This is because the VPN is hidden from the rest of the world. It is conceivable that an organization can use a few IP addresses assigned to them by their Internet Service Provider (ISP) and create a large network with arbitrary IP address. This is achieved by setting the VPN on both networks and establishing an encrypted tunnel by using cryptographic authentication. . When a computer sends data to another computer on the other end of the VPN it is first a private or public key would then be agreed upon and then the data is encrypted. After that it is encapsulated within a packet and sent to the router of the other network. There the header is stripped off and the data is unencrypted and passed to the computer it was addressed to. At no time are the contents of the data readable to any computer on the Internet. If it where intercepted it could not be read because of the encryption. There are however some security risks that come with this connivance. A firewall with packet filtering, that rejects unknown hosts, is a must to provide security. Secure all remote hosts. It is also advisable to use a single ISP and use a secure network operating system.With the number of IP addresses running out and companies are always trying to save costs. A VPN solution provides an effective and secure method of connecting local area and wide area networks for less traditional methods. This allows for companies and organizations to share resources without having to consolidate locations....