SlideShare a Scribd company logo
VPN
Humza Sajid
VIRTUAL
PRIVATE
NETWORK
HOW A VPN WORKS?
A VPN hides your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. This means that if you
surf online with a VPN, the VPN server becomes the source of your data.
This means your Internet Service Provider (ISP) and other third parties
cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even
if someone were to get their hands on your data, it would be useless.
THE HISTORY OF VPNS
Since humans have been using the internet, there has been a movement to
protect and encrypt internet browser data. The US Department of Defense
already got involved in projects working on the encryption of internet
communication data back in the 1960s.
In 1993, a team from Columbia University and AT&T Bell Labs finally
succeeded in creating a kind of first version of the modern VPN, known as
swIPe: Software IP encryption protocol.
In 1996, a Microsoft employee named Gurdeep Singh-Pall created a Peer-to-
Peer Tunneling Protocol (PPTP).
EARLY VPNS
The first VPNs started in the early 2000s, but were almost exclusively used
by companies. However, after a flood of security breaches, especially in the
early 2010s, the consumer market for VPNs started to pick up.
VPNS AND THEIR CURRENT USE
According to the GlobalWebIndex, the number of VPN users worldwide
increased more than fourfold between 2016 and 2018. In countries such as
Thailand, Indonesia and China, where internet use is restricted and
censored, one in five internet users uses a VPN. In the USA, Great Britain
and Germany, the proportion of VPN users is lower at around 5%, but is
growing.
One of the biggest drivers for VPN adoption in recent years has been the
increasing demand for content with geographical access restrictions(Netflix).
WHAT KIND OF VPNS ARE THERE?
Remote Access VPN : Remote access VPN is established when a single
device connects to a remote network. This is probably the case for most
VPN home users. We download VPN software on our smartphones or
computers, log in with our credentials, and select a VPN server to connect.
Remote access VPN can also benefit company employees who need access
to company resources when working at home.
Site-To-Site VPN : Site-to-site VPN is common for companies that have
offices in different geographical locations. It connects a network of one office
to a network of another, which allows two different offices to share private
resources securely over the internet. Site-to-site VPN largely differentiates
itself from remote access VPN in that it creates a private link between two
different networks instead of a single device and a network.
VPN PROTOCOLS
OpenVPN — OpenVPN remains the most popular and most secure VPN protocol
that is used on all types of different devices. OpenVPN is an open-source project
developed for multiple types of authentication methods. It is a very versatile
protocol that can be used on many different devices, with a variety of features, and
over any port with UDP or TCP. OpenVPN offers excellent performance and strong
encryption using the OpenSSL library and TLS protocols.
•IKEv2/IPSec — Internet Protocol Security with Internet Key Exchange version 2 is
a fast and secure VPN protocol. It is automatically pre-configured in many
operating systems, such as Windows, Mac OS, and iOS. It works very well for re-
establishing a connection, especially with mobile devices. The one downside is that
IKEv2 was developed by Cisco and Microsoft and is not an open-source project,
like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast,
light-weight VPN that is secure and can quickly reconnect if the connection is
temporarily lost.
• WireGuard — WireGuard is a new and experimental protocol that aims to offer
improved security and better performance in comparison to existing VPN protocols.
While it remains under active development and has not yet been audited, there are
a few VPN providers supporting it for testing purposes only.
Each VPN protocol has its own pros and cons. OpenVPN is the most popular
and widely-recommended, because it is secure, open-source, and also offers
good performance. But it also requires the use of third-party apps.
L2TP/IKEv2 is also a secure protocol with excellent performance and it can
be used natively on most operating systems (no apps required) — but it’s not
open source.
HOW DO I INSTALL A VPN ON MY
COMPUTER?
VPN client:
Software must be installed for standalone VPN clients. This software is configured to
meet the requirements of the endpoint.
Browser extensions
VPN extensions can be added to most web browsers such as Google Chrome and
Firefox. Some browsers, including Opera, even have their own integrated VPN
extensions.
Router VPN
If multiple devices are connected to the same internet connection, it may be easier to
implement the VPN directly on the router than to install a separate VPN on each device.
A router VPN is especially useful if you want to protect devices with an internet
connection that are not easy to configure, such as smart TVs.
WHY A VPN IS NECESSARY FOR
ONLINE PRIVACY
When using a VPN, your internet provider can only see that you’re online
and connected to a VPN server. That’s it. Your information is encrypted and
secured, which makes it unreadable to third parties.
With a VPN, public WiFi hotspots are once again safe to use, thanks to
secure encryption that protects your data. Using public WiFi without a VPN is
risky because hackers can exploit public wireless to steal your identity, credit
cards, bank accounts, passwords, etc. A VPN will encrypt and protect this
data from third parties and hackers.
WHAT SHOULD A GOOD VPN DO?
•Encryption of your IP address: The primary job of a VPN is to hide your IP address
from your ISP and other third parties. This allows you to send and receive
information online without the risk of anyone but you and the VPN provider seeing it.
•Encryption of protocols: A VPN should also prevent you from leaving traces, for
example, in the form of your internet history, search history and cookies. The
encryption of cookies is especially important because it prevents third parties from
gaining access to confidential information such as personal data, financial
information and other content on websites.
•Kill switch: If your VPN connection is suddenly interrupted, your secure connection
will also be interrupted. A good VPN can detect this sudden downtime and terminate
preselected programs, reducing the likelihood that data is compromised.
•Two-factor authentication: By using a variety of authentication methods, a strong
VPN checks everyone who tries to log in. For example, you might be prompted to
enter a password, after which a code is sent to your mobile device. This makes it
difficult for uninvited third parties to access your secure connection.
WILL A VPN MAKE ME 100%
ANONYMOUS?
Yes and no. VPNs are safe depending on who is running the server. If the
owner of the VPN logs your data/info and the connection is not encrypted,
then it is not safe and could leave you exposed.
If the owner of the VPN has a secure and encrypted connection and does
not log at all, it is pretty safe.
To be safe, I suggest getting a premium paid VPN.

