Tagged articles
56 articles
Page 1 of 1
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 14, 2026 · Artificial Intelligence

How to Use Claude AI in China in 2026: Registration, Subscription, and API Guide

This guide explains the three main obstacles Chinese users face when accessing Claude AI—network restrictions, account registration, and payment limitations—and provides step‑by‑step instructions, subscription alternatives, API usage via Code80, and risk‑mitigation tips for stable operation.

AI programmingAPI accessClaude AI
0 likes · 12 min read
How to Use Claude AI in China in 2026: Registration, Subscription, and API Guide
Radish, Keep Going!
Radish, Keep Going!
Nov 16, 2025 · Fundamentals

Tech Highlights: Unofficial Teams Linux Client, AI Prompt Engineering, TCP Deep Dive & More

A curated roundup of recent tech developments covering an open‑source Linux Teams client, a profit‑margin primer, a showdown between traditional machine learning and prompt engineering, Google’s near‑perfect handwriting model, VPN legislation concerns, a classic game anniversary, Go’s 16‑year milestone, a TCP deep‑dive, and an investigation into pressure on Archive.today.

GoLinuxMicrosoft Teams
0 likes · 9 min read
Tech Highlights: Unofficial Teams Linux Client, AI Prompt Engineering, TCP Deep Dive & More
Raymond Ops
Raymond Ops
Sep 9, 2025 · Operations

Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS

This tutorial walks you through installing ocserv, creating a CA and server certificates, configuring ocserv settings, adjusting kernel parameters, setting up iptables firewall rules, managing VPN users, and controlling the ocserv service on a CentOS server.

CertificateLinuxOpenConnect
0 likes · 38 min read
Step‑by‑Step Guide to Install and Configure ocserv VPN on CentOS
Linux Tech Enthusiast
Linux Tech Enthusiast
Sep 7, 2025 · Information Security

Essential Truths You Must Know About Using VPNs

The article explains what a VPN is, clarifies its legal status in various countries, debunks common myths about privacy, describes how VPNs act as encrypted proxies requiring trust in providers, and offers guidance on selecting a reliable service or building your own.

ProxyVPNencryption
0 likes · 6 min read
Essential Truths You Must Know About Using VPNs
Raymond Ops
Raymond Ops
Mar 28, 2025 · Information Security

How to Build an OpenVPN Server on Public Cloud: Step‑by‑Step Guide

This guide walks you through installing OpenVPN on a public cloud, setting up Easy‑RSA for certificate management, configuring the server and client, creating authentication scripts, and connecting Windows or macOS clients, complete with commands and configuration examples.

EasyRSALinuxOpenVPN
0 likes · 12 min read
How to Build an OpenVPN Server on Public Cloud: Step‑by‑Step Guide
Raymond Ops
Raymond Ops
Mar 25, 2025 · Operations

How to Set Up OpenVPN Server and Client on Linux: Step‑by‑Step Guide

This tutorial explains how to install, configure, and run OpenVPN on Linux, covering VPN concepts, types, OpenVPN features, server‑side certificate creation, key generation, configuration files, and client setup, with step‑by‑step commands and troubleshooting tips for secure remote access.

LinuxOpenVPNServer Configuration
0 likes · 11 min read
How to Set Up OpenVPN Server and Client on Linux: Step‑by‑Step Guide
Lin is Dream
Lin is Dream
Mar 15, 2025 · Fundamentals

Mastering macOS Network Settings: DHCP, DNS, NAT, VPN & More Explained

This guide walks through macOS network configuration on a MacBook Pro M1, covering Wi‑Fi advanced settings, TCP/IP fundamentals such as DHCP, IP addressing and subnet masks, NAT translation, routing tables, DNS servers, proxy types, VPN (L2TP) setup, SSH usage, and Ethernet interface details.

