SlideShare a Scribd company logo
1 of 19
V.P.N and Proxy
Servers
Presented by: Eissa Abdullah AL-
Owayied
Instructor: Muhammad AL-Jawarneh
We Will focus more on these following
Servers:
 V.P.N
 Proxy
What is V.P.N?.
V.P.N is an acronym for “Virtual Private
Network”.
‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬
V.P.N enables computers to Send/Receive
data across shared in public networks(with
Security and Encryption) as if it were
directly connected to the private network.
Example of a simple V.P.N
connection
Saudi Arabia
United States
Saudi Arabia
United States
When hacker
attacks, V.P.N
finds another
path
Anything else?...
V.P.N Supports sending data to different
computers, with privacy and security, Sending
data through V.P.N Tunnel, and when Hacker
attacks, it find another way and build tunnel
with it. If hacker somehow stole the file, it
would be useless because the file will be
encrypted .
V.P.N is a Client/Server Software and Hardware
technology, there are different brands, and they
don’t necessarily connect to each other.
Client
Client
Client
An example of V.P.N
Server used inside
global organization
V.P.N ServerServer Host
ClientAn example of V.P.N
Server used between 2
individuals
V.P.N Server
What is may be bad?.
 If you have a slow connection speed,
it would be a terrible performance for
send/receive data for all clients.
 Some I.S.P providers in different
countries, didn’t change the outdated
Wires cables for internet users, So
V.P.N will shutdown everytime,
thinking that it might be a hacker
attack.
Proxy Server
)‫الوكيل‬ ‫الخادم‬)
What is Web Proxy Server?.
 A computer network service that allows
clients to make indirect network
connections to other network services.
 Proxy is used for many purposes, like
hacking, spamming, surfing blocked
websites, remove surfing surveillance,
Connecting secretly to outside computers
connecting Local computers to the
internet(In old days) and many other
things.
IP Address:
1.1.1.1
Blocked
Proxy servers
IP Address:
1.1.1.1
IP Address:
2.2.2.2
Proxy servers: multiple
connection for safety
IP Address:
3.3.3.3
IP Address:
2.2.2.2
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Proxy servers: multiple
connection for safety
+ V.P.N Server
IP Address:
3.3.3.3
V.P.N Server
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Anything else?...
You can connect to a Web proxy server
by either using applications, web
browsers, website proxies and etc.
Web Proxy and V.P.N can be used both
for safety, encryption and protection.
What is be bad?.
 Web proxies can slow connection speed
performance, due to the distance
between the client and proxy servers.
 always cause a threat to internet
websites. Governments try to indices
hackers by tracking them back to proxy
servers.
 Proxy server providers can easily steal
client’s information, and send malicious
viruses back to their devices, so it’s
important to use firewall and V.P.N
Servers for your protection.
Thank you…

More Related Content

What's hot

Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Common Factor Attack on RSA
Common Factor Attack on RSACommon Factor Attack on RSA
Common Factor Attack on RSAVineet Kumar
 
Active directory
Active directory Active directory
Active directory deshvikas
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learningsecurityxploded
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free downloadTwinkal Harsora
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonSSIMeetup
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Hacking
HackingHacking
Hacking
 
Common Factor Attack on RSA
Common Factor Attack on RSACommon Factor Attack on RSA
Common Factor Attack on RSA
 
Active directory
Active directory Active directory
Active directory
 
Pgp
PgpPgp
Pgp
 
Cryptography
CryptographyCryptography
Cryptography
 
Malicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine LearningMalicious Url Detection Using Machine Learning
Malicious Url Detection Using Machine Learning
 
cryptography ppt free download
cryptography ppt free downloadcryptography ppt free download
cryptography ppt free download
 
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare NelsonZero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Phishing
PhishingPhishing
Phishing
 
Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 

Similar to V.P.N And Proxy server

Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideHTS Hosting
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censureARVINDR37
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Networkadeelahmed0345
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentationAmjad Bhutto
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurityJayaMishra170943
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?FredReynolds2
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
VPN presentation
VPN presentationVPN presentation
VPN presentationRiazehri
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationProxies Rent
 
2 secure systems design
2   secure systems design2   secure systems design
2 secure systems designdrewz lin
 

Similar to V.P.N And Proxy server (20)

Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Proxy servers-firewalls
Proxy servers-firewallsProxy servers-firewalls
Proxy servers-firewalls
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censure
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private network, vpn presentation
Virtual private network, vpn presentationVirtual private network, vpn presentation
Virtual private network, vpn presentation
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
The vpn
The vpnThe vpn
The vpn
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Squid server
Squid serverSquid server
Squid server
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
VPN presentation
VPN presentationVPN presentation
VPN presentation
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
 
2 secure systems design
2   secure systems design2   secure systems design
2 secure systems design
 
VPN.pptx
VPN.pptxVPN.pptx
VPN.pptx
 

V.P.N And Proxy server

  • 1. V.P.N and Proxy Servers Presented by: Eissa Abdullah AL- Owayied Instructor: Muhammad AL-Jawarneh
  • 2. We Will focus more on these following Servers:  V.P.N  Proxy
  • 3. What is V.P.N?. V.P.N is an acronym for “Virtual Private Network”. ‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬ V.P.N enables computers to Send/Receive data across shared in public networks(with Security and Encryption) as if it were directly connected to the private network.
  • 4. Example of a simple V.P.N connection
  • 6. Saudi Arabia United States When hacker attacks, V.P.N finds another path
  • 7. Anything else?... V.P.N Supports sending data to different computers, with privacy and security, Sending data through V.P.N Tunnel, and when Hacker attacks, it find another way and build tunnel with it. If hacker somehow stole the file, it would be useless because the file will be encrypted . V.P.N is a Client/Server Software and Hardware technology, there are different brands, and they don’t necessarily connect to each other.
  • 8. Client Client Client An example of V.P.N Server used inside global organization V.P.N ServerServer Host
  • 9. ClientAn example of V.P.N Server used between 2 individuals V.P.N Server
  • 10. What is may be bad?.  If you have a slow connection speed, it would be a terrible performance for send/receive data for all clients.  Some I.S.P providers in different countries, didn’t change the outdated Wires cables for internet users, So V.P.N will shutdown everytime, thinking that it might be a hacker attack.
  • 12. What is Web Proxy Server?.  A computer network service that allows clients to make indirect network connections to other network services.  Proxy is used for many purposes, like hacking, spamming, surfing blocked websites, remove surfing surveillance, Connecting secretly to outside computers connecting Local computers to the internet(In old days) and many other things.
  • 15. Proxy servers: multiple connection for safety IP Address: 3.3.3.3 IP Address: 2.2.2.2 IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 16. Proxy servers: multiple connection for safety + V.P.N Server IP Address: 3.3.3.3 V.P.N Server IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 17. Anything else?... You can connect to a Web proxy server by either using applications, web browsers, website proxies and etc. Web Proxy and V.P.N can be used both for safety, encryption and protection.
  • 18. What is be bad?.  Web proxies can slow connection speed performance, due to the distance between the client and proxy servers.  always cause a threat to internet websites. Governments try to indices hackers by tracking them back to proxy servers.  Proxy server providers can easily steal client’s information, and send malicious viruses back to their devices, so it’s important to use firewall and V.P.N Servers for your protection.