V.P.N and Proxy
Servers
Presented by: Eissa Abdullah AL-
Owayied
Instructor: Muhammad AL-Jawarneh
We Will focus more on these following
Servers:
 V.P.N
 Proxy
What is V.P.N?.
V.P.N is an acronym for “Virtual Private
Network”.
‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬
V.P.N enables computers to Send/Receive
data across shared in public networks(with
Security and Encryption) as if it were
directly connected to the private network.
Example of a simple V.P.N
connection
Saudi Arabia
United States
Saudi Arabia
United States
When hacker
attacks, V.P.N
finds another
path
Anything else?...
V.P.N Supports sending data to different
computers, with privacy and security, Sending
data through V.P.N Tunnel, and when Hacker
attacks, it find another way and build tunnel
with it. If hacker somehow stole the file, it
would be useless because the file will be
encrypted .
V.P.N is a Client/Server Software and Hardware
technology, there are different brands, and they
don’t necessarily connect to each other.
Client
Client
Client
An example of V.P.N
Server used inside
global organization
V.P.N ServerServer Host
ClientAn example of V.P.N
Server used between 2
individuals
V.P.N Server
What is may be bad?.
 If you have a slow connection speed,
it would be a terrible performance for
send/receive data for all clients.
 Some I.S.P providers in different
countries, didn’t change the outdated
Wires cables for internet users, So
V.P.N will shutdown everytime,
thinking that it might be a hacker
attack.
Proxy Server
)‫الوكيل‬ ‫الخادم‬)
What is Web Proxy Server?.
 A computer network service that allows
clients to make indirect network
connections to other network services.
 Proxy is used for many purposes, like
hacking, spamming, surfing blocked
websites, remove surfing surveillance,
Connecting secretly to outside computers
connecting Local computers to the
internet(In old days) and many other
things.
IP Address:
1.1.1.1
Blocked
Proxy servers
IP Address:
1.1.1.1
IP Address:
2.2.2.2
Proxy servers: multiple
connection for safety
IP Address:
3.3.3.3
IP Address:
2.2.2.2
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Proxy servers: multiple
connection for safety
+ V.P.N Server
IP Address:
3.3.3.3
V.P.N Server
IP Address:
1.1.1.1
IP Address:
4.4.4.4
IP Address:
5.5.5.5
Anything else?...
You can connect to a Web proxy server
by either using applications, web
browsers, website proxies and etc.
Web Proxy and V.P.N can be used both
for safety, encryption and protection.
What is be bad?.
 Web proxies can slow connection speed
performance, due to the distance
between the client and proxy servers.
 always cause a threat to internet
websites. Governments try to indices
hackers by tracking them back to proxy
servers.
 Proxy server providers can easily steal
client’s information, and send malicious
viruses back to their devices, so it’s
important to use firewall and V.P.N
Servers for your protection.
Thank you…

V.P.N And Proxy server

  • 1.
    V.P.N and Proxy Servers Presentedby: Eissa Abdullah AL- Owayied Instructor: Muhammad AL-Jawarneh
  • 2.
    We Will focusmore on these following Servers:  V.P.N  Proxy
  • 3.
    What is V.P.N?. V.P.Nis an acronym for “Virtual Private Network”. ‫الخاصة‬ ‫االفتراضية‬ ‫الشبكة‬ V.P.N enables computers to Send/Receive data across shared in public networks(with Security and Encryption) as if it were directly connected to the private network.
  • 4.
    Example of asimple V.P.N connection
  • 5.
  • 6.
    Saudi Arabia United States Whenhacker attacks, V.P.N finds another path
  • 7.
    Anything else?... V.P.N Supportssending data to different computers, with privacy and security, Sending data through V.P.N Tunnel, and when Hacker attacks, it find another way and build tunnel with it. If hacker somehow stole the file, it would be useless because the file will be encrypted . V.P.N is a Client/Server Software and Hardware technology, there are different brands, and they don’t necessarily connect to each other.
  • 8.
    Client Client Client An example ofV.P.N Server used inside global organization V.P.N ServerServer Host
  • 9.
    ClientAn example ofV.P.N Server used between 2 individuals V.P.N Server
  • 10.
    What is maybe bad?.  If you have a slow connection speed, it would be a terrible performance for send/receive data for all clients.  Some I.S.P providers in different countries, didn’t change the outdated Wires cables for internet users, So V.P.N will shutdown everytime, thinking that it might be a hacker attack.
  • 11.
  • 12.
    What is WebProxy Server?.  A computer network service that allows clients to make indirect network connections to other network services.  Proxy is used for many purposes, like hacking, spamming, surfing blocked websites, remove surfing surveillance, Connecting secretly to outside computers connecting Local computers to the internet(In old days) and many other things.
  • 13.
  • 14.
  • 15.
    Proxy servers: multiple connectionfor safety IP Address: 3.3.3.3 IP Address: 2.2.2.2 IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 16.
    Proxy servers: multiple connectionfor safety + V.P.N Server IP Address: 3.3.3.3 V.P.N Server IP Address: 1.1.1.1 IP Address: 4.4.4.4 IP Address: 5.5.5.5
  • 17.
    Anything else?... You canconnect to a Web proxy server by either using applications, web browsers, website proxies and etc. Web Proxy and V.P.N can be used both for safety, encryption and protection.
  • 18.
    What is bebad?.  Web proxies can slow connection speed performance, due to the distance between the client and proxy servers.  always cause a threat to internet websites. Governments try to indices hackers by tracking them back to proxy servers.  Proxy server providers can easily steal client’s information, and send malicious viruses back to their devices, so it’s important to use firewall and V.P.N Servers for your protection.
  • 19.