More Related Content

Similar to VPN In Details

Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
Binod Poudel
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Mariana Hansen
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
Harshika Rana
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
Farah M. Altufaili
 
Vpn
VpnVpn
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private NetworkAbhinav Dwivedi
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
Bluechip Gulf IT Services
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
ssusera1b6c7
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
Abrish06
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?
FredReynolds2
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
Nord VPN.pdf
Nord VPN.pdfNord VPN.pdf
Nord VPN.pdf
Vograce
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
faizasoftic
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censure
ARVINDR37
 

Similar to VPN In Details (20)

Presentation on VPN
Presentation on VPNPresentation on VPN
Presentation on VPN
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
The vpn
The vpnThe vpn
The vpn
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Vpn
VpnVpn
Vpn
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Nord VPN.pdf
Nord VPN.pdfNord VPN.pdf
Nord VPN.pdf
 
Untitled document (4).pdf
Untitled document (4).pdfUntitled document (4).pdf
Untitled document (4).pdf
 
Contourner la censure
Contourner la censureContourner la censure
Contourner la censure
 

More from Humza Sajid

Diving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of PakistanDiving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of Pakistan
Humza Sajid
 
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptxSmart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Humza Sajid
 
Web_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp OrientationWeb_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp Orientation
Humza Sajid
 
Design For Developer | Useability Engineering
Design For Developer | Useability EngineeringDesign For Developer | Useability Engineering
Design For Developer | Useability Engineering
Humza Sajid
 
LSTM-Long short-term memory slide
LSTM-Long short-term memory slideLSTM-Long short-term memory slide
LSTM-Long short-term memory slide
Humza Sajid
 
What Is IEEE?
What Is IEEE?What Is IEEE?
What Is IEEE?
Humza Sajid
 
Competition In Sociology
Competition In SociologyCompetition In Sociology
Competition In Sociology
Humza Sajid
 

More from Humza Sajid (7)

Diving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of PakistanDiving Into Tech Industry Of Pakistan
Diving Into Tech Industry Of Pakistan
 
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptxSmart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
Smart Cruiter FYP - KUST - KUST FYP - MERN FYP - Humza Sajid .pptx
 
Web_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp OrientationWeb_ FrontEnd Development BootCamp Orientation
Web_ FrontEnd Development BootCamp Orientation
 
Design For Developer | Useability Engineering
Design For Developer | Useability EngineeringDesign For Developer | Useability Engineering
Design For Developer | Useability Engineering
 
LSTM-Long short-term memory slide
LSTM-Long short-term memory slideLSTM-Long short-term memory slide
LSTM-Long short-term memory slide
 
What Is IEEE?
What Is IEEE?What Is IEEE?
What Is IEEE?
 
Competition In Sociology
Competition In SociologyCompetition In Sociology
Competition In Sociology
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

