VPN and why you should start using it


A virtual private network (VPN) is a network that is constructed using public wires, usually the Internet to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. A VPN secures the private network, using encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
A VPN is designed to provide a secure, encrypted tunnel in which to transmit the data between the remote user and the company network. The information transmitted between the two locations via the encrypted tunnel cannot be read by anyone else because the system contains several elements to secure both the company's private network and the outside network through which the remote user connects through.
The first step to security is usually a firewall between the client and the host server, requiring the remote user to establish an authenticated connection with the firewall. Encryption is also an important component of a secure VPN. Encryption works by having all data sent from one computer encrypted in such a way that only the computer it is sending to can decrypt the data.


Now there are many VPN network protocol
VPN systems may be classified by:
·        The protocol used to tunnel the traffic
·        The tunnel's termination point location, e.g., on the customer edge or network-provider edge
·        The type of topology of connections, such as site-to-site or network-to-network
·        The levels of security provided
·        The OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity
·        The number of simultaneous connections

IPSec
A set of protocols developed by the IETF to support secure exchange of packets at the IP layer. IPsec has been deployed widely to implement VPNs. IPsec supports two encryption modes: Transport and Tunnel.

PPTP
The Point-to-Point Tunneling Protocol is a technology for creating VPNs, developed jointly by Microsoft, U.S. Robotics and several remote access vendor companies, known collectively as the PPTP Forum.

L2TP
Layer Two (2) Tunneling Protocol is an extension to the PPP protocol that enables ISPs to operate Virtual Private Networks (VPNs).

VPNs cannot make online connections completely anonymous, but they can usually increase privacy and security. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques.
The VPN security model provides:
·        Confidentiality such that even if the network traffic is sniffed at the packet level (see network sniffer and deep packet inspection), an attacker would only see encrypted data
·        Sender authentication to prevent unauthorized users from accessing the VPN
·        Message integrity to detect any instances of tampering with transmitted messages


Now we’re done with the technical stuff (well not really), let’s move to the part where I tell you why you should be using a VPN:

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a faraway server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.

The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.
A VPN alone is just a way to bolster your security and access resources on a network you’re not physically connected to. What you choose to do with a VPN is a different story. Usually, VPN users fall into a few separate categories:

  • The student/worker. This person has responsibilities to attend to, and uses a VPN provided by their school or company to access resources on their network when they’re at home or traveling. In most cases, this person already has a free VPN service provided to them, so they’re not exactly shopping around. Also, if they’re worried about security, they can always fire up their VPN when using airport or cafe WI-Fi to ensure no one’s snooping on their connection
  • The downloader. Whether they’re downloading legally or illegally, this person doesn’t want on some company’s witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrent—everything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?
  • The privacy minded and security advocate. Whether they’re a in a strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether they’re at home or abroad. To them, unsecured connections mean someone’s reading what you say.

  • The globetrotter. This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.
There are 2 type of VPN service providers:
  • Free VPN Providers are more likely to log your activities and serve contextual ads while you’re connected. They’re also more likely to use your usage habits to tailor future ads to you, have fewer exit locations, and weak commitments to privacy. They may offer great features, but if logging and privacy are important to you, you may want to avoid them. However, if you just need quick, painless security while traveling on a budget, they’re a great option.
  • Subscription VPN Providers usually take your privacy a bit more seriously, since you’re paying for the service. It’s unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first.
So if you’re one of the people mentioned above then vpn is perfect for you and that is why you should be using one, but wait! There is more
Using a VPN doesn’t mean you’re invulnerable. You should still make sure you’re using HTTPS whenever possible, and you should still be careful about what you download. Some VPN service providers—especially mobile ones—bundle their clients with anti-malware scanners to make sure you’re not downloading viruses or trojans.

So which are the top 5 VPN you should start using?

1.     Private internet access
2.     proXPN
3.     torVPN
4.     expressVPN
5.    it is worth mentioning here that opera browser has a VPN embedded in their browser, worth checking out (and FREE!)




Comments

Popular Posts