VPN & Remote Working - Computerphile

Поделиться
HTML-код
  • Опубликовано: 15 ноя 2024

Комментарии • 188

  • @drewlop
    @drewlop 4 года назад +301

    7:40
    i set up VPNs all the time at my previous job and always wondered why IPSec used TCP over UDP, but it never pertained directly to solving a problem so i never looked it up.
    please count this as my vote for a followup video on UDP over TCP :)

    • @OutrageousOctopus
      @OutrageousOctopus 4 года назад +17

      I work as a 1st line technician at an MSP... All i have been doing the past week and a half is setting up VPN connections and remote access!

    • @pnedkov
      @pnedkov 4 года назад +48

      It is redundant to encapsulate twice with TCP. You get all the benefits that TCP provides by encapsulating with TCP just once. The second TCP encapsulation will just add an additional and unnecessary network overhead. Look it up for more details. HTH

    • @drewlop
      @drewlop 4 года назад +18

      pn
      That makes sense, thanks for replying. I guess, then, the point of encapsulating in UDP just boils down to the speed advantage (no need for handshaking and error checking since you’re doing that post-decap anyway) and increased amount of data per packet thanks to smaller header size

    • @tekvax01
      @tekvax01 4 года назад +1

      @@OutrageousOctopus mee too!

    • @Rickety3263
      @Rickety3263 4 года назад +48

      KnuckleTips I had a joke about UDP, but you may not get it.

  • @goofyrice
    @goofyrice 4 года назад +85

    Can you do a series on the regular guests' bookshelves? Their favorite computer and non-computer books? I'm always interested in the background shelves in the videos.

  • @xliquidflames
    @xliquidflames 4 года назад +18

    The first time I used a VPN to work from home and realized I could access all the network resources like drives, printers, and servers, I was blown away. Now they have apps for vpns. It's such a cool concept.

  • @harrytsang1501
    @harrytsang1501 4 года назад +27

    Brady is keeping all his dozens of channels alive from the comfort of his home

  • @EmileAI
    @EmileAI 4 года назад +153

    He even has this paper on his iPad...

    • @DrSteveBagley
      @DrSteveBagley 4 года назад +19

      Amazing what you can do with a little bit of PostScript programming…
      %!PS-Adobe-2.0
      /w 1920 def
      /h 1080 def
      /step 10 def
      /dvsn step 8 mul def
      /margin 36 def
      /gap 4 def
      /biggap 24 def
      /close 4 def
      > setpagedevice
      0 h translate
      1 -1 scale
      0.5 0.8 0.5 setrgbcolor
      /y biggap def
      {
      0 1 close
      {
      0.25 setlinewidth
      margin y moveto
      1920 margin sub y lineto
      stroke
      /y y gap add def
      } for
      /y y biggap gap sub add def
      y 1080 ge { exit } if
      } loop
      0.775 0.80 0.75 setrgbcolor
      biggap 9 add 48 1080 biggap add
      {
      newpath
      dup dup 18 exch moveto
      18 exch 9 0 360 arc
      dup w 18 sub exch moveto
      w 18 sub exch 9 0 360 arc
      fill
      } for
      showpage

    • @BruceGrembowski
      @BruceGrembowski 4 года назад +2

      @@DrSteveBagley Programming in PostScript? Kudos!

    • @muhammadsiddiqui2244
      @muhammadsiddiqui2244 4 года назад +1

      What is so special about this?

  • @harstar12345
    @harstar12345 4 года назад +13

    I loved this talk, it's funny hearing him trying so hard to not use too technical language to keep it accessible.

  • @dietalkaa
    @dietalkaa 4 года назад +25

    On the next video would be nice if you spoke about layer 2 and layer 3 tunneling vpn. I think it would be interesting for a lots of people.

    • @TheSam1902
      @TheSam1902 4 года назад +8

      Even better, talk about the poor man's "vpn" solution: THE SSH DYNAMIC PORT FORWARDING

    • @dietalkaa
      @dietalkaa 4 года назад +2

      @@TheSam1902 Yes. absolutely. I have been using SSH all the time. Even SSH layer 2 tunneling on many many sites of my hobby link network project

  • @Tularis
    @Tularis 4 года назад +68

    It really annoys me that most people these days think a VPN is just for tunnelling out your internet connection to hide your browsing....

