious0 Heh, spell check.

  • @joelsantiago8348
    @joelsantiago8348 3 роки тому +1

    Am I able to use a VPN so I can work out of the US temporarily? US system/connections might not recognize IP addresses from a different country

  • @Abrifq
    @Abrifq 4 роки тому +41

    5:50 where did you come from, where did you go, where did you come from cotton eye joe

  • @edzeppelin1984
    @edzeppelin1984 4 роки тому

    Somewhere in my parents' attic I have the same VHS box set of the Ice Warriors.

  • @arod3295
    @arod3295 2 роки тому

    More videos!!!

  • @mattsugden1916
    @mattsugden1916 3 роки тому

    Which app on the iPad did you use for drawings?

  • @younesmeliani3257
    @younesmeliani3257 4 роки тому

    Thanks for the info, what software do you use on the IPAD to draw ?

    • @DrSteveBagley
      @DrSteveBagley 4 роки тому +2

      The app on the iPad is called Procreate. I also used QuickTime on my Mac to record the screen as I drew.

  • @Pedritox0953
    @Pedritox0953 4 роки тому

    Computerphile making history making a video at corona vius's times... awesome!!

  • @Patapom3
    @Patapom3 4 роки тому

    Nice video duration time! ^^'

  • @7necromancer
    @7necromancer 3 роки тому +1

    nice video length

  • @MJay_
    @MJay_ 4 роки тому

    Is there a way you can hide/disguise what you are sending through a VPN? You mentioned patters where it could determine if it's a video call or an http request.

    • @HenryLoenwind
      @HenryLoenwind 4 роки тому

      Yes, you can send a constant data stream in both directions. The outside observer wouldn't see if it's dummy data or real data inside. However, all internet connections are sized for interlacing traffic from/to multiple sources. So multiple people hogging their maximum bandwidth constantly would clog the network quickly.

  • @ssauve
    @ssauve 4 роки тому +5

    I'm not sure how you had a conversation about how VPN works and didn't talk about GRE or IPSec, but hey, I guess this was intended for a more general audience.

  • @IanZamojc
    @IanZamojc 4 роки тому +1

    Be kind and turn off your webcam during your Zoom meetings while connected to your company's VPN.

  • @rapturas
    @rapturas 4 роки тому +1

    And there was me believing that packets were encapsulated within frames and it was the frames that were sent out over a wire to other devices.

  • @rodfer5406
    @rodfer5406 4 роки тому

    Too simple; needs part 2. Exl,ain why some vpn are safer than others. Not just pptp v openvpn, but also enormous variation in brands. Thanks!

  • @davidlr97
    @davidlr97 4 роки тому

    now I NEED to know why it uses UDP!

  • @victorselve8349
    @victorselve8349 4 роки тому +26

    Sweet home VPN,
    Connect me to my stuff
    Sweet home VPN...

  • @Mac2thefuture23
    @Mac2thefuture23 4 роки тому

    I like the video because you’re explaining how a VPN works but I do wish you had spoken about the risk of giving a remote user network level access in a corporate use case. What if the user introduces malware into the network via VPN? VPN’s have had their day... time to move away from this type of approach for non admin users. Use a dual app proxy based architecture and improve the security posture and still prove access to private applications hosted in the dc.

  • @i_sometimes_leave_comments
    @i_sometimes_leave_comments 4 роки тому +1

    He showed TCP packets wrapped in UDP. As far as I know, UDP sends packets without confirming their arrival, while TCP keeps trying until packets are confirmed to have reached their destination. There seems to be a conflict in that wrapping, if I understand correctly. How does it work?

    • @HenryLoenwind
      @HenryLoenwind 4 роки тому

      By not conflicting. If you have 2 protocols that both think they are responsible for resending packets, throttling traffic and so on, things will be done multiple times. Imagine sitting in a bus where each single passenger thinks they have to hit the brakes to avoid collisions...