DHCPDNSNAT
0 likes · 18 min read
Mastering macOS Network Settings: DHCP, DNS, NAT, VPN & More Explained
Linux Cloud Computing Practice
Linux Cloud Computing Practice
Jun 24, 2024 · Information Security

How to Build a Secure OpenVPN Server on CentOS and Ubuntu

This guide walks you through installing Easy‑RSA, generating CA, server and client certificates, configuring OpenVPN, enabling IP forwarding, adjusting firewalls, and setting up client connections on Linux, macOS and Windows, providing a complete end‑to‑end VPN deployment solution.

CentOSEasy-RSAOpenVPN
0 likes · 21 min read
How to Build a Secure OpenVPN Server on CentOS and Ubuntu
DevOps Operations Practice
DevOps Operations Practice
Jun 18, 2024 · Information Security

Common Types of VPN and Their Characteristics

This article explains VPN technology and outlines four common VPN types—IPSec, SSL/TLS, PPTP, and L2TP/IPSec—detailing their modes, advantages, and security considerations for remote access and site‑to‑site networking, and also compares ease of deployment versus security risks, helping readers choose the appropriate solution for their network environment.

IPSecL2TPPPTP
0 likes · 4 min read
Common Types of VPN and Their Characteristics
Cloud Native Technology Community
Cloud Native Technology Community
May 9, 2024 · Cloud Native

Step-by-Step Deployment of K3s with Kube‑OVN, Multus, VPN and Cloud‑Hypervisor for a Hybrid Container‑VM Environment

This guide walks through deploying a lightweight K3s cluster unified with virtual machines using Kube‑OVN for multi‑tenant VPC isolation, configuring shared internet via VPN, installing cloud‑hypervisor, setting up Multus for multi‑NIC containers, and provisioning a management web‑app with Tomcat and OpenVPN, providing a complete cloud‑native lab environment.

K3sKube-OVNKubernetes
0 likes · 22 min read
Step-by-Step Deployment of K3s with Kube‑OVN, Multus, VPN and Cloud‑Hypervisor for a Hybrid Container‑VM Environment
Liangxu Linux
Liangxu Linux
Apr 13, 2024 · Operations

Master Linux Network Interface Management: Essential Commands and Real-World Examples

This guide walks Linux system administrators through essential network interface commands—such as ifconfig, ip, route, netstat, traceroute, ping, ss, nmcli, iw, ethtool, firewall-cmd, and iptables—providing clear syntax, practical examples, and tips for configuring IP addresses, routes, DNS, VPNs, and firewall rules.

LinuxNetwork ConfigurationShell Commands
0 likes · 8 min read
Master Linux Network Interface Management: Essential Commands and Real-World Examples
Liangxu Linux
Liangxu Linux
Jan 22, 2024 · Operations

Mastering nmcli: A Complete Linux Network Management Guide

This article provides a thorough walkthrough of the nmcli command-line tool on Linux, covering installation, basic usage, managing Ethernet, Wi‑Fi, and VPN connections, advanced batch configurations, scripting automation, and useful aliases, complete with practical code examples for each scenario.

CLILinuxVPN
0 likes · 10 min read
Mastering nmcli: A Complete Linux Network Management Guide
Open Source Linux
Open Source Linux
Nov 13, 2023 · Information Security

How NetBird Simplifies Secure Peer-to-Peer VPNs Without a Central Server

NetBird is an open‑source, WireGuard‑based network management platform that creates secure, direct encrypted tunnels between computers, devices, and servers without a central VPN, supporting cloud, on‑premise, edge and container environments, and offers quick deployment via simple installation steps on Linux and macOS.

LinuxNetBirdVPN
0 likes · 5 min read
How NetBird Simplifies Secure Peer-to-Peer VPNs Without a Central Server
Wukong Talks Architecture
Wukong Talks Architecture
Sep 18, 2023 · Information Security

Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration

This article explains the concept and practical applications of forward proxy, outlines its benefits for enterprise network security and access control, compares it with reverse proxy, and provides detailed Nginx configuration examples—including how to expose the client’s real IP—along with common tools and real‑world scenarios.

