Home Archive Contact
PDF download
Cite article
Share options
Informations, rights and permissions
Issue image
Vol 7, Issue 1, 2017
Pages: 414 - 421
Review paper
See full issue

INTERNACIONALNI UNIVERZITET TRAVNIK U TRAVNIKU
EKONOMSKI FAKULTET TRAVNIK U TRAVNIKU
PRAVNI FAKULTET TRAVNIK U TRAVNIKU
FAKULTET ZA MEDIJE I KOMUNIKACIJE TRAVNIK U TRAVNIKU

u saradnji sa

MIT UNIVERZITET SKOPLJE, SJEVERNA MAKEDONIJA
VEVU, VELEUČILIŠTE LAVOSLAV RUZIČKA U VUKOVARU, HRVATSKA
VELEUČILIŠTE VIMAL, SISAK, HRVATSKA
CKKPI, TRAVNIK, BOSNA I HERCEGOVINA

organizuju

31. MEĐUNARODNU KONFERENCIJU

EKONOMSKE, PRAVNE I MEDIJSKE INTEGRACIJE BOSNE I HERCEGOVINE I ZEMALJA ZAPADNOG
BALKANA KAO KLJUČNI POKRETAČ EUROPSKIH VRIJEDNOSTI

12. – 13. decembar 2025. godine

Metrics and citations
Abstract views: 2
PDF Downloads: 2
Google scholar: See link
Article content
  1. Abstract
  2. Disclaimer
Received: 14.04.2017. >> Accepted: 28.04.2017. >> Published: 19.05.2017. Review paper

UPOTREBA VPN SERVISA PROTIV HAKERSKE ŠPIJUNAŽE / USE OF VPN SERVICE AGAINST HACKER ESPIONAGE

By
Alem Kozar
Alem Kozar

International University of Travnik , Travnik , Bosnia and Herzegovina

Abstract

Interest in the topic of identity protection on the Internet is constantly gaining in importance, with progressive growth of digital communication and application of the Internet as an information and communication technology in the modern age, the increasing censorship applied by the security agencies, governments of modern states, ISP companies (the legal obligation to retain data user activity), the company operates industrial espionage and marketing companies to determine the target market. There are a number of other organizations and individuals who are motivated diverse interests looking for information that essentially interfere with the privacy of individuals or companies. This paper analyzes the identity protection on the Internet using anonymous networks. By anonymous networks means access to a global network using VPN (Virtual Private Network), web proxy and an anonymous network against hacker espionage. The focus of analysis is on the topography and security to protect the identity provided by the Tor anonymous network.

The statements, opinions and data contained in the journal are solely those of the individual authors and contributors and not of the publisher and the editor(s). We stay neutral with regard to jurisdictional claims in published maps and institutional affiliations.