VPN & Remote Working - Computerphile

preview_player
Показать описание
As we move towards a remote working culture, Dr Steve Bagley remotely connects to explain what VPN is & how it works.


This video was filmed by Dr Steve Bagley and Sean Riley and edited by Sean Riley.


Рекомендации по теме
Комментарии
Автор

7:40
i set up VPNs all the time at my previous job and always wondered why IPSec used TCP over UDP, but it never pertained directly to solving a problem so i never looked it up.

please count this as my vote for a followup video on UDP over TCP :)

drewlop
Автор

Can you do a series on the regular guests' bookshelves? Their favorite computer and non-computer books? I'm always interested in the background shelves in the videos.

goofyrice
Автор

Brady is keeping all his dozens of channels alive from the comfort of his home

harrytsang
Автор

The first time I used a VPN to work from home and realized I could access all the network resources like drives, printers, and servers, I was blown away. Now they have apps for vpns. It's such a cool concept.

xliquidflames
Автор

I loved this talk, it's funny hearing him trying so hard to not use too technical language to keep it accessible.

harstar
Автор

I always had the idea Dr. Bagley was a Doctor Who fan. Now I'm delighted to have that confirmed ;)

gregf
Автор

This is the most stable camera work i have ever seen on computerphile

thesquarezminecraft
Автор

Classic Dr Who and Star Trek box sets in the dining room? I approve 🍻

georgeprout
Автор

Funny the quality of the mobile video, where all the adverts for video chats on mobiles are always shown as perfect with no buffering ever.

TheStevenWhiting
Автор

On the next video would be nice if you spoke about layer 2 and layer 3 tunneling vpn. I think it would be interesting for a lots of people.

dietalkaa
Автор

It really annoys me that most people these days think a VPN is just for tunnelling out your internet connection to hide your browsing....

Tularis
Автор

There are also virtual desktops that you can use. Your home PC becomes a "dumb" terminal running a client program connecting to a corporate virtualization server. A 2-factor authentication (RSA SecurID) is still used just like a VPN.

lajya
Автор

Clear, concise explanation. Thank you.

michaelwirtzfeld
Автор

Although VPNs offer excellent solutions for securely connecting to remote networks, VPNs also introduce a risk:

At the office, the IT personnel are responsible for computer security.
They can enforce group policies, ensure that everyone is running company approved anti-virus software, etc.

At home, the company often has zero control over the computer being used to establish a VPN connection. That home computer could be compromised with a key-logger, etc.
For such a connection, the company should be purchasing the home system, and should be enforcing the same conditions on that computer, as though that computer was in the office.

When the employee parts ways with the company, then that home computer, which is company property, goes back to the company.

NoEggu
Автор

Would be interested in seeing you do a video on BeyondCorp!

Xclann
Автор

5:50 where did you come from, where did you go, where did you come from cotton eye joe

Abrifq
Автор

I'm at the same time relieved and disappointed, that the video hasn't at least partially been shot in vertical video format.

alameachan
Автор

This would be a great begining of a materials regarding NETWORK PROTOCOLS. Forst VPN how it work but more specificly. Like 1 phase 2 phase etc etc. :)

RK-lyqj
Автор

So im guessing you guys are going to cover the different types of vpn.
such as pptp, sstp, l2tp, ipsec / ike.
as well as other remote access systems such as windows remote desktop protocol (and gateways), virtual network computing (and their gateways).
the diffrences, which is better for what application.
if so i can see you getting a lot more views, as you will have many technicians, engineers and the few manager who understood it, using the videos to get funding to implement them.

Epbentenrock
Автор

reverse proxy is also a more flexible way to scale access to corp web resources securely (well, as long as you keep up with latest web security standards and have a per client machine certificate)

Gastell