VPNforward proxynetwork security
0 likes · 12 min read
Understanding Forward Proxy: Principles, Use Cases, and Nginx Configuration
AI Cyberspace
AI Cyberspace
Jun 7, 2023 · Fundamentals

How MPLS Transforms WAN: From Legacy IP to High‑Performance Label Switching

This article traces the evolution of wide‑area network technologies, explains MPLS label‑stack architecture and forwarding mechanisms, details MPLS VPN (L2VPN/L3VPN) components, routing information bases, RD/RT fields, and outlines classic and inter‑domain deployment models for modern carrier networks.

Label SwitchingMPLSVPN
0 likes · 31 min read
How MPLS Transforms WAN: From Legacy IP to High‑Performance Label Switching
Programmer DD
Programmer DD
May 29, 2023 · Information Security

Why Firefox’s Full‑Screen VPN Ads Spark Outrage and How to Block Them

Recent users reported that Firefox displays intrusive full‑screen VPN ads that freeze the browser, violate Mozilla’s privacy principles, and sparked community backlash, leading to a bug‑tracking saga and eventual removal of the ads with suggested ad‑blocking workarounds.

FirefoxVPNad blocking
0 likes · 5 min read
Why Firefox’s Full‑Screen VPN Ads Spark Outrage and How to Block Them
Liangxu Linux
Liangxu Linux
Nov 23, 2022 · Information Security

How to Build a Self‑Hosted P2P VPN with Headscale and Tailscale

This guide explains why traditional star‑topology VPNs suffer from bandwidth bottlenecks, introduces NAT‑traversal mesh networking, and provides step‑by‑step instructions for deploying a self‑hosted Headscale control server, configuring TLS, setting up DERP relays, installing Tailscale clients on Linux, macOS and Windows, and troubleshooting connectivity.

DockerLinuxTailscale
0 likes · 25 min read
How to Build a Self‑Hosted P2P VPN with Headscale and Tailscale
MaGe Linux Operations
MaGe Linux Operations
Oct 25, 2022 · Operations

How to Build a Self‑Hosted P2P VPN with Headscale and Tailscale

Learn to overcome NAT limitations and create a high‑speed, peer‑to‑peer network by installing and configuring Headscale, an open‑source Tailscale controller, including server setup, certificate handling, Docker deployment, client installation across platforms, and optional DERP relay configuration for reliable connectivity.

LinuxTailscaleVPN
0 likes · 26 min read
How to Build a Self‑Hosted P2P VPN with Headscale and Tailscale
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2022 · Information Security

Why VPNs Remain a Weak Link and How Zero‑Trust Secures Remote Access

During the COVID‑19 pandemic, reliance on traditional VPNs surged, exposing growing security risks, while Zscaler’s report highlights attackers exploiting VPN vulnerabilities and underscores that adopting a zero‑trust architecture can dramatically reduce attack surfaces and protect remote workforces.

Remote accessVPNZero Trust
0 likes · 6 min read
Why VPNs Remain a Weak Link and How Zero‑Trust Secures Remote Access
Efficient Ops
Efficient Ops
Aug 1, 2022 · Operations

MPLS VPN Revamps ICBC R&D Network: Decentralization, Cost Savings, and Scalability

ICBC’s Software Development Center overhauled its star‑topology network by deploying MPLS VPN, eliminating a central hub, reducing costs, establishing optimal point‑to‑point paths, and enabling seamless expansion, thereby boosting reliability, performance, and supporting future R&D growth across multiple locations.

Cost reductionDecentralizationMPLS
0 likes · 7 min read
MPLS VPN Revamps ICBC R&D Network: Decentralization, Cost Savings, and Scalability
Open Source Linux
Open Source Linux
May 11, 2022 · Information Security

What Is a Firewall? Types, Functions, and How It Secures Networks

This comprehensive guide explains what a firewall is, its origins, the hardware and software types, session management, NAT, VPN, security zones, policies, threat mitigation, DoS protection, IDS/IPS, deep inspection, and performance considerations, providing a solid foundation for anyone interested in network security.

