SlideShare a Scribd company logo
1 of 16
VPN
VIRTUAL PRIVATE NETWORK
What is a VPN?
1. A Virtual Private Network (VPN) is a secure way of connecting to a
private network using the internet or any unsecure public
network to transport the network data packets privately, using
encryption
2. A VPN allows you to connect to the internet anonymously. Various
protocols create a private network that hides your internet traffic
over public Wi-Fi, preventing spying and hacking. In a world
where “online privacy” is becoming the biggest oxymoron of our
time.
How does it work?
1. A VPN works by routing your device’s internet
connection through your chosen VPN’s private
server rather than your internet service provider
(ISP) so that when your data is transmitted to the
internet, it comes from the VPN rather than your
computer.
2. A VPN can be used to send any kind of network
traffic securely, including voice, video, or data.
How does encryption work?
1. Encryption hides information in such a way (basically transforming it to
gibberish) that it cannot be read without a very strong password, which
is known as a key. This key essentially breaks the complicated code
that your data has been turned into. Only your computer and the VPN
server know this key. The process of decoding your data is known as
decryption, which is the process of making encrypted information
readable again through the application of the key.
2. Example: when you enter your credit card details into a website, that
information is encrypted and rendered unreadable until it reaches its
end destination.
Check on learning
1. Q: A VPN can be used to send what kind of internet traffic?
2. A: A VPN can be used to send any kind of network traffic securely, including voice,
video, or data.
3. Q: What is a key?
4. A: A key breaks the complicated code that your data is turned into so that only your
computer and the VPN service provider can read it.
5. Q: What is an ISP?
6. A: Internet Service Provider.
How does it protect you?
1. By disguising your IP address and geographic location
2. It does this by creating a data tunnel from your local ISP and placing you onto the
web from a completely different gateway city or country. Even if your VPN provider
is based in the United States, you can appear to be in places like Canada, Australia,
Germany, Turkey, or even the Bahamas.
3. By encapsulating your internet traffic inside a hidden tunnel
4. A VPN protects your online traffic by encapsulating any data packets you send
inside a secondary, encrypted packet.
5. As your data travels through a private VPN tunnel, it’s scrambled via encryption.
Common encryption includes OpenVPN, PPTP, L2TP/IPSec (Layer 2 Tunneling
Protocol) and IKEv2/IPSec (Internet Key Exchange version 2).
Is it perfect?
1. A VPN is not fool proof method of securing your internet traffic on the internet. Such
downsides include your VPN service can see your IP and what you are doing and if
hacked or owned by someone who wants to find you, they can.
2. They can install malware that is hard to detect and can be installed without you
knowing, which means your info will be leaked from the malware.
3. Your VPN can leak your real IP at times.
4. Clickbait VPN providers.
5. Some companies ban the use of VPN’s
PPTP
1. Point-to-Point Tunneling Protocol (PPTP).
PPTP (Point-to-Point Tunneling Protocol) VPN Encryption: 128-bit
VPN Security: Basic encryption
VPN Speed: Fast due to the low encryption rate
Stability: Very good and stable on most Wi-Fi networks
Compatibility: Most computer, tablet, and mobile operating systems come with PPTP
Least secure method. Developed by Microsoft but not used by them, been compromised before.
L2TP/IPsec
1. Layer 2 Tunneling Protocol/ Internet protocol security
L2TP/IPsec (Layer 2 Tunneling Protocol over Internet Protocol Security) VPN Encryption: 256-bit
VPN Security: Highest encryption. This protocol encapsulates and checks data integrity
twice.
VPN Speed: Requires more processing power because of the 2x encapsulation
Stability: Stable on NAT-supported devices
Compatibility: Like PPTP, it is included in most device operating systems
A good VPN solution for non-critical use. However this protocol has been compromised
before. Nevertheless, it remains a good protocol, particularly for mobile phones.
OpenVPN
1. VPN Encryption: 160-bit and 256-bit
VPN Security: OpenVPN provides the highest encryption. OpenVPN authenticates the data
with digital certificates and is the most secure VPN protocol.
VPN Speed: This protocol has the best performance. Speeds are fast and are not susceptible
to high latency connections or long-distance transfers. Is your network connection stable and
provide the right speeds?
Stability: Most reliable and stable, even behind wireless routers, on non-reliable networks and
on Wi-Fi.
Compatibility: OpenVPN is supported by most desktop operating systems, Android mobile and
tablet devices.
Across the IT world, OpenVPN is the best all around VPN solution. One downside could be
the need for third party software on all platforms. May require IT to help set up if not familiar
with VPN’s.
SSTP
1. Secure Socket Tunneling Protocol
VPN Encryption: 256-bit
VPN Security: Highest encryption. SSTP depends on cipher, but usually very strong AES
VPN Speed: Speeds are fast and can bypass most firewalls
Stability: This protocol is very stable and reliable.
Compatibility: SSTP is primarily used in a Windows only environment, but is available for
Linux, RouterOS and SEIL. Because it is a proprietary protocol owned by Microsoft, it
cannot be independently audited for backdoors.
SSTP offers most of the advantages of OpenVPN; however, it is mostly limited to a
windows environment.
Conclusion
1. A VPN is a good method for protecting yourself online and maintaining online security.
2. Different VPN providers and protocols offer different things and it is always a good idea to do
your own research.
3. Especially overseas, the use of a VPN to protect yourself against hackers and other threats is
something to consider.
4. Back home, the use of a VPN over public Wi-Fi will protect you and your information.
5. They are relatively inexpensive, NordVPN offers 1 year of coverage at $83.88.
Questions?

