the Internet Windows Android

What is VPN. What is a VPN server

VPN (VPN) - Virtual private networks, today for hearing everyone. Many inexperienced users represent them as a magic key to access blocked web resources: Pressed the site and opened. Beauty! Yes, unlocking sites is one of the functions of VPN, the most sought-after, but not the most important. The main purpose of virtual private networks is to protect the data transmitted via the Internet, from intercepting people for which this data is not intended.

Let's talk that represent virtual private networks, what functions they perform, where they are used and what their shortcomings are used. And also get acquainted with the possibilities of several popular VPN applications and browsers extensions that can be used on PCs and mobile devices.

For a better understanding of the essence of VPN-technology will present the Internet in the form of a network of roads, which will drive mail vans with letters and parcels. They do not hide at all where they follow and what are being taken. Letters and parcel are sometimes lost on the road and often fall into other people's hands. Their sender and recipient cannot be 100% confident that the contents of the package will not be read by someone, stolen or changed, because they do not control the delivery process. But they know that in terms of security, this method of shipment is not too reliable.

And among the roads there was a closed tunnel. Vans that pass on it are hidden from prying eyes. No one knows where the car is sent after entering the tunnel, what and to whom it delivers. Only the sender and recipient of correspondence know about it.

As you already guessed, our imaginary tunnel - and there is a virtual private network built on the basis of more large network - World Wide Web. Traffic passing through this tunnel is hidden from strangers, including the provider. Provider, if anyone knows, under normal conditions (without VPN), can track and control your actions on the Internet, as it sees what resources you visit. And if you "dive" in VPN, it will not be able to. In addition, the information sent by such a channel becomes useless and for lovers of someone else's good - hackers, since encrypted. This is the essence of the technology and the simplified principle of operation of VPN.

Where use virtual private networks

For what it is needed, this VPN, I hope, is understandable. Now let's see where, how and for what it is used. So, without VPN it is not necessary:

  • IN corporate networks. Here it is necessary for the exchange of confidential data between employees or network resources of the company and clients. An example of a second case - management of accounts through applications type Client Bank and Mobile Bank. VPN is also used to solve technical tasks - traffic separation, reserve copy etc.
  • In public networks Wi-Fi, for example, in a cafe. Such networks are open to everyone and traffic passing on them very easy to intercept. Open access points VPN services do not provide. About the protection of information must take care of the user himself.
  • To conceal the visited web resources, for example, from the boss or system administrator at work.
  • For exchange secret Information With other people, if there is no confidence in the usual Internet connection.
  • For clocking sites.
  • To preserve anonymity on the Internet.

Ensuring Access Co. world Wide Web Through VPN, Russian Internet providers are widely used when connecting subscribers.

VPN varieties

As you may know, the functioning of any computer networks Subordinate to the rules that are reflected in the network protocols. The network protocol is a kind of standards and instructions, describing the conditions and procedures for the exchange of data between the compound participants (we are not about people, but about devices, operating systems and applications). VPN networks are just distinguished by the type of protocols, on the basis of which they work, and construction technologies.

PPTP.

PPTP (Point-to-Point Tunneling Protocol) is the oldest data transfer protocol in virtual private networks, it has been for more than 20 years. Due to the fact that he appeared a very long time, he knows and support almost all existing oS. It almost does not load equipment computing resources and can be used even on very old computers. However, in the current conditions, its level of safety is very low, that is, the data transmitted through the PPTP channel is at risk of hacking. By the way, some Internet providers block applications using this protocol.

L2TP.

L2TP (Layer 2 Tunneling Protocol) is also a fairly old protocol created on the basis of PPTP and L2F technologies (the latter is specifically designed for tunneling PPTP messages). Provides a higher degree of traffic protection than just PPTP, as it allows you to set access priorities.

The L2TP protocol is widely used to this day, but is usually not isolated, but in combination with other protective technologies, for example, IPsec.

IPsec.