DoS protectionIDSIPS
0 likes · 42 min read
What Is a Firewall? Types, Functions, and How It Secures Networks
MaGe Linux Operations
MaGe Linux Operations
Feb 13, 2022 · Information Security

Unlock Secure Remote LANs with Tailscale and WireGuard

This article introduces Tailscale, a WireGuard‑based virtual networking tool, explains its key security features, shows how to install and configure it on various platforms, and outlines practical use cases such as file transfer, remote development, and network proxying.

Remote accessTailscaleVPN
0 likes · 11 min read
Unlock Secure Remote LANs with Tailscale and WireGuard
YunZhu Net Technology Team
YunZhu Net Technology Team
Jan 7, 2022 · Operations

Huawei DSVPN Solution: Architecture, Configuration Steps, and Validation

This article explains the limitations of traditional IPSec VPNs for growing enterprises, introduces Huawei's DSVPN dynamic VPN technology, provides detailed configuration procedures for Hub and Spoke devices—including interface, routing, firewall, and security policies—and demonstrates verification of end‑to‑end connectivity.

DSVPNDynamic VPNHuawei
0 likes · 14 min read
Huawei DSVPN Solution: Architecture, Configuration Steps, and Validation
Zhongtong Tech
Zhongtong Tech
Jan 4, 2022 · Information Security

Why VPN Is Giving Way to SDP: A Deep Dive into Zero‑Trust Architecture

This article explains how traditional VPNs are being replaced by Software‑Defined Perimeter (SDP) solutions, detailing the underlying protocols, encryption methods, SOCKS5 proxy integration, custom DNS handling, IAM integration, and the ZFE gateway architecture that together enable a zero‑trust network for modern enterprises.

IAMSDPSOCKS5
0 likes · 22 min read
Why VPN Is Giving Way to SDP: A Deep Dive into Zero‑Trust Architecture
Programmer DD
Programmer DD
Dec 29, 2021 · Information Security

Is VPN Use Really Punished? Uncovering the Truth Behind China’s Administrative Penalties

The article investigates recent rumors that VPN usage has been subject to large‑scale administrative penalties in China, examines official Zhejiang government records, reveals that most reported cases were either errors or retractions, and clarifies the legal restrictions on unauthorized international networking.

Administrative PenaltyChinaInternet Regulation
0 likes · 4 min read
Is VPN Use Really Punished? Uncovering the Truth Behind China’s Administrative Penalties
Laravel Tech Community
Laravel Tech Community
May 24, 2020 · Information Security

Using VPNs in China: Legal Risks and Recent Enforcement Cases

The article explains that using VPNs to access foreign networks in China is illegal under current regulations, recounts recent enforcement actions—including fines and administrative warnings against individuals and vendors—and warns developers and overseas students of the severe penalties that can follow illegal VPN usage.

ChinaInternet CensorshipVPN
0 likes · 7 min read
Using VPNs in China: Legal Risks and Recent Enforcement Cases
Java Architecture Diary
Java Architecture Diary
Jan 31, 2020 · Operations

How to Build a Private Virtual LAN with ZeroTier in Minutes

ZeroTier lets you create a peer‑to‑peer virtual network that bridges devices across different physical locations without a public IP, and this guide walks you through its core concepts, registration, network creation, client installation, joining, IP assignment, connectivity testing, and optional Moon relay setup.

Moon relayNetworkingRemote access
0 likes · 4 min read
How to Build a Private Virtual LAN with ZeroTier in Minutes
Efficient Ops
Efficient Ops
Jan 30, 2020 · Operations

Essential Checklist for Remote Work VPN and Video Conference Operations

This guide outlines the critical considerations for VPN licensing, bandwidth, IP address capacity, troubleshooting, video‑conference licensing, backup solutions, emergency on‑call procedures, and business system accessibility to ensure smooth remote work operations.

VPNVideo Conferencingemergency response
0 likes · 4 min read
Essential Checklist for Remote Work VPN and Video Conference Operations
Mafengwo Technology
Mafengwo Technology
Dec 19, 2019 · Cloud Native

How We Evolved K8s Networking: From Flannel to MAC‑VLAN and VPN

This article details the step‑by‑step evolution of Mafengwo's Kubernetes network—from early Flannel VXLAN setups, through a VPN‑server bridge for external access, to a MAC‑VLAN CNI solution—highlighting design principles, challenges, and recent optimization plans for large‑scale Java micro‑services.