    • @i_sometimes_leave_comments
      @i_sometimes_leave_comments 4 роки тому

      With no confirmation, it'd seem the TCP sender would hit some loop of trying to send some packets and failing unless the UDP sender somehow responds to those...
      My guess: the one sending UDP just responds to the TCP sender with ACK and confirms "everything went fine" regardless of whether or not those UDP packets made it to their destination.

  • @FrietjeOorlog
    @FrietjeOorlog 4 роки тому +1

    Video length is 13:37.
    N1C3! ;)

  • @JanacMeena
    @JanacMeena 2 роки тому

    Does my company need a VPN if all of our data is stored in the cloud?

  • @rabidbigdog
    @rabidbigdog 4 роки тому +1

    Steve has a PDP-11 front panel on the shelf?

    • @DrSteveBagley
      @DrSteveBagley 4 роки тому +1

      Little Star it’s a PiDP-11 replica - fund to make and build, uses a raspberry pi to emulate the pdp11

    • @rabidbigdog
      @rabidbigdog 4 роки тому

      @@DrSteveBagley I have a nice collection of machines myself, including a real PDP 11/73 that dims the lights when I power it on.

    • @boblewis5558
      @boblewis5558 4 роки тому +1

      @@rabidbigdog You want to get of hold of a PDP11/60 - nicest PDP DEC ever made - THAT needs 3 phase!! It has a MASSIVE three phase air blower (you can't really call it a fan)! BOY does that blow!!

  • @custardo
    @custardo 4 роки тому +4

    Props for Bagpuss

  • @AntneeUK
    @AntneeUK 4 роки тому

    Appears to have a PiDP-11 in his dining room on a shelf. I'm unsurprised 😂

  • @rabidbigdog
    @rabidbigdog 4 роки тому +1

    A question we often get asked is "why have the vpn layer, lets just be on the internet and do everything there without the VPN". I dunno, kinda running out of answers on that, other than extra layer of identification.

    • @iabervon
      @iabervon 4 роки тому

      That's really the better way of doing it, except that you've probably got things on your network that aren't sufficiently protected against attackers because they were designed and implemented with the expectation that everyone with access to the network isn't malicious. These things should be redesigned anyway, because there may be malware on people's computers at times that could attack your unprotected systems, but there are probably services on your network you haven't thought to redesign, like printers and scanners and video conference devices that just trust any device that can reach them.

    • @squirlmy
      @squirlmy 4 роки тому

      @@iabervon I think that is "computer security" oversell. I don't think printer services are vulnerable to efforts to hijack video and audio, and there's already very simple measures to keep even specific print jobs from being hijacked. You have to separate possible vulnerabilities from actual real-world vulnerabilities, and even then prioritize. I'm not scared of Postscript viruses that only attack printers. Don't be the security expert who cries wolf.

  • @me99771
    @me99771 4 роки тому

    what are those DVDs on his bookshelf?

    • @vorrnth8734
      @vorrnth8734 4 роки тому

      me99771 Those are storage media .

  • @recklessroges
    @recklessroges 4 роки тому

    is openVPN still the best option for most VPNs?

    • @DrSteveBagley
      @DrSteveBagley 4 роки тому +1

      Personally, I'd use (and use) Wireguard and IPsec depending on the use case.

  • @DumblyDorr
    @DumblyDorr 4 роки тому +3

    Star Trek, Doctor Who and Back to the Future... ah, I feel at home already :)

  • @banderi002
    @banderi002 4 роки тому +13

    10:10 I'm a bit confused by this part, isn't that the definition of proxy? i.e. tunneling packets through a different IP?
    What is the difference here?

    • @rich1051414
      @rich1051414 4 роки тому +11

      Basically, when using a proxy, you are still operating on your real IP, but you hand off network traffic for a specific service over to another server to complete for you. With a VPN, system wide you operate under a totally different IP address, where everything you do on your network is totally encrypted to your ISP.
      Both of these methods can mask your location to others, but a VPN is needed to protect your privacy.

    • @undead890
      @undead890 4 роки тому +9

      A Proxy will redirect your web traffic while a VPN redirects AND encrypts your traffic. A VPN can also create a direct, encrypted tunnel to a host network, such as an internal network at some company or government organization, whereas a Proxy doesn't create direct tunnels to private networks. That's the simple answer.