    • @themasterofdisastr1226
      @themasterofdisastr1226 4 года назад +32

      ....and send it directly to an unknown company, who cannot be trustet with your data (or as much as your isp for that matter)
      I can't see any Problem there

    • @voynich7119
      @voynich7119 4 года назад +13

      I think we can blame that one on Nord VPN.

    • @soviut303
      @soviut303 4 года назад +15

      Count yourself lucky that they know what a VPN is at all. Would you rather be the head of IT having to explain to 1000 employees suddenly working from home what a VPN is as you frantically are issuing them all access credentials?

    • @Tularis
      @Tularis 4 года назад +7

      Ian Zamojc that has been my entire week...

    • @DusteDdekay
      @DusteDdekay 4 года назад +6

      @@soviut303 I'd prefer they knew nothing over having misunderstood the idea completely "oh, for watching american netflix in europe!" easier teaching without some (wrong) presumptions already present.

  • @gregf9160
    @gregf9160 4 года назад +7

    I always had the idea Dr. Bagley was a Doctor Who fan. Now I'm delighted to have that confirmed ;)

    • @IIARROWS
      @IIARROWS 4 года назад

      I thought all English nerds are Doctor Who fans.

    • @gregf9160
      @gregf9160 4 года назад

      @@IIARROWS Sadly, no. He's not a nerd either, he's a proper, respected academic.

    • @squirlmy
      @squirlmy 4 года назад

      @@gregf9160 IDK, in America respected academics are nerds. I suppose you designate them as "boffins". We have no such differentiation. Even "geek" has widened into nearly any enthusiast of anything.

  • @TheStevenWhiting
    @TheStevenWhiting 4 года назад +4

    Funny the quality of the mobile video, where all the adverts for video chats on mobiles are always shown as perfect with no buffering ever.

    • @Megaranator
      @Megaranator 4 года назад

      the connection must have been limited by something, I have never seen that bad video call

  • @NoEgg4u
    @NoEgg4u 4 года назад +25

    Although VPNs offer excellent solutions for securely connecting to remote networks, VPNs also introduce a risk:
    At the office, the IT personnel are responsible for computer security.
    They can enforce group policies, ensure that everyone is running company approved anti-virus software, etc.
    At home, the company often has zero control over the computer being used to establish a VPN connection. That home computer could be compromised with a key-logger, etc.
    For such a connection, the company should be purchasing the home system, and should be enforcing the same conditions on that computer, as though that computer was in the office.
    When the employee parts ways with the company, then that home computer, which is company property, goes back to the company.

    • @Meegoue
      @Meegoue 4 года назад +24

      If a company allows you to connect to their VPN server, they better limit those connections only to work laptops, which they do have control over.
      The place I worked at, basically gave everyone their own laptop, which they used both at home and at work. You come to work, connect it to extenal displays and peripherals, and use it like a normal desktop. Then at the end of the work day, you take it home with you. So there is no "office machine" / "home machine" distinction, it's just your work laptop.

    • @Fulmynato
      @Fulmynato 4 года назад +10

      That's the reason why the IT company where I work provide laptops to its employees. And as far as I know is common procedure for most big IT companies.

    • @SMJSmoK
      @SMJSmoK 4 года назад +2

      You either hand out laptops (if you're rich) or (if you're not that rich) you treat those home PCs as BYOD's - let them into a specific subnet and only open specific ports from there etc.

    • @Demonslay335
      @Demonslay335 4 года назад +1

      @@SMJSmoK With the upsurge of remote requirements like this, we had some large NFP's who couldn't exactly fork over dozens of laptops on the drop of a dime (plus availability right now is scarce). One possible solution we were theorizing was to deploy a standardized VM - essentially a domain-joined guest image that you do have full GPO control over. It mitigates many (but admittedly not all) of the concerns of the host system being compromised.

  • @georgeprout42
    @georgeprout42 4 года назад +12

    Classic Dr Who and Star Trek box sets in the dining room? I approve 🍻

  • @thesquarezminecraft
    @thesquarezminecraft 4 года назад +1

    This is the most stable camera work i have ever seen on computerphile

  • @lajya01
    @lajya01 4 года назад +3

    There are also virtual desktops that you can use. Your home PC becomes a "dumb" terminal running a client program connecting to a corporate virtualization server. A 2-factor authentication (RSA SecurID) is still used just like a VPN.

