Pages

Saturday, March 31, 2012

How to watch UK/British television in Denmark

 

If you live in Denmark you've probably seen adverts to get UK TV channels for a monthly fee without a satellite dish, using the internet. You might think it's all a bit naughty like illegal card sharing - well, it's not! Read on...
 
One of the things Brits in Denmark miss is their dose of UK telly - Corrie, Eastenders and all the rest! Until recently the only real option to get up to date fixes of your favorite UK programmes here in Denmark was to have a huge satellite dish costing thousands - or by sharing a big dish with several homes/apartments, which is a much more economical option.
 
However, with the advent of all the FREE online catch up TV services in the UK (BBC iPlayer, ITV Player, Sky Player, 4OD etc.) and of course live streaming of many UK channels, the internet has become a cheaper way of getting your UK Telly - assuming you already have a broadband internet service.
 
The Problem
 
The TV broadcasters in the UK are not supposed to provide their services outside of the UK - for many reasons, not least because they only pay programme makers for the right to show the programmes in the UK. What they do is check where in the world you are connecting to the internet and if you are not in the UK, you don't get to watch!
 
The Solution
 
Make it look like your computer is connected to the internet in the UK! It's all very complicated to explain but it can be done by subscribing to a service which, once set up, will make the UK TV websites think you are actually in the UK and let you watch the programmes. They are called "VPN's"  It's all very safe and doesn't slow your computer down, bombard you with adverts or anything like that (except of course for the adverts on the telly programmes!!).

Thursday, March 29, 2012

How to Watch Netflix in Korea Online

How to Watch Netflix in Korea Online

 
 
Netflix is an internet streaming Media Company located in USA. Its streaming services are currently available in USA, Canada and Latin America. If you are living in US, you can also subscribe to flat rate DVD-by-mail. The company was established in the year 1997 and began to offer DVDS on subscription from the year 1999. By 2009, it could boast of 10 million customers and had got a collection of 100,000 titles. Ever since it was founded the company has been adding subscribers at good rate. And, Netflix launched its website in 1998 and started online subscription based on their pay-per-rental model. However, the company introduced the flat-fee with unlimited rental from 2000 onwards. Presently, one million DVDs are ordered every month from Netflix consisting of more than thousand titles.
 
The best VPN (Virtual Private Network) is the best tool available for watching Netflix online if you do not live in USA. On subscribing the best VPN service, a user is connected to a remote server located in another country through an encrypted vpn tunnel. VPN is the most secure tool to safeguard once data as it travels through internet. There are many tools for protecting data or information as long as it is residing within the system. Tools like anti-virus software, firewalls, etc, belong to such tools but they are not effective against threats when data travels through internet. This is where VPN is considered the most effective tool for online security. This encrypted tunnel has also an important part to play in enabling you to watch Netflix outside of USA.
 
 

How to unblock Netflix in Korea?

 
Accessing Netflix means to switch your IP into an US one. Thankfully, the solution is very easy, and don't need any computer knowledge.
 
Once the connection is established you appear as an American. Netflix's blocking system isn't able to dectect the change, so your access is granted.

How to Watch Netflix in Romania Online

How to Watch Netflix in Romania Online

 
 
Netflix is an internet streaming Media Company located in USA. Its streaming services are currently available in USA, Canada and Latin America. If you are living in US, you can also subscribe to flat rate DVD-by-mail. The company was established in the year 1997 and began to offer DVDS on subscription from the year 1999. By 2009, it could boast of 10 million customers and had got a collection of 100,000 titles. Ever since it was founded the company has been adding subscribers at good rate. And, Netflix launched its website in 1998 and started online subscription based on their pay-per-rental model. However, the company introduced the flat-fee with unlimited rental from 2000 onwards. Presently, one million DVDs are ordered every month from Netflix consisting of more than thousand titles.
 
The best VPN (Virtual Private Network) is the best tool available for watching Netflix online if you do not live in USA. On subscribing the best VPN service, a user is connected to a remote server located in another country through an encrypted vpn tunnel. VPN is the most secure tool to safeguard once data as it travels through internet. There are many tools for protecting data or information as long as it is residing within the system. Tools like anti-virus software, firewalls, etc, belong to such tools but they are not effective against threats when data travels through internet. This is where VPN is considered the most effective tool for online security. This encrypted tunnel has also an important part to play in enabling you to watch Netflix outside of USA.
 
 

How to unblock Netflix in Romania?