    • @IIARROWS
      @IIARROWS 4 роки тому +2

      A proxy doesn't even have to redirect packets if not necessary, that's what usually happens when you surf the internet from your workplace. It just let you go thru, if it's not on a black list.
      A proxy is much faster and requires much less resources because it doesn't redirect unless you are looking for specific resources, and doesn't mask the communication. Your resource is going to respond using your IP, not the proxy's.

    • @tsunghan_yu
      @tsunghan_yu 4 роки тому

      @@rich1051414 if using a proxy, I'm still operating on my real IP, why does it mask my location?

    • @tsunghan_yu
      @tsunghan_yu 4 роки тому +1

      ​@@undead890 Does no encryption mean that proxy is insecure (for the traffic from sender to the proxy)?

  • @muhammadsiddiqui2244
    @muhammadsiddiqui2244 4 роки тому

    What is the difference between proxy server and VPN server

  • @IvanToshkov
    @IvanToshkov 4 роки тому +1

    Back in the late 1990s we were using PPP over SSH as kind of poor-man VPN. It's worse than the normal VPN, but it's simple to understand how it works.

  • @rolfs2165
    @rolfs2165 4 роки тому +4

    6:04 A bit nitpicky, but Ethernet "packets" are called frames.

    • @BruceGrembowski
      @BruceGrembowski 4 роки тому

      Yeah, and he kinda glossed over layer 1 :)

  • @ehuehuehu6399
    @ehuehuehu6399 4 роки тому

    nice

  • @mastermetric9595
    @mastermetric9595 4 роки тому

    Where is the caption??

  • @Roberto-dd1te
    @Roberto-dd1te 4 роки тому

    What about DNS leaks?

  • @j2simpso
    @j2simpso 3 роки тому

    Is this Computerphile or Applephile?! Every video there's some Apple product featured be it a Mac or iPad! 🤣

  • @cadfoot568
    @cadfoot568 4 роки тому

    nice house

  • @samlaf92
    @samlaf92 3 роки тому

    I still don't understand why you would go through all of this trouble, as opposed to just encrypting the data and sending it over tcp over ip. Why does it need to be wrapped up inside another packet like this. Couldn't students just access school data by connecting through a secure TCP line?

  • @koskoci
    @koskoci 4 роки тому

    I wonder about the significance of the user having 4 arms

  • @Baxtexx
    @Baxtexx 4 роки тому

    Thanks to the cloud I rarely have to use VPN anymore. 😊

  • @tensevo
    @tensevo 4 роки тому

    ppl in the future will look back at videos from march 2020 and be like, what the f*ck is going on?

  • @rahulramteke3338
    @rahulramteke3338 4 роки тому +6

    Wireguard gang rise up!!

  • @AMG-gc4io
    @AMG-gc4io 4 роки тому +1

    Hi I need someone to help me on my program project. please.

    • @cyb3rpunk190
      @cyb3rpunk190 4 роки тому

      you need learn hacking?

    • @AMG-gc4io
      @AMG-gc4io 4 роки тому

      cyb3rpunk. No 😅. At least not yet 😎.
      I need to ask an expert in c++ on a program problem

    • @cyb3rpunk190
      @cyb3rpunk190 4 роки тому

      If you want learn hacking I teach you عبدالرحمن الغنام

    • @AMG-gc4io
      @AMG-gc4io 4 роки тому

      cyb3rpunk
      I would like that

    • @AMG-gc4io
      @AMG-gc4io 4 роки тому

      Mäander
      No I will check it out thank you

  • @micdhack
    @micdhack 4 роки тому

    Perimeter security, what could possibly go wrong...

  • @linuxgemini
    @linuxgemini 4 роки тому +9

    Hmm, nobody noticed the 13:37 duration...

    • @Phroggster
      @Phroggster 4 роки тому +1

      13:38 for me, but yeah.