  • @Omnifarious0
    @Omnifarious0 4 года назад +10

    One quibble... Message Authentication Codes (not to be confused with the MAC in 'MAC address') are not digital signatures, though they do usually use hashes. MACs are what's used to make sure the messages are not modified in transit.

    • @Demonslay335
      @Demonslay335 4 года назад

      If you're using an HMAC however, you technically ARE signing it - signing the hash's integrity.

    • @Omnifarious0
      @Omnifarious0 4 года назад +1

      @@Demonslay335 - I consider a feature of a 'signature' to be non-repudiatable. This is not the case with HMAC. The recipient knows the HMAC key and could forge a message that appeared to be from you.

    • @Demonslay335
      @Demonslay335 4 года назад +1

      @@Omnifarious0 Ah, fair point. You're right then, as actually signing the HMAC (with an asynchronous key) would be separate.

    • @Omnifarious0
      @Omnifarious0 4 года назад +1

      @@Demonslay335 - Asymmetric you mean? 🙂

    • @Demonslay335
      @Demonslay335 4 года назад

      @@Omnifarious0 Heh, spell check.

  • @Abrifq
    @Abrifq 4 года назад +41

    5:50 where did you come from, where did you go, where did you come from cotton eye joe

  • @nullify.
    @nullify. 4 года назад +13

    Next video should be about protein folding (A la Folding@Home)

  • @Xclann
    @Xclann 4 года назад +3

    Would be interested in seeing you do a video on BeyondCorp!

  • @alameachan
    @alameachan 4 года назад

    I'm at the same time relieved and disappointed, that the video hasn't at least partially been shot in vertical video format.

  • @RK-ly5qj
    @RK-ly5qj 4 года назад +1

    This would be a great begining of a materials regarding NETWORK PROTOCOLS. Forst VPN how it work but more specificly. Like 1 phase 2 phase etc etc. :)

  • @michaelwirtzfeld7847
    @michaelwirtzfeld7847 4 года назад +1

    Clear, concise explanation. Thank you.

  • @tekvax01
    @tekvax01 4 года назад +9

    Steve! Could you also cover services such as Teamviewer and Citrix, and also tunnelling through an SSH connection?

    • @quangho8120
      @quangho8120 4 года назад

      Second this. I never managed to figure out how to actually use UDP in applications

  • @Gastell0
    @Gastell0 4 года назад

    reverse proxy is also a more flexible way to scale access to corp web resources securely (well, as long as you keep up with latest web security standards and have a per client machine certificate)

  • @victorselve8349
    @victorselve8349 4 года назад +26

    Sweet home VPN,
    Connect me to my stuff
    Sweet home VPN...

  • @strayling1
    @strayling1 4 года назад

    Love that PDP 11 front panel.

  • @Epbentenrock
    @Epbentenrock 4 года назад +3

    So im guessing you guys are going to cover the different types of vpn.
    such as pptp, sstp, l2tp, ipsec / ike.
    as well as other remote access systems such as windows remote desktop protocol (and gateways), virtual network computing (and their gateways).
    the diffrences, which is better for what application.
    if so i can see you getting a lot more views, as you will have many technicians, engineers and the few manager who understood it, using the videos to get funding to implement them.

  • @tomhorsley6566
    @tomhorsley6566 4 года назад +1

    I've measured the performance of VPN and ssh, and ssh is about 6 times faster than the vpn we use at work (at least in one direction), so all I use the vpn for is to setup an ssh tunnel from work to home, then I run the x2go remote desktop over ssh.

    • @Demonslay335
      @Demonslay335 4 года назад

      I assume you have some safe-guards, such as fail2ban, certificate authentication, etc., vs just having port 22 wide open with only password auth?

  • @chetanpatel1464
    @chetanpatel1464 2 года назад

    Great explanation

  • @soviut303
    @soviut303 4 года назад +1

    Be kind and turn off your webcam during your Zoom meetings while connected to your company's VPN.

  • @ssauve
    @ssauve 4 года назад +5

    I'm not sure how you had a conversation about how VPN works and didn't talk about GRE or IPSec, but hey, I guess this was intended for a more general audience.