More Related Content

Similar to VPN.pptx

Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefitsAnthony Daniel
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfAceAtigaVallo
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 

Similar to VPN.pptx (20)

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Virtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdfVirtual private network chapter 1 PSU.pdf
Virtual private network chapter 1 PSU.pdf
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
The vpn
The vpnThe vpn
The vpn
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Vpn security
Vpn security Vpn security
Vpn security
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 
All About VPN
All About VPNAll About VPN
All About VPN
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
Allaboutvpn
AllaboutvpnAllaboutvpn
Allaboutvpn
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

VPN.pptx

  • 2. What is a VPN? 1. A Virtual Private Network (VPN) is a secure way of connecting to a private network using the internet or any unsecure public network to transport the network data packets privately, using encryption 2. A VPN allows you to connect to the internet anonymously. Various protocols create a private network that hides your internet traffic over public Wi-Fi, preventing spying and hacking. In a world where “online privacy” is becoming the biggest oxymoron of our time.
  • 3. How does it work? 1. A VPN works by routing your device’s internet connection through your chosen VPN’s private server rather than your internet service provider (ISP) so that when your data is transmitted to the internet, it comes from the VPN rather than your computer. 2. A VPN can be used to send any kind of network traffic securely, including voice, video, or data.
  • 4.
  • 5.
  • 6. How does encryption work? 1. Encryption hides information in such a way (basically transforming it to gibberish) that it cannot be read without a very strong password, which is known as a key. This key essentially breaks the complicated code that your data has been turned into. Only your computer and the VPN server know this key. The process of decoding your data is known as decryption, which is the process of making encrypted information readable again through the application of the key. 2. Example: when you enter your credit card details into a website, that information is encrypted and rendered unreadable until it reaches its end destination.
  • 7.
  • 8. Check on learning 1. Q: A VPN can be used to send what kind of internet traffic? 2. A: A VPN can be used to send any kind of network traffic securely, including voice, video, or data. 3. Q: What is a key? 4. A: A key breaks the complicated code that your data is turned into so that only your computer and the VPN service provider can read it. 5. Q: What is an ISP? 6. A: Internet Service Provider.
  • 9. How does it protect you? 1. By disguising your IP address and geographic location 2. It does this by creating a data tunnel from your local ISP and placing you onto the web from a completely different gateway city or country. Even if your VPN provider is based in the United States, you can appear to be in places like Canada, Australia, Germany, Turkey, or even the Bahamas. 3. By encapsulating your internet traffic inside a hidden tunnel 4. A VPN protects your online traffic by encapsulating any data packets you send inside a secondary, encrypted packet. 5. As your data travels through a private VPN tunnel, it’s scrambled via encryption. Common encryption includes OpenVPN, PPTP, L2TP/IPSec (Layer 2 Tunneling Protocol) and IKEv2/IPSec (Internet Key Exchange version 2).