VPN In Details

  • 2. HOW A VPN WORKS? A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your data, it would be useless.
  • 3. THE HISTORY OF VPNS Since humans have been using the internet, there has been a movement to protect and encrypt internet browser data. The US Department of Defense already got involved in projects working on the encryption of internet communication data back in the 1960s. In 1993, a team from Columbia University and AT&T Bell Labs finally succeeded in creating a kind of first version of the modern VPN, known as swIPe: Software IP encryption protocol. In 1996, a Microsoft employee named Gurdeep Singh-Pall created a Peer-to- Peer Tunneling Protocol (PPTP).
  • 4. EARLY VPNS The first VPNs started in the early 2000s, but were almost exclusively used by companies. However, after a flood of security breaches, especially in the early 2010s, the consumer market for VPNs started to pick up.
  • 5. VPNS AND THEIR CURRENT USE According to the GlobalWebIndex, the number of VPN users worldwide increased more than fourfold between 2016 and 2018. In countries such as Thailand, Indonesia and China, where internet use is restricted and censored, one in five internet users uses a VPN. In the USA, Great Britain and Germany, the proportion of VPN users is lower at around 5%, but is growing. One of the biggest drivers for VPN adoption in recent years has been the increasing demand for content with geographical access restrictions(Netflix).
  • 6. WHAT KIND OF VPNS ARE THERE? Remote Access VPN : Remote access VPN is established when a single device connects to a remote network. This is probably the case for most VPN home users. We download VPN software on our smartphones or computers, log in with our credentials, and select a VPN server to connect. Remote access VPN can also benefit company employees who need access to company resources when working at home. Site-To-Site VPN : Site-to-site VPN is common for companies that have offices in different geographical locations. It connects a network of one office to a network of another, which allows two different offices to share private resources securely over the internet. Site-to-site VPN largely differentiates itself from remote access VPN in that it creates a private link between two different networks instead of a single device and a network.
  • 7. VPN PROTOCOLS OpenVPN — OpenVPN remains the most popular and most secure VPN protocol that is used on all types of different devices. OpenVPN is an open-source project developed for multiple types of authentication methods. It is a very versatile protocol that can be used on many different devices, with a variety of features, and over any port with UDP or TCP. OpenVPN offers excellent performance and strong encryption using the OpenSSL library and TLS protocols. •IKEv2/IPSec — Internet Protocol Security with Internet Key Exchange version 2 is a fast and secure VPN protocol. It is automatically pre-configured in many operating systems, such as Windows, Mac OS, and iOS. It works very well for re- establishing a connection, especially with mobile devices. The one downside is that IKEv2 was developed by Cisco and Microsoft and is not an open-source project, like OpenVPN. IKEv2/IPSec is a great choice for mobile users who want a fast, light-weight VPN that is secure and can quickly reconnect if the connection is temporarily lost. • WireGuard — WireGuard is a new and experimental protocol that aims to offer improved security and better performance in comparison to existing VPN protocols. While it remains under active development and has not yet been audited, there are a few VPN providers supporting it for testing purposes only.
  • 8. Each VPN protocol has its own pros and cons. OpenVPN is the most popular and widely-recommended, because it is secure, open-source, and also offers good performance. But it also requires the use of third-party apps. L2TP/IKEv2 is also a secure protocol with excellent performance and it can be used natively on most operating systems (no apps required) — but it’s not open source.
  • 9. HOW DO I INSTALL A VPN ON MY COMPUTER? VPN client: Software must be installed for standalone VPN clients. This software is configured to meet the requirements of the endpoint. Browser extensions VPN extensions can be added to most web browsers such as Google Chrome and Firefox. Some browsers, including Opera, even have their own integrated VPN extensions. Router VPN If multiple devices are connected to the same internet connection, it may be easier to implement the VPN directly on the router than to install a separate VPN on each device. A router VPN is especially useful if you want to protect devices with an internet connection that are not easy to configure, such as smart TVs.
  • 10. WHY A VPN IS NECESSARY FOR ONLINE PRIVACY When using a VPN, your internet provider can only see that you’re online and connected to a VPN server. That’s it. Your information is encrypted and secured, which makes it unreadable to third parties. With a VPN, public WiFi hotspots are once again safe to use, thanks to secure encryption that protects your data. Using public WiFi without a VPN is risky because hackers can exploit public wireless to steal your identity, credit cards, bank accounts, passwords, etc. A VPN will encrypt and protect this data from third parties and hackers.
  • 11. WHAT SHOULD A GOOD VPN DO? •Encryption of your IP address: The primary job of a VPN is to hide your IP address from your ISP and other third parties. This allows you to send and receive information online without the risk of anyone but you and the VPN provider seeing it. •Encryption of protocols: A VPN should also prevent you from leaving traces, for example, in the form of your internet history, search history and cookies. The encryption of cookies is especially important because it prevents third parties from gaining access to confidential information such as personal data, financial information and other content on websites. •Kill switch: If your VPN connection is suddenly interrupted, your secure connection will also be interrupted. A good VPN can detect this sudden downtime and terminate preselected programs, reducing the likelihood that data is compromised. •Two-factor authentication: By using a variety of authentication methods, a strong VPN checks everyone who tries to log in. For example, you might be prompted to enter a password, after which a code is sent to your mobile device. This makes it difficult for uninvited third parties to access your secure connection.
  • 12. WILL A VPN MAKE ME 100% ANONYMOUS? Yes and no. VPNs are safe depending on who is running the server. If the owner of the VPN logs your data/info and the connection is not encrypted, then it is not safe and could leave you exposed. If the owner of the VPN has a secure and encrypted connection and does not log at all, it is pretty safe. To be safe, I suggest getting a premium paid VPN.