  • @7necromancer
    @7necromancer 4 года назад +1

    nice video length

  • @swagatochatterjee7104
    @swagatochatterjee7104 4 года назад +1

    Damn he has a complete book just on OSPF routing? Wow!!

  • @TheNasaDude
    @TheNasaDude 4 года назад

    Please add a section on the use of personal devices to connect to corporate resources: risks and mitigation

  • @justinbieber9656
    @justinbieber9656 4 года назад +1

    can you also explain in a video how ssh with port forwarding will be working for such a scenario? And under what conditions that is used for remote access rather than using VPNs?

  • @TheBrian7872
    @TheBrian7872 4 года назад +3

    Opens the video, sees Signal, clicks on like immediately

  • @willz5570
    @willz5570 4 года назад

    Great video, can you address basic security concerns of using a personal cell phone as a wifi hotspot in a public environment.

  • @TheRealGuywithoutaMustache
    @TheRealGuywithoutaMustache 4 года назад

    A fascinating topic no doubt

  • @joelsantiago8348
    @joelsantiago8348 3 года назад +1

    Am I able to use a VPN so I can work out of the US temporarily? US system/connections might not recognize IP addresses from a different country

  • @arod3295
    @arod3295 3 года назад

    More videos!!!

  • @rapturas
    @rapturas 4 года назад +1

    And there was me believing that packets were encapsulated within frames and it was the frames that were sent out over a wire to other devices.

  • @IvanToshkov
    @IvanToshkov 4 года назад +1

    Back in the late 1990s we were using PPP over SSH as kind of poor-man VPN. It's worse than the normal VPN, but it's simple to understand how it works.

  • @edzeppelin1984
    @edzeppelin1984 4 года назад

    Somewhere in my parents' attic I have the same VHS box set of the Ice Warriors.

  • @FrietjeOorlog
    @FrietjeOorlog 4 года назад +1

    Video length is 13:37.
    N1C3! ;)

  • @rabidbigdog
    @rabidbigdog 4 года назад +1

    A question we often get asked is "why have the vpn layer, lets just be on the internet and do everything there without the VPN". I dunno, kinda running out of answers on that, other than extra layer of identification.

    • @iabervon
      @iabervon 4 года назад

      That's really the better way of doing it, except that you've probably got things on your network that aren't sufficiently protected against attackers because they were designed and implemented with the expectation that everyone with access to the network isn't malicious. These things should be redesigned anyway, because there may be malware on people's computers at times that could attack your unprotected systems, but there are probably services on your network you haven't thought to redesign, like printers and scanners and video conference devices that just trust any device that can reach them.

    • @squirlmy
      @squirlmy 4 года назад

      @@iabervon I think that is "computer security" oversell. I don't think printer services are vulnerable to efforts to hijack video and audio, and there's already very simple measures to keep even specific print jobs from being hijacked. You have to separate possible vulnerabilities from actual real-world vulnerabilities, and even then prioritize. I'm not scared of Postscript viruses that only attack printers. Don't be the security expert who cries wolf.

  • @stoneskull
    @stoneskull 4 года назад

    Very informative. Thank you.

  • @i_sometimes_leave_comments
    @i_sometimes_leave_comments 4 года назад +1

    He showed TCP packets wrapped in UDP. As far as I know, UDP sends packets without confirming their arrival, while TCP keeps trying until packets are confirmed to have reached their destination. There seems to be a conflict in that wrapping, if I understand correctly. How does it work?

    • @HenryLoenwind
      @HenryLoenwind 4 года назад

      By not conflicting. If you have 2 protocols that both think they are responsible for resending packets, throttling traffic and so on, things will be done multiple times. Imagine sitting in a bus where each single passenger thinks they have to hit the brakes to avoid collisions...

    • @i_sometimes_leave_comments
      @i_sometimes_leave_comments 4 года назад

      With no confirmation, it'd seem the TCP sender would hit some loop of trying to send some packets and failing unless the UDP sender somehow responds to those...
      My guess: the one sending UDP just responds to the TCP sender with ACK and confirms "everything went fine" regardless of whether or not those UDP packets made it to their destination.

  • @rolfs2165
    @rolfs2165 4 года назад +4

    6:04 A bit nitpicky, but Ethernet "packets" are called frames.