 
Accessing Netflix means to switch your IP into an US one. Thankfully, the solution is very easy, and don't need any computer knowledge.
 
Once the connection is established you appear as an American. Netflix's blocking system isn't able to dectect the change, so your access is granted.

Wednesday, March 28, 2012

How to Watch Netflix in Swiss Online

How to Watch Netflix in Swiss Online

 
 
Netflix is an internet streaming Media Company located in USA. Its streaming services are currently available in USA, Canada and Latin America. If you are living in US, you can also subscribe to flat rate DVD-by-mail. The company was established in the year 1997 and began to offer DVDS on subscription from the year 1999. By 2009, it could boast of 10 million customers and had got a collection of 100,000 titles. Ever since it was founded the company has been adding subscribers at good rate. And, Netflix launched its website in 1998 and started online subscription based on their pay-per-rental model. However, the company introduced the flat-fee with unlimited rental from 2000 onwards. Presently, one million DVDs are ordered every month from Netflix consisting of more than thousand titles.
 
The best VPN (Virtual Private Network) is the best tool available for watching Netflix online if you do not live in USA. On subscribing the best VPN service, a user is connected to a remote server located in another country through an encrypted vpn tunnel. VPN is the most secure tool to safeguard once data as it travels through internet. There are many tools for protecting data or information as long as it is residing within the system. Tools like anti-virus software, firewalls, etc, belong to such tools but they are not effective against threats when data travels through internet. This is where VPN is considered the most effective tool for online security. This encrypted tunnel has also an important part to play in enabling you to watch Netflix outside of USA.
 
 

How to unblock Netflix in Swiss?

 
Accessing Netflix means to switch your IP into an US one. Thankfully, the solution is very easy, and don't need any computer knowledge.
 
Once the connection is established you appear as an American. Netflix's blocking system isn't able to dectect the change, so your access is granted.

Tuesday, March 27, 2012

How to Watch Australia's Streaming Online TV show from outside Australia

How to Watch Australia's Streaming Online TV show from outside Australia

 
Maybe you're a citizen of the Australia who's moved abroad and you miss keeping up with your favorite television shows-or maybe you're just an American who is curious what TV in another country is like. 
 
Whatever the reason, if you've ever tried to go to a streaming TV website such as iPlayer, iTV, Hulu or Netflix and you're in a different country, you're greeted with a message telling you that due to restrictions they can't let you watch anything. Bummer! 
 
How does it know that? What's happening is that the website looks at your public IP address and uses it to determine your location.  Watch TV on websites which restrict IP's,ou can now watch tv series outside of the Australia.
 
The solution to this problem is to use what is called a VPN. Using our new Australia VPN server we can help you traveling abroad to watch their favorite TV shows.

Sunday, March 25, 2012

How to Watch China's Streaming Online TV show from outside China

How to Watch China's Streaming Online TV show from outside China

 
Maybe you're a citizen of the China who's moved abroad and you miss keeping up with your favorite television shows-or maybe you're just an American who is curious what TV in another country is like. 
 
Whatever the reason, if you've ever tried to go to a streaming TV website such as iPlayer, iTV, Hulu or Netflix and you're in a different country, you're greeted with a message telling you that due to restrictions they can't let you watch anything. Bummer! 
 
How does it know that? What's happening is that the website looks at your public IP address and uses it to determine your location.  Watch TV on websites which restrict IP's,ou can now watch tv series outside of the China.
 
The solution to this problem is to use what is called a VPN. Using our new China VPN  server we can help you traveling abroad to watch their favorite TV shows.
 

How to Watch Switzerland's Streaming Online TV show from outside Switzerland

How to Watch Switzerland's Streaming Online TV show from outside Switzerland

 

 

Maybe you're a citizen of the Switzerland who's moved abroad and you miss keeping up with your favorite television shows-or maybe you're just an American who is curious what TV in another country is like. 
 
Whatever the reason, if you've ever tried to go to a streaming TV website such as iPlayer, iTV, Hulu or Netflix and you're in a different country, you're greeted with a message telling you that due to restrictions they can't let you watch anything. Bummer! 
 
How does it know that? What's happening is that the website looks at your public IP address and uses it to determine your location.  Watch TV on websites which restrict IP's,ou can now watch tv series outside of the Switzerland.
 
The solution to this problem is to use what is called a VPN. Using our new Switzerland VPN server we can help you traveling abroad to watch their favorite TV shows.

Saturday, March 24, 2012

How To Get A Philippines IP Address

How To Get A Philippines IP Address

 

 

How do I hide my IP address?