IPsec is a complex technology that uses many different protocols and standards. It is constantly being improved, therefore, with competent use, it provides a fairly high level of communication security. It can be combined with other network connections protection systems without causing conflicts. This is his strengths.

The disadvantages of IPSec are laboriousness in setting up and calculating the use of only trained specialists (incorrectly configured, it will not provide any acceptable protection). In addition, IPsec is rather demanding on hardware resources of computing systems and on weak devices can cause brakes.

SSL and TLS.

SSL and TLS are mainly used to safely transmit information on the Internet through web browsers. They protect from interception confidential data of site visitors - logins, passwords, correspondence, payment details, entered during orders of goods and services, etc. Addresses of sites that support SSL starts with HTTPS prefix.

Private case of using SSL / TLS technology outside web browsers - cross-platform by OpenVPN.

OpenVPN.

OpenVPN is a free implementation of VPN technology, designed to create protected communication channels between users of the Internet or local networks by type client-server or point-point. The server is assigned one of the computers of the connection participants, the rest are connected as clients. Unlike the first three varieties of VPN, requires the installation of special software.

OpenVPN allows you to create protected tunnels without changing the parameters of the main connection of the computer to the network. Designed by experienced usersSo you won't call it simple.

MPLS.

MPLS is a multi-protocol data transfer technology from one node to another using special tags. The label is part of the package service information (if submitted data sent in the form of a train, the package is one car). Tags are used to redirect traffic inside the MPLS channel from the device to the device, while the rest of the contents of the packet headers (the same as the address on the letter) is maintained in secrecy.

To enhance the protection of traffic transmitted via MPLS channels, also often use IPSec.

These are not all the varieties of virtual private networks today. The Internet and everything that comes into contact with it is in constant development. Accordingly, new VPN technologies appear.

Vulnerabilities of Virtual Private Networks

Vulnerabilities are brexs in the security of a VPN channel, through which data is possible outside - to a public network. Unfortunately, absolutely impenetrable protection does not exist. Even a very competently built channel will not give you a 100% guarantee of anonymity. And the point here is not in hackers, which weigh the encryption algorithms, and in much more banal things. For example:

  • If the connection to the VPN server suddenly interrupted (and this is often), but the connection to the Internet will be saved, part of the traffic will go into a public network. To prevent such leaks, use VPN Reconnect technologies and killswitch (disabling the Internet when communicating with VPN). The first is implemented in Windows, starting with the "seven", the second provides third-party software, in particular, some paid VPN applications.
  • When you are trying to open any site, your traffic is first headed to the DNS server, which defines the IP of this site to the address you entered. Otherwise, the browser will not be able to download it. Requests for DNS servers (by the way, notched) often go beyond the VPN channel, which breaks the anonymity mask from the user. In order to avoid such a situation, specify the DNS addresses in the Internet connection settings that your VPN service provides.

  • Data leakage can create web browsers themselves, more precisely, their components, such as WeBRTC. This module is used for voice and video message directly from the browser, and it does not allow the user to choose a way network connection himself. Other Internet access applications can also use unprotected connections.
  • VPN works on networks that are based on the IPv4 protocol. In addition to him, there is an IPv6 protocol, which is still at the implementation stage, but in some places already applied. Modern operating systems, in particular, Windows, Android and IOS, also support IPv6, even more - on many of them it is enabled by default. This means that the user, without knowing it, can continue to the public IPv6 network and its traffic will go outside the protected channel. To protect yourself from this, disable IPv6 support on devices.

You can close your eyes to all these flaws if you use VPN only to access locked web resources. But if you need an anonymity or data security during network transmission, they can create you serious problems if you do not accept additional protection measures.

Using a VPN to bypass locks and anonymization of traffic

The Russian-speaking audience of the Internet most often uses VPN in order to freely visit blocked Internet resources and maintain anonymity on the network. Therefore, the bulk of free VPN applications and services "sharpened" just for it. We will get acquainted with some of them closer.

Opera VPN.