    • @BruceGrembowski
      @BruceGrembowski 4 года назад

      Yeah, and he kinda glossed over layer 1 :)

  • @JanacMeena
    @JanacMeena 2 года назад

    Does my company need a VPN if all of our data is stored in the cloud?

  • @Pedritox0953
    @Pedritox0953 4 года назад

    Computerphile making history making a video at corona vius's times... awesome!!

  • @custardo
    @custardo 4 года назад +4

    Props for Bagpuss

  • @johnSmith-up5ey
    @johnSmith-up5ey 4 года назад

    Are those Doctor Who DVD's in the background?

  • @davidlr97
    @davidlr97 4 года назад

    now I NEED to know why it uses UDP!

  • @banderi002
    @banderi002 4 года назад +13

    10:10 I'm a bit confused by this part, isn't that the definition of proxy? i.e. tunneling packets through a different IP?
    What is the difference here?

    • @rich1051414
      @rich1051414 4 года назад +11

      Basically, when using a proxy, you are still operating on your real IP, but you hand off network traffic for a specific service over to another server to complete for you. With a VPN, system wide you operate under a totally different IP address, where everything you do on your network is totally encrypted to your ISP.
      Both of these methods can mask your location to others, but a VPN is needed to protect your privacy.

    • @undead890
      @undead890 4 года назад +9

      A Proxy will redirect your web traffic while a VPN redirects AND encrypts your traffic. A VPN can also create a direct, encrypted tunnel to a host network, such as an internal network at some company or government organization, whereas a Proxy doesn't create direct tunnels to private networks. That's the simple answer.

    • @IIARROWS
      @IIARROWS 4 года назад +2

      A proxy doesn't even have to redirect packets if not necessary, that's what usually happens when you surf the internet from your workplace. It just let you go thru, if it's not on a black list.
      A proxy is much faster and requires much less resources because it doesn't redirect unless you are looking for specific resources, and doesn't mask the communication. Your resource is going to respond using your IP, not the proxy's.

    • @tsunghan_yu
      @tsunghan_yu 4 года назад

      @@rich1051414 if using a proxy, I'm still operating on my real IP, why does it mask my location?

    • @tsunghan_yu
      @tsunghan_yu 4 года назад +1

      ​@@undead890 Does no encryption mean that proxy is insecure (for the traffic from sender to the proxy)?

  • @muhammadsiddiqui2244
    @muhammadsiddiqui2244 4 года назад

    What is the difference between proxy server and VPN server

  • @rodfer5406
    @rodfer5406 4 года назад

    Too simple; needs part 2. Exl,ain why some vpn are safer than others. Not just pptp v openvpn, but also enormous variation in brands. Thanks!

  • @rabidbigdog
    @rabidbigdog 4 года назад +1

    Steve has a PDP-11 front panel on the shelf?

    • @DrSteveBagley
      @DrSteveBagley 4 года назад +1

      Little Star it’s a PiDP-11 replica - fund to make and build, uses a raspberry pi to emulate the pdp11

    • @rabidbigdog
      @rabidbigdog 4 года назад

      @@DrSteveBagley I have a nice collection of machines myself, including a real PDP 11/73 that dims the lights when I power it on.

    • @boblewis5558
      @boblewis5558 4 года назад +1

      @@rabidbigdog You want to get of hold of a PDP11/60 - nicest PDP DEC ever made - THAT needs 3 phase!! It has a MASSIVE three phase air blower (you can't really call it a fan)! BOY does that blow!!

  • @Aemilindore
    @Aemilindore 4 года назад

    Can you do a video on Wireguard? its avery special piece of software.

  • @tensevo
    @tensevo 4 года назад

    ppl in the future will look back at videos from march 2020 and be like, what the f*ck is going on?

  • @Mac2thefuture23
    @Mac2thefuture23 4 года назад

    I like the video because you’re explaining how a VPN works but I do wish you had spoken about the risk of giving a remote user network level access in a corporate use case. What if the user introduces malware into the network via VPN? VPN’s have had their day... time to move away from this type of approach for non admin users. Use a dual app proxy based architecture and improve the security posture and still prove access to private applications hosted in the dc.