 
The most common method to hide your IP address is to use a vpn server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
 

You can get Free VPN accounts at vpntraffic!

 
If you are a recognized member of some online forum. Post Threads about us and get Free VPN accounts.
 
The content must remain on the forum permanent.
The forum should relate vpn,online game,voip and other topic about vpn use. The fourm PR>2

Thursday, March 22, 2012

geographical connectivity to Germany VPN

 at any time from the Client CP. 3. We currently have over 100 servers in 14 countries. 4. Each VPNUK account allows two simultaneous logins per server.Receive unrestricted and unlimited high speed access to our German based server and enjoy complete anonymity and security with a VPNUK IP address based in Germany!The fantastic features of this VPNUK Dedicated VPN IP do not end there, you can use this VPN IP as your IP and receive complete anonymity, security and worldwide geographical connectivity to Germany VPN from any location for just £8.00 GBP per month. This enbles you to browse the internet in complete privacy, protect wireless access points, access geographically blocked websites and services and whole lot more.UK, US, German and canadian VPN Tunnel accounts, single or multiple access accounts! With a range of accounts offering Single user or multi user access, up to 3 users you can connect together on Shared IP accounts and login to any of our 128 bit secure high speed Virtual Private Networks with a VPN IP address based in the UK USA, Switzerland and/or Germany! Receive unrestricted and unlimited high speed access to our UK, USA, Switzerland and Germany based servers, enjoy anonymity with a UK, USA, Ireland, Spain, France, Switzerland, Germany, Italy, Canada, Holland and Denmark IP address!Unblock Websites with a German VPNMany German websites block access for visitors outside Germany. Golden Frog's German VPN servers allow you to bypass location-based IP blocking so you can access your favorite German websites securely from anywhere in the world.Simplify your VPN connections with the free   app. Download   App1.0.0 for WindowsGet the Best VPN for GermanyGolden Frog didn't invent VPN service, we optimized it for speed and security on modern broadband networks. Since we do not rely on third party providers to run our servers or network, we are able to deliver the fastest German VPN speeds and provide server-to-user privacy. GERMAN VPN IP SERVER OFFERING TOTAL SECURITY!! The VPNUK German VPN IP account! Offering total 128 bit secure high speed Virtual Private Networks with a VPN IP address based in Germany!
SHARED (DYNAMIC IP) VPN ACCOUNTSChoose an intial country for the account to be set up on. Once your account is setup you are free to switch the location and country as often as you like.1. You can use a VPNUK account from any country in the world.2. You can switch between VPNUK servers

View Client VPN

Gestures and Navigation AidsVMware has created user interaction aids to help you navigate conventional Windows user interface elementson a tablet.View Client VPN  ToolbarThis toolbar has buttons that you can tap to display the onscreen keyboard, the virtual touchpad, configurationoptions, and a virtual keypad for arrow keys and Page Up and Page Down.A small tab for the toolbar appears in the top-center of the iPad screen when a View desktop is open. To displaythe toolbar, tap the tab.Using VMware View Client for iPad14  VMware, Inc.Onscreen KeyboardThe onscreen keyboard in a View desktop has more keys than the standard tablet onscreen keyboard. Forexample, Control keys and function keys are available. To display the onscreen keyboard, tap the Keyboardbutton on the View Client toolbar, or tap the tablet screen with three fingers at the same time.IMPORTANT   To use the three-finger tap, make sure the iPad accessibility feature for zooming is turned off.When the zoom accessibility feature is turned on, you zoom by double-tapping with three fingers, and tappingonce with three fingers does nothing.Even if you use an external keyboard, a one-row onscreen keyboard still appears and contains function keys,and the Ctrl, Alt, Win, and arrow keys. Some external keyboards do not have all these keys.Sending a String of CharactersFrom the onscreen keyboard, tap the pen icon on the left side of the Ctrl key to display the local input buffer.Text that you type into this text box is not sent to an application until you tap Send. For example, if you openan application such as Notepad and tap the pen icon, the text that you type does not appear in the Notepadapplication until you tap Send.Use this feature if you have a poor network connection. That is, if you type a character and the character doesnot immediately appear in the application. With this feature, you can quickly type up to 1,000 characters andthen either tap Send or tap Return to have all 1,000 characters appear at once in the application.Also use this feature for entering Korean characters or characters from other languages that require multistageIME support.Navigation KeysTap the Ctrl/Page icon on the View Client toolbar or onscreen keyboard to display the navigation keys. Thesekeys include Page Up, Page Down, arrow keys, function keys, and other keys that you often use in Windowsenvironments, such as Alt, Del, Shift, Ctrl, Win, and Esc. You can press and hold arrow keys for continuouskey strokes.Use the Shift key on this keypad when you need to use key combinations that include the Shift key, such asCtrl+Shift. To tap a combination of these keys, such as Ctrl+Alt+Del, first tap the onscreen Ctrl key. After theCtrl key turns blue, tap the onscreen Alt key. After the Alt key turns blue, tap the Del key.