Developers browser Opera. The first to introduced the VPN module directly to the product itself, having delivering users from problems with searching and tuning third-party extensions. The option is included in the browser parameters - in the Safety section.

After switching on, the VPN icon appears in the opera address bar. The click on it opens the settings window, among which the inclusion slider and the selection of virtual location.

The volume of traffic passing through Opera VPN has no restrictions, it is a plus. But the service has a disadvantage - it protects only those data that is transmitted by HTTP and HTTPS protocols. Everything else goes through the open channel.

In the opera, as well as the Yandex browser there is another feature with similar features. This is the mode of compression of traffic turbo. Together with the VPN, it does not work, but access to blocked resources opens well.

Browsec browser expansion and mobile application is one of the most famous VPN services. It supports all popular web browsers - Opera, Google Chrome., Firefox, Yandex, Safari, etc., provides a quick and stable connection, does not require configuration, does not have a limit. Free version users are offered to choose from 4 servers: in the UK, Singapore, USA and the Netherlands.

Browsec paid subscription costs about 300 rubles per month. Users of this tariff get a higher connection speed, technical support And a large selection of servers worldwide, including Russia, Ukraine, Latvia, Bulgaria, Germany.

Hola.

Hola is the main competitor Browsec, existing in the form of applications and browser extensions. Versions for Android, desktop systems and browsers work on the basis of peer-to-peer technologies (peer-to-peer network), where users are provided for each other themselves. For personal non-commercial use access to them is provided free of charge. The selection of servers is quite large.

HOLA version for iOS is created as a browser with an integrated VPN service. She is paid, costs about $ 5 per month. The trial period is 7 days.

Zenmate - the third popularity of the VPN service, released in the form of expansion for Opera, Google Chrome, Firefox, MAXTHON CLOUD. Browser (only on Mac OS X) and some other browsers. As well as - in the form mobile applications For Android and iOS. With free use, the speed limit is noticeably, and the selection of servers is very small. However, the entire traffic passing through the VPN channel zenmate is securely encrypted.

Users to buy premium access are provided from more than 30 servers worldwide. Plus, it turns on to accelerate the connection. The cost of a subscription begins from 175 to 299 rubles per month.

Like other similar services, Zenmate does not need to be configured - it is enough to install and run. Working with him intuitively understandable, especially since the interface supports Russian.

TunnelBear - another VPN user friendly for different devices - PC sub windows control, Linux and OS X, smartphones under Android and iOS. Released in the form of applications (both mobile and desktop) and browser extensions. It is very useful feature Lock traffic when the connection is broken with a VPN, which prevents the data leakage into the open network. By default, selects the optimal communication channel with regard to the location of the user.

The possibilities of free versions of TunnelBear are no different from paid, except for one - limitations of traffic up to 500 MB per month. In the phone, it may be enough, if you do not watch movies online, but on the computer - hardly.

Nor paid free versions TunnelBear does not collect any user data. You simply press the only button and get access.

Hidemy.name.

Hidemy.Name is a reliable and relatively inexpensive paid VPN service. Provides a consistently high connection speed even when viewing online video in HD quality and games in network toys. Well protects traffic from interception and provides complete anonymity in the network. Nidemy.Name servers are located in 43 countries and 68 cities in the world.

Hidemy.Name supports any devices that can connect to the Internet: not only phones and computers, but also routers, television consoles, SmartTV, etc. By one subscription, you can use the service at the same time on all devices.

Hidemy.Name applications are available for Windows, Mac OS X, Linux, iOS and Android. As already mentioned, they all cost money, but you can only pay for those days when you use VPN. Day subscription cost - 49 rubles. License for 1 year - 1690 rubles. Free trial period is 1 day.

- A long-standing VPN application, one of the few, which has always provided services for free and without restrictions on the volume of traffic. The limit of 500 MB per day with the "halary" use appeared relatively recently. Also, "Free" have access to only one VPN server, which is located in the US, so the communication speed by means of Hotspot Shield is not too high.