  • @DumblyDorr
    @DumblyDorr 4 года назад +3

    Star Trek, Doctor Who and Back to the Future... ah, I feel at home already :)

  • @Patapom3
    @Patapom3 4 года назад

    Nice video duration time! ^^'

  • @rahulramteke3338
    @rahulramteke3338 4 года назад +6

    Wireguard gang rise up!!

  • @MJay_
    @MJay_ 4 года назад

    Is there a way you can hide/disguise what you are sending through a VPN? You mentioned patters where it could determine if it's a video call or an http request.

    • @HenryLoenwind
      @HenryLoenwind 4 года назад

      Yes, you can send a constant data stream in both directions. The outside observer wouldn't see if it's dummy data or real data inside. However, all internet connections are sized for interlacing traffic from/to multiple sources. So multiple people hogging their maximum bandwidth constantly would clog the network quickly.

  • @me99771
    @me99771 4 года назад

    what are those DVDs on his bookshelf?

    • @vorrnth8734
      @vorrnth8734 4 года назад

      me99771 Those are storage media .

  • @samlaf92
    @samlaf92 3 года назад

    I still don't understand why you would go through all of this trouble, as opposed to just encrypting the data and sending it over tcp over ip. Why does it need to be wrapped up inside another packet like this. Couldn't students just access school data by connecting through a secure TCP line?

  • @koskoci
    @koskoci 4 года назад

    I wonder about the significance of the user having 4 arms

  • @mastermetric9595
    @mastermetric9595 4 года назад

    Where is the caption??

  • @mattsugden1916
    @mattsugden1916 4 года назад

    Which app on the iPad did you use for drawings?

  • @linuxgemini
    @linuxgemini 4 года назад +9

    Hmm, nobody noticed the 13:37 duration...

    • @Phroggster
      @Phroggster 4 года назад +1

      13:38 for me, but yeah.

    • @drewlop
      @drewlop 4 года назад +1

      @@Phroggster
      weird, i see 13:37; i wanna see a computerphile video about how that discrepancy could've occurred lol

  • @younesmeliani3257
    @younesmeliani3257 4 года назад

    Thanks for the info, what software do you use on the IPAD to draw ?

    • @DrSteveBagley
      @DrSteveBagley 4 года назад +2

      The app on the iPad is called Procreate. I also used QuickTime on my Mac to record the screen as I drew.

  • @Roberto-dd1te
    @Roberto-dd1te 4 года назад

    What about DNS leaks?

  • @recklessroges
    @recklessroges 4 года назад

    is openVPN still the best option for most VPNs?

    • @DrSteveBagley
      @DrSteveBagley 4 года назад +1

      Personally, I'd use (and use) Wireguard and IPsec depending on the use case.

  • @AntneeUK
    @AntneeUK 4 года назад

    Appears to have a PiDP-11 in his dining room on a shelf. I'm unsurprised 😂

  • @j2simpso
    @j2simpso 4 года назад

    Is this Computerphile or Applephile?! Every video there's some Apple product featured be it a Mac or iPad! 🤣

  • @AMG-gc4io
    @AMG-gc4io 4 года назад +1

    Hi I need someone to help me on my program project. please.

    • @cyb3rpunk190
      @cyb3rpunk190 4 года назад

      you need learn hacking?

    • @AMG-gc4io
      @AMG-gc4io 4 года назад

      cyb3rpunk. No 😅. At least not yet 😎.
      I need to ask an expert in c++ on a program problem

    • @cyb3rpunk190
      @cyb3rpunk190 4 года назад

      If you want learn hacking I teach you عبدالرحمن الغنام

    • @AMG-gc4io
      @AMG-gc4io 4 года назад

      cyb3rpunk
      I would like that

    • @AMG-gc4io
      @AMG-gc4io 4 года назад

      Mäander
      No I will check it out thank you

  • @pulkyt
    @pulkyt 4 года назад

    Why do we use VPNs when we have HTTPS?

    • @BruceGrembowski
      @BruceGrembowski 4 года назад +1

      To access servers inside a firewall is why I use a VPN to work from home. It's like I'm actually hooked up to my company's internal network.

    • @HenryLoenwind
      @HenryLoenwind 4 года назад

      Basically for the same reason manufacturing companies put their machines into big buildings with access control on the doors instead of putting them out in the open and having a password on each machine's control panel.