Wednesday, March 21, 2012

India VPN TV Everywhere

The latest method of attack aimed at online TV, however, may be the most threatening — and is also likely illegal. Competition laws aim to ensure that incumbent companies fight to prevail by providing better services and changing with the times, not by using their existing dominant position and agreements to prevent new competitors from emerging. The cable, satellite and phone companies have apparently forged an agreement known within the industry as "TV Everywhere." Adopted after lengthy discussions among incumbents, TV Everywhere is designed to crush online competition while being India VPN marketed as a consumerfriendly feature. On Dec. 15, Comcast became the first company to launch its TV Everywhere product, under the brand Fancast Xfinity. The other dominant cable, satellite and phone companies have announced plans to follow suit. TV Everywhere has a simple business plan, under which TV programmers like TNT, TBS and CBS will not make content available to a user via the Internet unless the user is also a pay TV subscriber through a cable, satellite or phone company. The obvious goal is to ensure that consumers do not cancel their cable TV subscriptions. But this plan also eliminates potential competition among existing distributors. Instead of being offered to all Americans, including those living in Cox, Cablevision and Time Warner Cable regions, Fancast Xfinity is only available in Comcast regions. The other distributors will follow Comcast's lead, meaning that the incumbent distributors will not compete with one another outside of their "traditional" regions.

Tuesday, March 20, 2012

Romania VPN Netflix

Netflix proves there's both demand and money to be made from the vast back catalog of film and TV show content.  But for the model to work best, the firm needed to address the biggest inefficiency in the movie industry – 'audience finding', that is, matching content with customers.  To do this, Netflix leverages some of the industry's most sophisticated technology, a proprietary recommendation system that the firm calls Cinematch.Each time a customer visits Netflix after sending back a DVD, the service essentially asks "so, how did you like the movie?"  With a single click, each film can be rated on a scale of one to five stars.  If you're new to Netflix, the service can prompt you with a list of movies (or you can search out and rate titles on your own).  Love Rushmore but hate The Life Aquatic?  Netflix wants to know.The magic of Cinematch happens not by offering a gross average user rating – user tastes are too varied and that data's too coarse to be of significant value.  Instead, Cinematch develops a map of user ratings and steers you toward titles preferred by people with tastes that are most like yours.  Techies and marketers call this trick collaborative filtering.  The term refers to a classification of software that monitors trends among customers and uses this data to personalize an individual customer's experience.Romania VPN Netflix Input from collaborative filtering software can be used to customize the display of a web page for each user so that an individual is greeted only with those items the software predicts they'll most likely be interested in. The kind of data mining done by collaborative filtering isn't just used by Netflix, other sites use similar systems to recommend music, books, even news stories.  While other firms also employ collaborative filtering, Netflix has been at this game for years, and is constantly tweaking its efforts.  The results are considered the industry gold standard.

Monday, March 19, 2012

free freedom vpn account?

The Barracuda SSL VPN has three internal preconfigured User Databases of type Built-in. These are ,Default, Super User and Global. The main system administrator is identified as the Super User who ,would delegate responsibility by creating administrative Accounts and Groups, with the necessary ,access rights, typically within the Default User Database.,In many cases it is likely that a repository of user information exists already, e.g. Active Directory or ,LDAP. Within the Barracuda SSL VPN you can create a user database to an existing repository and ,then use the Accounts and Groups defined within it when creating and assigning Resources and ,Policies. Resources and policies are only accessible to the Accounts and Groups within the same user ,database.,The Global User Database is the exception to this rule; policies across all user databases are visible ,to Global and so resources created in Global can have any policy assigned. This is an efficient way to ,make resources available to all users where a number of user databases exist; the diagram below ,shows how the Everyone policies from two user databases (AD and LDAP) are used to achieve this.Getting Started  19,Chapter 3,Getting Started,The steps to installing your Barracuda SSL VPN into your network are as follows:, The physical installation and accompanying network configurations that must be done to ,integrate the physical hardware into your corporate network., The configuration of the Barracuda SSL VPN itself, which is performed over two separate web ,interfaces: the Administrative interface, for system-related items, and the Management ,interface, for the Barracuda SSL VPN use and functionality. , Fine tune both the Administrative and Management configurations, to customize both for your ,specific environment.,Initial Setup ....................................................................................... 20,The Barracuda SSL VPN Administrator Accounts ............................ 28,

