- protect information, systems, and assets while delivering business value
- utilising risk assessments and mitigation strategies
- ability to recover from infrastructure or service failures
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
| # | |
| # mpv configuration file | |
| # | |
| # See the CONFIGURATION FILES section in the man page | |
| # for a detailed description of the syntax. | |
| # | |
| # Profiles should be placed at the bottom of the configuration file to ensure | |
| # that settings wanted as defaults are not restricted to specific profiles. | |
| # | |
| # Note that the commented example options usually do _not_ set the default |
| # vi: ft=dosini | |
| [user] | |
| name = Pavan Kumar Sunkara | |
| email = pavan.sss1991@gmail.com | |
| username = pksunkara | |
| [core] | |
| editor = nvim | |
| whitespace = fix,-indent-with-non-tab,trailing-space,cr-at-eol | |
| pager = delta | |
| [column] |