The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.
The design of the interior spaces process the product of intellectual civilization expresses the prevailing thought, discoverers of principles and beliefs through the sheen reflects the present, and generating languages graphical variety caused a different revolution in design mounting structure, and because of the complex nature of the interior spaces were and we have to be a reflection of cultural reality of being a form of cultural expression and true embodiment of scientific developments prevailing for each stage where she was born, the changes occurring in human thought and then extremism and the discrepancy tastes among individuals all communities factors have caused a change in the design structure involving modernization an
... Show MoreThe ultimate goal of any sale contract is to maximize the combined returns of the parties, knowing that these returns are not realized (in long-term contracts) except in the final stages of the contract. Therefore, this requires the parties to the contract to leave some elements open, including the price, because the adoption of a fixed price and inflexible will not be appropriate to meet their desires when contracting, especially with ignorance of matters beyond their will and may affect the market conditions, and the possibility of modifying the fixed price through The elimination is very limited, especially when the parties to the contract are equally in terms of economic strength. Hence, in order to respond to market uncertainties, the
... Show MoreCsaszar introduced the concept of generalized topological space and a new open set in a generalized topological space called -preopen in 2002 and 2005, respectively. Definitions of -preinterior and -preclosuer were given. Successively, several studies have appeared to give many generalizations for an open set. The object of our paper is to give a new type of generalization of an open set in a generalized topological space called -semi-p-open set. We present the definition of this set with its equivalent. We give definitions of -semi-p-interior and -semi-p-closure of a set and discuss their properties. Also the properties of -preinterior and -preclosuer are discussed. In addition, we give a new type of continuous function
... Show MoreWitnessing human societies with the turn of the century atheist twenty huge revolution in information , the result of scientific and technological developments rapidly in space science and communications , and that made the whole world is like a small village not linked by road as it was in ancient times, through the rapid transportation as was the case a few years ago , thanks to the remote sensing devices that roam in space observant everything on the ground , that the information networks that overflowed the world a tremendous amount of information provided for each inhabitants of the earth , which made this information requirement for human life and human survival and well-being , as it has allowed that information to humans opportun
... Show MoreThe investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o
... Show MoreThe attention of civil society organizations, governments and international non-governmental organizations in recent years has focused on the acute practices adopted by companies with the aim of reducing the tax burden, and the results of these practices have a negative impact on the tax revenues that the state uses to finance public needsThe aim of the research is to measure the impact of the voluntary disclosure of companies on tax planning for the period from 2011 to 2015 and the research community is in the General Tax Authority. The research sample is 6 companies within the private sector in the financial, banking, insurance and industrial fields. The research was based on a special model to measure the optional disclosure,
... Show MoreCorrosion experiments were carried out to investigate the effect of several operating parameters on the corrosion rate and corrosion potential of carbon steel in turbulent flow conditions in the absence and presence of sodium benzoate inhibitor using electrochemical polarization technique. These parameters were rotational velocity (0 - 1.57 m/s), temperature (30oC – 50oC), and time. The effect of these parameters on the corrosion rate and inhibition efficiency were investigated and discussed. It was found that the corrosion rate represented by limiting current increases considerably with increasing velocity and temperature and that it decreased with time due to the formation of corrosion product layer. The corrosion potential shifted t
... Show MoreThe real estate prices in the Iraqi market have witnessed a significant increase in the prices of residential units, including land plots and residential buildings, especially after the approval of the new exchange rate and the provision of financial loans to employees and citizens. Therefore, real estate loans are considered one of the financing tools in the housing sector, whether these loans are directed towards the construction of new housing or the rehabilitation of existing buildings for housing. The housing market is an important component of the economic and social system, as housing is a commodity that is influenced by supply, demand, and the trade of materials involved in housing unit production. The housing system is also
... Show MoreBreak in the bond and its impact on the difference of scholars