Bimal Dhitalblog.bimal1412.com.np·Sep 15, 2023Using Worldlink's NAT for OpenVPN Server to host LAN Party Games and moreOne of the main problems we face with IPv4 is NAT. Some may argue that NAT has it's own benefits but the main elephant in the room is the mess it has created in the network field. If you want to self-host something and share it with your friends it's...Discuss·49 readsisp
Nee4pfsec.com·Aug 28, 2023Twingate: The Future of Remote AccessIntroduction Twingate is a cloud-based service that provides secured remote access to an organization’s networks. It’s function is very similar to a business VPN. Twingate makes Zero Trust Network Access (Yes, Buzzword. I know) easy to deploy, even e...Discuss·87 readszerotrust
Rahul Kumarrahuldevops.hashnode.dev·Aug 20, 20231.1.1.1A no-cost tool for better online security. Back in the day, you couldn't take your computer with you everywhere online. They had their cubicles right next to the data centre. The Internet has advanced, yet it's still held back by the same old ideas t...DiscussWarp
Aditya Kamathadityakamath.hashnode.dev·Aug 16, 2023ROS 2 and VPNsThis one is a bit of a side-quest - Originally, I intended to work on ros2_control for my 3-wheeled robot, but I got sidetracked by a new group robotics project. One of our challenges was to find a way to control/monitor multiple outdoor robots (on d...Discuss·1 like·563 readsvpn
Kshitij Khankakshitijkhanka.hashnode.dev·Aug 11, 2023How did it all started? Computer Networking Ep. 1Imagine you send a text message to your friends about bunking a lecture and it gets delivered to your teacher... You will think this is absurd right? We don't see this in the real world. The Internet has become a reliable and secure way to send and r...Discuss·1 likecomputer networking
Veekshith Thoramveekshiththoram.hashnode.dev·Aug 4, 2023Restriction based on IP AddressThe corporate world runs differently on the internet. This difference is not to set part away from the world but to secrecy. To maintain this secrecy, every software company needs to follow a procedure that blocks intruders as well as individuals who...Discuss·28 readsip address
Alex Feiszliblog.netmaker.io·Aug 1, 2023Tailscale vs ZeroTierIntro Businesses have migrated towards a “remote first” and “cloud first” posture. In this world, traditional corporate firewalls with physical routers and switches are going away. Additionally, the rise of IoT and Edge Computing has made networking ...Discussvpn
Jakub MikosProcodebastard.dev·Jul 25, 2023WSL2 and WireGuard on HostI spend multiple hours fighting the bad fight. The problem: Since WSL2 the host network is no longer shared between the host and WSL through a separate network adapter. Great for security and bad for funnelling your traffic through your host's VPN. A...Discuss·39 readsWindows
Dhiman Sealdhi13man.hashnode.dev·Jul 21, 2023Automating VPN connections using Python and Pritunl CLI: A GuideAutomating things is cooooool, right? Introduction In today’s world, with remote work becoming increasingly popular, VPNs have become a crucial part of many organizations. However, connecting to multiple VPNs can be a tedious and time-consuming task....DiscussPython
payel singhapayelsingha.hashnode.dev·Jul 16, 2023Configure "Point to Site VPN" connection Step by Step: Azure portal - Azure VPN GatewayThis Article Includes The most popular way for businesses to link their on-premises networks to Azure vNets is by using a site-to-site VPN. This VPN connection is started at the router or edge firewall level. However, what if you're connected from a ...Discussvpn