Sunday, March 18, 2012

VPN control system

In our implementation, both the emulated system and the simulation kernel (coded in C++ andMPI) run on a SP2 supercomputer located at the Cornell Theory Center (CTC) in Ithaca, NewYork. The real-time visualization and interactive control module resides on an SGI Indigo2workstation at Columbia University (Figure 10(a)). It is written using Open Inventor, a 3Dgraphics tool kit based on Open GL. The emulation support module is distributed on the twomachines. These machines communicate through NYNET, an ATM network that connects several research laboratories in New York State.5.1 Evaluating the Customer Control and Management SystemIn our evaluation, we implemented several versions of the VPN control system on the emulation platform. We have also built implementations of the management capabilities discussed inSection 3, namely, VP management, QOS management and priority management. Management operations are performed through the graphical interface (Figure 8). In the following, wesummarize one of the results of the evaluation, in which we studied the effectiveness ofresource control under constant traffic load. A more complete description of the experimentalEmulated SystemParallel Simulation KernelReal-TimeVisualizationandInteractiveControlEmulation SupportFigure 9   Building blocks of the interactive emulation platform.Rome LaboratoryCornell Theory CenterSyracuseNYNEXColumbia UniversityNYNEXSGI Indigo 2IBM SP2(512 Processors)Figure 10  (a) Hardware configuration of theinteractive emulation platform.VP Switch in Public DomainVPN Termination Point in CPNVPVPGFigure 10 (b) Network topology usedin the evaluation.results can be found in [CHA96a]. The performance of the customer control system was evaluated in a scenario based on the topology of the NYNET testbed. In this scenario, a VPN service interconnects 6 CPNs. The VPN contains 14 unidirectional VPGs which support 30unidirectional VPs, connecting the 6 CPNs in a full mesh topology. The two VPGs in the middle carry 9 VPs; the remaining VPGs carry 5 VPs each (Figure 10(b)).

Saturday, March 17, 2012

VPN operationwhich

The PDIS is dedicated to the candidate NSP architecture to provide a flexibleinterface for application programming and operation description. Furthermore, thePDIS facilitates the task management and resource allocation carried out by theCD. Descriptors generated by the C*Core 310 describe the required operations aswell as their corresponding input and output data packet information; therefore,each descriptor represents one specific network workload task. Figure 7 illustratesthe overview of a system descriptor format which consists of 13 pointer fields. ThePDIS provides considerable programmability such that the system descriptorshown in this figure can describe not only simple cryptographic algorithmoperations, but also complex protocol operations. According to requesting tasks,system descriptors vary in the number of fields and lengths depending on howmany dierent cipher algorithms are to be performed and the amount of pendingcontext blocks. The simplest system descriptor is just one cryptographic operationwhich may be a 3DES encryption consisting of just 8 pointer fields, while the mostcomplex system descriptor may be the one illustrated in Figure 7, where a IPSec3DES-HMAC-SHA-1-96 ESP mode is described. Meanwhile, the figure shows thedescriptor interpretation procedure in which a complex IPSec descriptor isdisassembled into one simple descriptor for 3DES and one simple descriptor forHMAC. The figure also illustrates how the 3DES descriptor is eventuallyfragmented into one configuration descriptor and its related cluster of dat

Thursday, March 15, 2012

Touching the Phone button VPN

Touching the Phone button on your Home screen produces several options for initiating a new call: Favorites, Recents, Contacts, and Keypad.favorITes This section is a user-defined list of your most frequently called numbers—think of it as the iPhone's equivalent of speed dialing (though it takes a couple more taps to dial a number than a speed-dialing feature should). To designate a favorite, tap the plus sign at the top of the Favorites screen (see "Fast Friends"). This brings up your contacts list. Select a contact, and then tap a home, mobile, or work number to add that number to your favorites. (You can also now add e-mail addresses, for communicating via FaceTime.) You can add more than one number for a person—each number shows up as a separate entry. You can also use the Add To Favorites button that appears at the bottom of a contact record to add someone to this list.From the Favorites screen, tap a person's name to dial that number. Tap the blue arrow next to the name to see the contact's full Info screen. If you decide you want to remove someone from your Favorites list, simply press the Edit button and then tap the minus sign next to that name. To rearrange the contacts in