    • @drewlop
      @drewlop 4 роки тому +1

      @@Phroggster
      weird, i see 13:37; i wanna see a computerphile video about how that discrepancy could've occurred lol

  • @pulkitjain10
    @pulkitjain10 4 роки тому

    Why do we use VPNs when we have HTTPS?

    • @BruceGrembowski
      @BruceGrembowski 4 роки тому +1

      To access servers inside a firewall is why I use a VPN to work from home. It's like I'm actually hooked up to my company's internal network.

    • @HenryLoenwind
      @HenryLoenwind 4 роки тому

      Basically for the same reason manufacturing companies put their machines into big buildings with access control on the doors instead of putting them out in the open and having a password on each machine's control panel.

  • @cryonish
    @cryonish 6 місяців тому

    So funny how the laptop class ;) thought most people could work from home

  • @Elite7555
    @Elite7555 2 роки тому

    What has happened to me quite a lot is that I would connect to my workplace via VPN in the morning, and then forget to disconnect after end of work. Now my employer knows all the dirty sites I visit.

    • @gggvxxydxyd6500
      @gggvxxydxyd6500 2 роки тому

      Please can i work remotly by using vpn if the service isnot available in my country

  • @kaiserbhat5189
    @kaiserbhat5189 4 роки тому

    👌

  • @GeorgAndTheBike
    @GeorgAndTheBike 4 роки тому +8

    Nerds doing what they are used to: Social Distancing 😁

    • @nilen
      @nilen 4 роки тому +1

      ?

  • @hypothebai4634
    @hypothebai4634 4 роки тому

    The real problem is that the remote machine is probably the easiest path for a malicious third party to gain access to the corporate network.

  • @GeneralBlorp
    @GeneralBlorp 4 роки тому +1

    Brexit teeth being contained by braces. Unusual. Well done!

  • @tramsgar
    @tramsgar 4 роки тому

    omfg MS Teams 😵

  • @Diggnuts
    @Diggnuts 4 роки тому +3

    The network isn't virtual... It's real! It is a virtual "private" network CABEL!!!

    • @HenryLoenwind
      @HenryLoenwind 4 роки тому +1

      "virtual (privat network)". A private network is one that is not routable from the internet. Instead of using hardware, you're using software to define that network.

    • @Diggnuts
      @Diggnuts 4 роки тому

      @@HenryLoenwind Nonsense. Regardless of the hardware, networks are always defined by software. Otherwise its just a bunch of wires.

  • @alexanderhenson2929
    @alexanderhenson2929 4 роки тому +2

    1337

  • @davidfrischknecht8261
    @davidfrischknecht8261 4 роки тому

    I've only ever used VPNs in that second way.

  • @trueriver1950
    @trueriver1950 4 роки тому +10

    0:46 Why are you using Microsoft?
    Aren't you scared of the Cortana virus?

  • @vedasticks
    @vedasticks 4 роки тому +2

    not sure most people are working from home..... certainly not the hundreds of thousamds whos industrys have shut down

  • @kelownatechkid
    @kelownatechkid 4 роки тому +1

    leet

  • @HexerPsy
    @HexerPsy 4 роки тому +3

    It made me realize how echoey most ppls homes are... All those home videos XD SO MUCH ECHO

  • @holycow6935
    @holycow6935 4 роки тому +4

    me:watches this video
    also me: trying to hack into china's database
    MR ROBOT THEME SONG INTENSIFIES

    • @squirlmy
      @squirlmy 4 роки тому

      well, I suppose that's appropriate as Mr.Robot was very fake, giving only an occasional nod to actual computer security, while getting details all wrong. Also, I don't think all of China has a single database. You're welcome to try and break in!

  • @antfry256
    @antfry256 4 роки тому

    It frustrates me so much, that the concept is so simple to understand, but people still are clueless.

  • @procactus9109
    @procactus9109 4 роки тому

    How vague

  • @gulaggoon
    @gulaggoon 4 роки тому

    Early gang anyone?

  • @oneminutetomidnight
    @oneminutetomidnight 4 роки тому

    All Your Toilet Paper Are Belong To Us