  • 10. Is it perfect? 1. A VPN is not fool proof method of securing your internet traffic on the internet. Such downsides include your VPN service can see your IP and what you are doing and if hacked or owned by someone who wants to find you, they can. 2. They can install malware that is hard to detect and can be installed without you knowing, which means your info will be leaked from the malware. 3. Your VPN can leak your real IP at times. 4. Clickbait VPN providers. 5. Some companies ban the use of VPN’s
  • 11. PPTP 1. Point-to-Point Tunneling Protocol (PPTP). PPTP (Point-to-Point Tunneling Protocol) VPN Encryption: 128-bit VPN Security: Basic encryption VPN Speed: Fast due to the low encryption rate Stability: Very good and stable on most Wi-Fi networks Compatibility: Most computer, tablet, and mobile operating systems come with PPTP Least secure method. Developed by Microsoft but not used by them, been compromised before.
  • 12. L2TP/IPsec 1. Layer 2 Tunneling Protocol/ Internet protocol security L2TP/IPsec (Layer 2 Tunneling Protocol over Internet Protocol Security) VPN Encryption: 256-bit VPN Security: Highest encryption. This protocol encapsulates and checks data integrity twice. VPN Speed: Requires more processing power because of the 2x encapsulation Stability: Stable on NAT-supported devices Compatibility: Like PPTP, it is included in most device operating systems A good VPN solution for non-critical use. However this protocol has been compromised before. Nevertheless, it remains a good protocol, particularly for mobile phones.
  • 13. OpenVPN 1. VPN Encryption: 160-bit and 256-bit VPN Security: OpenVPN provides the highest encryption. OpenVPN authenticates the data with digital certificates and is the most secure VPN protocol. VPN Speed: This protocol has the best performance. Speeds are fast and are not susceptible to high latency connections or long-distance transfers. Is your network connection stable and provide the right speeds? Stability: Most reliable and stable, even behind wireless routers, on non-reliable networks and on Wi-Fi. Compatibility: OpenVPN is supported by most desktop operating systems, Android mobile and tablet devices. Across the IT world, OpenVPN is the best all around VPN solution. One downside could be the need for third party software on all platforms. May require IT to help set up if not familiar with VPN’s.
  • 14. SSTP 1. Secure Socket Tunneling Protocol VPN Encryption: 256-bit VPN Security: Highest encryption. SSTP depends on cipher, but usually very strong AES VPN Speed: Speeds are fast and can bypass most firewalls Stability: This protocol is very stable and reliable. Compatibility: SSTP is primarily used in a Windows only environment, but is available for Linux, RouterOS and SEIL. Because it is a proprietary protocol owned by Microsoft, it cannot be independently audited for backdoors. SSTP offers most of the advantages of OpenVPN; however, it is mostly limited to a windows environment.
  • 15. Conclusion 1. A VPN is a good method for protecting yourself online and maintaining online security. 2. Different VPN providers and protocols offer different things and it is always a good idea to do your own research. 3. Especially overseas, the use of a VPN to protect yourself against hackers and other threats is something to consider. 4. Back home, the use of a VPN over public Wi-Fi will protect you and your information. 5. They are relatively inexpensive, NordVPN offers 1 year of coverage at $83.88.