Internet usage may be overrepresented

Self-e cacy is a domain dependent construct, therefore selecting items that are representative of a particulardomain is vital to ensure the content validity of the scale.The authors are aware that some aspects of Internet/Webusage are not represented in this instrument (e.g. browsercon®guration, downloading software, posting to newsgroups). It is also true that a few items, while related toInternet usage, may not be speci®c only to the Internetdomain (e.g. scanning a picture, sending a fax). Moreover, some elements of Internet usage may be overrepresented in the scale (e.g. encrypt/decrypt e-mail).This suggests that the content validity of the recommended instrument can be improved.While this suggests that the content validity of theinstrument can be improved, it is important to note thatthe recommended instrument is useful in its presentform. The results of the factor analysis indicate that the®rst factor (browsing) is the key to Internet usage andaccounts for 59% of the variance in self-e cacy scores.While the other factors account for substantially lessvariance, 13.6% for encryption/decryption and only7.9% for system manipulation, they are both highlycorrelated with the key (browsing) factor.Selecting self-e cacy items for new and ever-changingtechnologies like the World Wide Web will always beproblematic because items may become quickly dated.However, we cannot let this fact deter us from makingthe attempt. The current instrument demonstrates goodconvergent and discriminant validity along with highreliability. Although the content validity of the scale canbe improved, the current version will serve both as auseful instrument and a starting point for an improvedmeasure of Internet self-e cacy.

Wednesday, March 14, 2012

Remote-User Design VPN

Remote-User  Design
This section discusses four options for providing remote users VPN connectivity to the headend sites within the SAFE design.
Remote connectivity applies to both mobile and home-office workers. The primary focus of these designs is to provide
connectivity from the remote site to the corporate headquarters and through some means, the Internet. The following four
options are available:
• Software access option—Remote user with a software VPN client and personal firewall software on the PC.
• Remote-site firewall option—Remote site protected with a dedicated firewall that provides firewalling and IPSec VPN
connectivity to corporate headquarters; WAN connectivity is provided via an ISP-provided broadband access device (that
is, DSL or cable modem).
• Hardware VPN client option—Remote site using a dedicated hardware VPN client that provides IPSec VPN connectivity
to corporate headquarters; WAN connectivity is provided via an ISP-provided broadband access device.
• Remote-site router option—Remote site using a router that provides both firewalling and IPSec VPN connectivity to
corporate headquarters. This router can either provide direct broadband access or go through and ISP-provided broadband
access device.
Each of these designs is discussed further in the design guidelines section below.

Monday, March 12, 2012

A VPN consists of four main components

A VPN consists of four main components: 1) a VPN client, 2) a Network Access Server (NAS), 3) a tunnel terminating device or VPN server, 4) a VPN protocol. In a typical access VPN connection, a remote user (or VPN client) initiates a PPP connection with the ISP's NAS via the public switched telephone network (PSTN) [10,11]. An NAS is a device that terminates dial-up calls over analog (basic telephone service) or digital (ISDN) circuits [8]. The NAS is owned  by the ISP, and is usually implemented in the ISP's POP. After the user has been authenticated by the appropriate authentication method, the NAS directs the packet  to the tunnel that connects both the NAS and the VPN server. The VPN server may reside in the ISP's POP or at the corporate site, depend- ing on the VPN model that is implemented. The VPN server recovers the packet from the tunnel, unwraps it, and delivers it to the corporate network. Figure 2 illustrates VPN architecture. There are four tunneling protocols used to establish VPNs, and three are extensions of the Point-to-Point Protocol (PPP) [5,6,10,11]: 1) Point-to-Point Tunneling Protocol (PPTP). 2) Layer 2 Forwarding (L2F). 3) Layer 2 Tunneling Protocol (L2TP). 4) IP Security (IPSec) Protocol Suite. In this Section we will discuss IPSec with some details because IPSec can work with IP4 and IP6. IPSec provides cryptography-based protection of all data at the IP layer of the communications stack. It provides secure communications transparently, with no changes required to existing applications [12,13]. IPSec protects network traffic data in three ways [12, 13]: 1) Authentication: The process by which the identity of a host or end point is verified. 2) Integrity checking: The process of ensuring that no modifications were made to the data while in-transit across the network. 3) Encryption: The process of "hiding" information while intransit across the network in order to ensure privacy.