Cost paid subscription The VPN Hotspot Shield is $ 6-16 per month.

The number of non-clear concepts and abbreviations relating to the emergence of new and modifications of old technologies is growing in geometric progression. VPN is one of them. This publication puts a task to deal with this incomprehensible reduction and determine the reason for its frequent mention of network connections.

VPN, what is it?

In principle, this is the usual network ("N" in the abbreviation is decrypted as "Network"). But it has its subtleties. First, it is virtual, and secondly - private. That is, "Virtual" and "Private" (the first two letters of reduction).

Reducing VPN.

It is called virtual due to the fact that there is at a certain level of abstraction from the hardware. This means that she doesn't care for any channels, which devices are connected and other conditions. VPN uses all available resources for its operation.

But main feature VPN is that it is private. Although it uses general channels and communication protocols, most often the Internet, to enter it can not "Uncle from the street", but only a trusted participant who has the right to it.

Operating principle

To understand how VPN works, you need to consider the simplest communication case of two points (computers). In the unprotected part of the path (most often the Internet), a tunnel binding them is created. The complexity is not to organize a similar connection, but in the protection of data vulnerable to the unprotected area of \u200b\u200bthe network. Information passing through a public channel can be stolen or distorted by intruders.

VPN device

To prevent this, various types of encryption are used. Consequently, the main task of the VPN connection is to provide uniformity of encryption and decryption in its nodes, as well as pairing network protocols, if we are talking about different server systems.

Why do you need VPN.

The main reason creating vpn. There was a desire, even the urgent need to create protected networks, which could be obtained regardless of geographic binding. Remote access Employees to the network of the parent company from a business trip, for example. Further more. For transnational corporations there are no opportunities to stretch the wire between their offices in different countries or continents. VPN technology comes to help and in this case. Example easier to be the organization VPN based on local network Enterprises to limit the powers of various groups, departments, workshops and the like.

How to create a VPN network

For creating VPN network There are a number of applications, TeamViewer or Hamachi, for example. Although this can be done and standard means Windows, but with less efficiency, security and convenience. To do this, log in to the "Network Connections" of the computer through the "Control Panel".

Hamachi program

In the "File" menu, select the "New Connection" item, where to specify that the Connection being created is VPN. Next, you need to add or specify the user to which access will be allowed. Then to specify that the connection will be carried out via the Internet and select the TCP / IP protocol as a connection protocol. In the last dialog box, you must click "Allow access" and VPN server. Windows is ready to work.

We released a new book "Content Marketing in social networks: How to sit in the head of subscribers and fall in love with their brand. "

Subscribe

VPN is a network connection technology in which a virtual subnet can organize in an existing network.

To understand, VPN that is, we will analyze an example. For example, you need to send a parcel to another city and make it anonymously. On ordinary mail, you will be asked to provide a document certifying the personality, that is, send the parcel anonymously will not work. Yes, and there is no one hundred percent warranty that the contents of the parcel will remain secret and will not open it. But you can use the services of special companies that will pass the parcel without asking who is the sender, as well as they guarantee complete confidentiality of the content, its integrity and safety. VPN performs the function of such companies.

What is needed vpn

VPN allows you to securely transmit data without distortion.

Use this type Connections need for:

  1. Work with applications and downloads when the IP address belongs to another zone.
  2. Convenient and easy connection to the global network.
  3. Create a secure channel protected from hacker attacks.
  4. The possibilities of anonymous work.
  5. High speed connection without failures in work.
  6. Ensuring the level of security when working in corporate networks.

How the VPN connection works

If you connect via VPN, information about the remote route and the server IP is transmitted in the message. This information that passes over the network is in the encapsulated state, the data is encrypted, so they cannot be intercepted. The encryption step via VPN is carried out when sending, and the decoding is already running the message header on the recipient side (the encryption key should be common). If the decryption was performed correctly, the desired connection type is set.

