1 hour 53 minutes
Welcome back to end user. Creepy in Security course and welcome to module two off this course, which is called What is BPM?
So in this module, I will be talking about history of BP and give you
explanation about what BP in is and wise does it exist? And what is its used today?
Uh, so we're now at module to and in next module I will be explaining how we pian works, But let's get with this module. And the first lesson is history of ppm.
before we PM before we had, ah,
some kind of digital way to connect between two pc's online Andi. Even before the Internet was in full use, people had to find other ways to share documents. So if we work in
one office in one company in one city and there was some people, another city or even in the country,
the usual way to send the documents between
parts of companies, even if these documents were created by computers.
So we had it in digital form inside your PC, but then you printed it and then you use pack machine to senate. There was wanted
if it was something that you want to send to digital form, you could connect my modem,
and then you can send the file by email. Or you can connected directly to the
PC another city or another country where modem, which were very low speed. And then you send the video file in digital form over analog line.
Now, if the file was very big, for example, it was some kind of checked drawing that head
millions off components and are vectors, and they was
tens or hundreds of megabytes large.
You simply couldn't send it by email, and sending it by modem would mean that you should send it for for a day or so. So nobody used that because lines break and then you have to start all over again.
So the only way
how to do it was to copy down on some magnetic or optical media, likes floppy disks or CDs, and then send them by post or some kind of career service.
So that was the usual thing. If you had this small or medium sized company
now, if you were in big company, then you had
ah, different solution,
and, for example, you had the company headquarters And then he had one regional office and then second regional office.
And after that you had,
uh, some sales offices between Smaller but also had some people there in PC's, and they were all connecting to the company headquarters
by means a police line. So they used leased line. At least line is something that was provided by your telecom provider. It was a physical and line,
and the physical landline helped you connect to
toe the PC. And you have basically extension. You're off your land network in your company will do all these sites.
So you had some equipment in between the talking provider usually provided you build all the hardware, all you had to do. Install is basically a router on both sides. So you had for each released line you had some connection on your router and company headquarters, and you usually had the rocker in sales office.
So these people are. We're now part of same address space, and they
essentially acted them like
one big network.
What was the problem with leased line? Well, the only problem at least line, is that they were really expensive and the price were going up based on the bandwidth off the least line. So the more of Ben you had more had to
peso. These things could cost tens or even hundreds of thousands of dollars per month,
so that was very, very high cost.
And then somebody said, OK, we already have Internet. But Internet is not suitable to connect
two lands into one basically,
And so what happened? These?
in the 1996 people in Microsoft starting developing appear to peel Pierre Tunnel protocol. And in 1999 the specification was published. So Microsoft basically enabled people
connect using Internet. Because of that time, pretty much everybody had an Internet connection. So you could do
basically create a virtual private line between a virtual leased line between one location in your company headquarters. All also, what is also important you have seen on the previous the diagram that allow connections had to go to the corporate headquarters,
and now people could connect between branch offices without actually traffic going
to the corporate headquarters and then to the other
location. So this was very interesting
and very, very fast. It was adopted by large companies.
um, it was adapted Aziz way toe connected to
locations together. And then very soon the software was developed and harder. Solutions were developed to allow people to remotely access
the corporate network in the same way they like. They were accessing from different branches, branch offices of the company
and then 2000 tens. Actually, 2012 you have seen first commercial, weepy and starting so basically commercial weepy, And it's something that you use is an individual or a small company, and it doesn't. Its function is not there to allow you to connect between two
branches of a company,
but just for you is an individual to connect to the Internet, having some benefits off the PM.
So this is all about history off the VPN on and let's do a small learning check.
So the question for you is what was the way to exchange large files in the past, before VPN and even before Internet
was it fax machine was multiple connection of all the usage of seedy rooms, right Herbal city rooms,
and, uh, the answer is,
it will see Durham so fax machine could send only
visual data, the digital in digital form. It was just you just receive a paper on the other side. And modern connection was not suitable because it was too slow. So for larger parts.
So, uh, in Ah, in this video you have learned how life was before we PN and when the VPN was created. So you have also understood why the BP and is there and why it was so easily adopted because it produced costs. Big companies. It was much cheaper than compared to,
um, leased lines.
In next lesson, I'm going to talk about the differences between VPN and the least line.
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Kali Linux Fundamentals
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is ...
1 CEU/CPE Hours Available
Certificate of Completion Offered