  • @cadfoot568
    @cadfoot568 4 года назад

    nice house

  • @Elite7555
    @Elite7555 2 года назад

    What has happened to me quite a lot is that I would connect to my workplace via VPN in the morning, and then forget to disconnect after end of work. Now my employer knows all the dirty sites I visit.

    • @gggvxxydxyd6500
      @gggvxxydxyd6500 2 года назад

      Please can i work remotly by using vpn if the service isnot available in my country

  • @cryonish
    @cryonish Год назад

    So funny how the laptop class ;) thought most people could work from home

  • @micdhack
    @micdhack 4 года назад

    Perimeter security, what could possibly go wrong...

  • @ehuehuehu6399
    @ehuehuehu6399 4 года назад

    nice

  • @Baxtexx
    @Baxtexx 4 года назад

    Thanks to the cloud I rarely have to use VPN anymore. 😊

  • @hypothebai4634
    @hypothebai4634 4 года назад

    The real problem is that the remote machine is probably the easiest path for a malicious third party to gain access to the corporate network.

  • @worldaviation4k
    @worldaviation4k 4 года назад

    can i work from hotel?

    • @recklessroges
      @recklessroges 4 года назад

      Usually yes, but the hotel can block VPN traffic.

    • @worldaviation4k
      @worldaviation4k 4 года назад

      @@recklessroges I mean with the new law and filming 😀

    • @lajya01
      @lajya01 4 года назад

      @@recklessroges Not a great way to attract business clientele

  • @trueriver1950
    @trueriver1950 4 года назад +10

    0:46 Why are you using Microsoft?
    Aren't you scared of the Cortana virus?

  • @vedasticks
    @vedasticks 4 года назад +2

    not sure most people are working from home..... certainly not the hundreds of thousamds whos industrys have shut down

  • @GeorgAndTheBike
    @GeorgAndTheBike 4 года назад +7

    Nerds doing what they are used to: Social Distancing 😁

    • @nilen
      @nilen 4 года назад +1

      ?

  • @Diggnuts
    @Diggnuts 4 года назад +3

    The network isn't virtual... It's real! It is a virtual "private" network CABEL!!!

    • @HenryLoenwind
      @HenryLoenwind 4 года назад +1

      "virtual (privat network)". A private network is one that is not routable from the internet. Instead of using hardware, you're using software to define that network.

    • @Diggnuts
      @Diggnuts 4 года назад

      @@HenryLoenwind Nonsense. Regardless of the hardware, networks are always defined by software. Otherwise its just a bunch of wires.

  • @HexerPsy
    @HexerPsy 4 года назад +3

    It made me realize how echoey most ppls homes are... All those home videos XD SO MUCH ECHO

  • @tramsgar
    @tramsgar 4 года назад

    omfg MS Teams 😵

  • @kelownatechkid
    @kelownatechkid 4 года назад +1

    leet

  • @GeneralBlorp
    @GeneralBlorp 4 года назад +1

    Brexit teeth being contained by braces. Unusual. Well done!

  • @1st_ProCactus
    @1st_ProCactus 4 года назад

    How vague

  • @davidfrischknecht8261
    @davidfrischknecht8261 4 года назад

    I've only ever used VPNs in that second way.

  • @kaiserbhat5189
    @kaiserbhat5189 4 года назад

    👌

  • @abhinavgudipati8281
    @abhinavgudipati8281 4 года назад +1

    Terrible Explanation. I just don't understand what was so understandable in his speech. He couldn't explain it in lesser technical terms. Disappointed with Computerphile

  • @xdevs23
    @xdevs23 4 года назад +2

    1337

  • @antfry256
    @antfry256 4 года назад

    It frustrates me so much, that the concept is so simple to understand, but people still are clueless.

  • @lukaspruess7125
    @lukaspruess7125 3 года назад

    Man, the way this guy explains thing is so damn difficult to follow.

  • @holycow6935
    @holycow6935 4 года назад +4

    me:watches this video
    also me: trying to hack into china's database
    MR ROBOT THEME SONG INTENSIFIES

    • @squirlmy
      @squirlmy 4 года назад

      well, I suppose that's appropriate as Mr.Robot was very fake, giving only an occasional nod to actual computer security, while getting details all wrong. Also, I don't think all of China has a single database. You're welcome to try and break in!