If we talk about the level of security, then today the Internet does not boast a high level of protection. But if you apply VPN with protocols, it is possible to achieve security and security security.

How to use

You need to configure the connection. We will analyze the steps on the example of the most common OS - Windows: open the control panel and select the "Network and Internet" section. Next: "Network Management Center and common access"-" Setting up a new connection "-" Connecting to the workplace ". Click near" No, Create Connection "and click" Use my connection ".

When entering the Internet, we enter the IP router or the Internet center (provided by the provider at the initial setting), and when logging in vpn - local IP.

Then configure the parameters account (given when registering the Internet center / Wi-Fi RouterArranged on the revolving side of the device) that are required to connect to the RRTR server, this username, password and domain (domain is not required). We created IDPs and now for subsequent inputs we can optimize the entire process to reduce the connection time:

  • Open the "Network and Shared Access Center".
  • Click "Changes in Adapter Parameters".
  • We are looking for the connection we made and view its characteristics (security, properties and type VPN).
  • Install the "point-point tunnel protocol (PRTR)".

If you do not fulfill this, with each exit to the global windows network It will take turns to go through the available options until the RRTR protocol finds.

On this setting is completed, boldly perform the connection.

How to connect VPN using browser

Connection setting for each browser is different. We will analyze each of them:

  1. Opera. This browser has a built-in unlimited VPN, which can be used for free. To enable it, you need to open the "Menu", then go to "Settings", select "Security" and "Enable VPN".
  2. Chrome. It is not necessary to do without the help of special extensions. Open the "Menu", then "Additional Tools", further "Extensions" and "More Extensions". We enter "VPN", we view the results and click on one of them. In the tab that opens, click "Set". After that, the extension will automatically be installed, and its icon will be displayed on the menu panel. When you need to use the VPN, click on the icon and turn on the extension. The best extensions: "Hotspot Shield", "Touch VPN". All of them are free.
  3. Yandex browser. We establish the addition - service VPN. Open the "Menu", then "add-ons", then select the "Extensions Catalog". Specify "VPN" in the search and choose any of the proposed options. Next, the mechanism of action is the same: Install the extension, its icon appears in the "Menu" string. Before each use of the VPN connection, turn on the extension. The following extensions have proven well: "TunnelBear", "Hola Better Internet", "Zen Mate".
  4. Mozilla. According to the described scheme, we perform the installation of the expansion. Best Supplements: "Hotspot Shield FREE VPN. Proxy "," HOXX VPN Proxy "," Zenmate Security ".

Let's get acquainted with VPN a little, find out the main questions and use these three beaks on our blessing.

VPN What is it?

See how information goes between between my laptop and the smartphone that lies next to it, the so-called route trace. And there is always a weak link where data can intercept.

Why do you need a VPN?

To organize networks within networks and their protection. We understand that VPN is good. Why? Because your data will be more security. We are building Safe network over the Internet or other network. It's like a bronval for transporting money on the street from the bank to another bank. You can send money on a regular machine, and you can in the armored car. On any way the money in the armorship is preserved. Shaped VPN and there is a bronval for your information. A VPN server is an agency for the provision of armors. In short VPN is good.

To ensure data security:

Use a virtual private network (VPN connection)
Using the VPN connection, when connecting to a publicly accessible Wi-Fi network, you can effectively use data encryption technology passing through the network. It can interfere with cybercriminals tracking the network, intercept your data.

Still not convinced? Here, for example, the title of one of the tenders:

Provision of services for the provision of communication channels on VPN technology for the organization of data transmission between divisions of the Department of the Ministry of Internal Affairs of Russia in Kazan

The police take care of their safety, these are concerned and require the presence of such channels of the state-owned company and the corporation, and what are we worse? We are even better because we will not spend budget funds, but we will configure everything quickly, simple and free.