CNICloud NativeFlannel
0 likes · 12 min read
How We Evolved K8s Networking: From Flannel to MAC‑VLAN and VPN
Practical DevOps Architecture
Practical DevOps Architecture
Jul 25, 2019 · Information Security

Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces

This guide explains the security risks of transparent Internet data transmission, introduces IPSec's authentication, encryption, integrity, and anti‑replay features, and provides step‑by‑step Huawei and Cisco router configurations—including interface setup, IKE proposals, IPSec profiles, and verification commands—to securely connect branch and headquarters networks via a VPN.

CiscoHuaweiIPSec
0 likes · 13 min read
Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces
Architecture Digest
Architecture Digest
May 6, 2018 · Backend Development

Design and Prototype of a Distributed VPN Using Go and KCP

This article describes the motivation, requirements, solution research, and detailed design of a lightweight distributed VPN built with Go, employing KCP as the transport protocol, and includes prototype source code for both hub and peer components.

GoKCPNetwork programming
0 likes · 12 min read
Design and Prototype of a Distributed VPN Using Go and KCP
UCloud Tech
UCloud Tech
Mar 29, 2018 · Cloud Computing

Mastering VPC: Layered Isolation and Four Real‑World Connectivity Solutions

This article explains how VPC enables component layering and isolation, covering four typical scenarios—enabling internet access for subnets, separating internal and external resources, inter‑connecting multiple cloud VPCs, and linking on‑premises networks with cloud VPCs—along with step‑by‑step implementation guidance.

NAT gatewaySubnet IsolationVPC
0 likes · 10 min read
Mastering VPC: Layered Isolation and Four Real‑World Connectivity Solutions
Huawei Cloud Developer Alliance
Huawei Cloud Developer Alliance
Mar 28, 2018 · Mobile Development

Why Does MotionPro VPN Drop on Android? Common Causes and Fixes

The article opens with Confucius' teachings on knowledge and inquiry, then presents a developer's issue where MotionPro VPN disconnects on Android, outlines two main causes—lack of app trust and background cleaning by phone managers—and provides clear steps to whitelist the app and reinstall it with trust enabled.

AndroidMobile DevelopmentVPN
0 likes · 3 min read
Why Does MotionPro VPN Drop on Android? Common Causes and Fixes
DevOps
DevOps
Oct 30, 2017 · Cloud Computing

Configuring Azure Virtual Network (VNet) Peering for Cross‑Region Resource Connectivity

This article explains how to connect Azure virtual networks using VNet peering, detailing user access methods, peering benefits and limitations, and step‑by‑step configuration of three resource‑manager‑based VNets with gateways, ExpressRoute and VPN, culminating in connectivity verification via Windows Server VMs.

ExpressRouteHub‑and‑SpokePeering
0 likes · 5 min read
Configuring Azure Virtual Network (VNet) Peering for Cross‑Region Resource Connectivity
MaGe Linux Operations
MaGe Linux Operations
Nov 18, 2016 · Information Security

How to Set Up an OpenVPN Server on Linux: Step‑by‑Step Guide

This tutorial walks you through installing required packages, compiling LZO and OpenVPN, configuring environment variables, generating CA, server and client certificates, packaging client files, adjusting server and client configuration files, and finally starting the OpenVPN service on a Linux host.

LZOLinuxOpenVPN
0 likes · 8 min read
How to Set Up an OpenVPN Server on Linux: Step‑by‑Step Guide
Practical DevOps Architecture
Practical DevOps Architecture
May 11, 2015 · Operations

Configuring L2TP VPN on Huawei Devices

This guide provides a step‑by‑step configuration for setting up an L2TP VPN on Huawei equipment, covering ACL rules, IP pools, user authentication, interface settings, virtual templates, PPP parameters, static routing, and related commands.

HuaweiL2TPNetwork Configuration
0 likes · 2 min read
Configuring L2TP VPN on Huawei Devices