So, let's go. We protect accounts, passwords using VPN when used open Networks Wi-Fi. As a rule, this is the weakest link. Of course, the special services of the whole world, criminal groups can afford equipment that replaces and intercepts traffic not only Wi-Fi networks, but also satellite and mobile networks Communication. This is another level and beyond this post.
The best wayWhen you have your VPN server. If not, you have to hope for the honesty of those who provide you with these services. So, there are paid versions of VPN and free. Let's go on the second. Yes, the VPN server can be configured on the home computer, but also about it in a separate post.

How to configure VPN.

Consider Free VPN. for android On the example of Opera VPN - unlimited VPN.

Download free client VPN.. Settings are minimal and reduced to enable VPN, the country's choice, the default is nearby, the network test unit. There are still settings to maintain VPN in the on state.

After installing the application, the VPN item appears in the Android settings menu. This switch calls the Opera VPN main screen (if you have only one way to connect VPN).

To control the disconnection and enable VPN you can resolve the application icons in the Android settings.

Settings-\u003e Notifications and Status String -\u003e Application Notifications-\u003e Opera VPN

Be prepared for the fact that some applications in communication mode via VPN tunnel will be asked to confirm your status. Thus, VKontakte application with enabled VPN will ask your phone number, as it will consider that in your account, in which you usually enter Moscow, trying to enter an attacker from Germany or the Netherlands. Enter the number and continue to use.

Here is the easiest way to use VPN on your android device. You can still configure a virtual private network based on your router and connect to your home computer From anywhere in the world on a protected channel, freely exchanged by private data. But about it, more complex methodAs well as the settings for paid applications and services, I will tell in other posts.


(8 estimates, average: 4,75 out of 5)
Anton Tretyak Anton Tretyak [Email Protected] Administrator. site - Reviews, Instructions, Lifehaki

Many things are interested in knowing what is a VPN connection and why it is necessary. Let's deal with this in a simple philistine, we will not pour professional terminology so that everyone can understand what it is. The VPN connection is a secure network (tunnel), created within the Internet, which is not protected. If we consider the easiest view, then this is a tunnel consisting of a VPN client, which is located on the user's PC, and the VPN server. In the tunnel occur:

Encryption;

Changing the information that the user's PC and sites are exchanged on the Internet.

Pluses of this protection

And what is his dignity? Sometimes VPN is required to conceal your IP address to become anonymous user. There are cases when it is necessary to download files from the network prohibiting this from the IP addresses of countries in which customers are located. There is also a need to encrypt traffic transmitting from a user's PC to a destination (destination point). It turns out that there are quite a few situations in which the VPN connection is used.

VPN connection mechanism

Let's consider the example with which you often have to face real life. Nowadays, the popularity of free and often open Wi-Fi networks. They are everywhere:

In restaurants;

In hotels;

In other public places.

The number of devices that can be connected to the Internet is constantly increasing. There are PDAs, mobile phones, netbooks and other devices. This makes me happy modern peopleSince it allows you to connect to your mail in many places, to go to social network, you can now work on vacation that combines pleasant with useful.

But did you think about how safe is it? We are confident that in the open space of unprotected networks, no one steals your credentials and passwords? Not everyone knows, but, analyzing such traffic, not protection, it is easy to access personal InformationBy setting control over your PC. Here it comes to the aid of the VPN connection. You need to install it before connecting through an unprotected network.

How to install VPN.

Windows 7 is not difficult. The principle of almost such as in any you will need a control panel, go to the section called "Network and the Internet", in which click on "Configuring a new connection or network". After that choose the connection option. Speech about the "Connection to Workplace" item, it will allow you to configure VPN. Then you need to specify information on how the VPN connection will be performed. On the existing connection on the Internet or by the dedicated phone number. If you doubt, stop your choice in the first version. At the next stage, enter the IP address (you can name the PC) to which the connection will be with a VPN tunnel. Learn this from then enter the credentials for access. Next Press the "Connect" button.

It is important to create a VPN connection, after installing the protected channel, the interception of data is not afraid. You can safely check your mail, go to the necessary sites under your password.