the Internet Windows Android

Configuring a VPN connection and VPN server Windows. VPN on the phone: What is it, why, and how to activate in iOS and on Android

Many things are interested in knowing what is a VPN connection and why it is necessary. Let's deal with this in a simple philistine, we will not pour professional terminology so that everyone can understand what it is. The VPN connection is a secure network (tunnel), created within the Internet, which is not protected. If we consider the easiest view, then this is a tunnel consisting of a VPN client, which is located on the user's PC, and the VPN server. In the tunnel occur:

Encryption;

Changing the information that the user's PC and sites are exchanged on the Internet.

Pluses of this protection

And what is his dignity? Sometimes VPN is required to conceal your IP address to become anonymous user. There are cases when it is necessary to download files from the network prohibiting this from the IP addresses of countries in which customers are located. There is also a need to encrypt traffic transmitting from a user's PC to a destination (destination point). It turns out that there are quite a few situations in which the VPN connection is used.

VPN connection mechanism

Let's consider the example with which you often have to face real life. Nowadays, the popularity of free and often open Wi-Fi networks. They are everywhere:

In restaurants;

In hotels;

In other public places.

The number of devices that can be connected to the Internet is constantly increasing. There are PDAs, mobile phones, netbooks and other devices. This makes me happy modern peopleSince it allows you to connect to your mail in many places, to go to social network, you can now work on vacation that combines pleasant with useful.

But did you think about how safe is it? We are confident that in the open space of unprotected networks, no one steals your credentials and passwords? Not everyone knows, but, analyzing such traffic, not protection, it is easy to access personal InformationBy setting control over your PC. Here it comes to the aid of the VPN connection. You need to install it before connecting through an unprotected network.

How to install VPN.

Windows 7 is not difficult. The principle of almost such as in any you will need a control panel, go to the section called "Network and the Internet", in which click on "Configuring a new connection or network". After that choose the connection option. Speech about the "Connection to Workplace" item, it will allow you to configure VPN. Then you need to specify information on how the VPN connection will be performed. On the existing connection on the Internet or by the dedicated phone number. If you doubt, stop your choice in the first version. At the next stage, enter the IP address (you can name the PC) to which the connection will be with a VPN tunnel. Learn this from then enter the credentials for access. Next Press the "Connect" button.

It is important to create a VPN connection, after installing the protected channel, the interception of data is not afraid. You can safely check your mail, go to the necessary sites under your password.

Imagine the scene from a plenty film in which the villain is surprised from the scene of the crime on the highway on a sports car. He is pursued by a police helicopter. The car enters the tunnel with several outputs. The pilot of the helicopter does not know what the car will appear from, and the villain leaves against the chase.

VPN is a tunnel connecting many roads. Nobody from the outside knows where there will be cars entering it. No one knows what is happening in the tunnel.

You probably have repeatedly heard of VPN. On the lifehaker about this thing too. Most often, VPN is recommended because with the help of the network you can access the content blocked by geographic trait, and in general, improve security when using the Internet. The truth is such that the Internet access via VPN may be no less dangerous than directly.

How does VPN work?

Most likely, you have a Wi-Fi router at home. The devices connected to it can exchange data even without the Internet. It turns out, you have your own private network, but to connect to it, you need to physically be in terms of the router signal.

VPN (Virtual Private Network) is a virtual private network. It works over the Internet, and therefore it can be connected to it from anywhere.

For example, the company in which you work can use a virtual private network for remote employees. With VPN, they are connected to working network. At the same time, their computers, smartphones or tablets are virtually transferred to the office and connect to the network from the inside. To enter the virtual private network you need to know the address of the VPN server, login and password.

Use VPN is quite simple. Usually the company raises the VPN server somewhere on local computer, server or in the data center, and the connection to it occurs with the VPN client on the user device.

Now embedded VPN clients are in all topical operating systems, including Android, iOS, Windows, MacOS and Linux.

The VPN connection between the client and the server is usually encrypted.

So VPN is good?

Yes, if you are the owner of the business and want to protect corporate data and services. Powder employees only via VPN and accountsYou will always know who did what and does.

Moreover, the owner of the VPN can monitor and control the entire traffic that comes between the server and the user.

Employees are sitting in "VKontakte"? You can close access to this service. Gennady Andreevich half of the working day spends on sites with memes? All its activity is automatically recorded in logs and will become an iron argument for dismissal.

Why then VPN?

VPN allows you to bypass geographical and legislative restrictions.

For example, you are in Russia and want. With regret, you will find out that this service is not available from the Russian Federation. You can use it, only leaving the Internet via the VPN server of the country in which Spotify works.

In some countries there is an Internet censor that restricts access to one or another sites. You want to go to some resource, but in Russia it is blocked. You can open the site, only leaving the Internet via the VPN server of the country in which it is not blocked, that is, almost from any other than the Russian Federation.

VPN is a useful and necessary technology that copes well with a certain spectrum of tasks. But the safety of personal data still depends on the blessings of the supplier VPN service, your common sense, attentiveness and Internet literacy.


Today, questions about VPN are popular - what it is what its features and how best to configure VPN. The thing is that not everyone knows the essence of the technology itself when it may be needed.

Even from the side of finance and profit, the configuration of VPN is a profitable case for which you can get easy money.
It would be nice to explain to the user, which represents the VPN, and how best to customize it on Win 7 and 10.

1. Basic

VPN (Virtual Private Network) - This is a private virtual network. Even easier - creating technology local networkBut without physical devices in the form of routers and other things, and with real resources from the Internet. VPN is an additional network created on top of another.

On the Microsoft website, such a cognitive picture was found, which will help to understand that the expression "is additional network created over the other".


On the image shown, the device is displayed as a computer. The cloud is a common or public network, more often - standard Internet. Each of the servers is combined with each other with the help of the VPN itself.

So the devices are connected to each physically. But practice has shown that it is not necessary.

Especially in order not to use wires, cables and other interfering devices, and configures VPN.

Local devices are connected to each other by means of cables, but via Wi-Fi, GPS, Bluetooth and other devices.
Virtual networks, most often - this is a standard Internet connection. Of course, access to devices simply will not work, because everywhere there are levels of identification aimed at avoiding hacking and ill-wishers in the VPN network.

2. A few words about the structure of VPN

The structure of VPN is divided into two parts: external and internal.
Each PC connects to two parts simultaneously. This is done using the server.


The server, in our case, is the so-called guards at the entrance. It will determine and reguse the virtual network.

A computer or device connected to VPN must have all the data for authorization and, so-called authentication, that is, a special, usually one-time, password, or other means, which could help pass the procedure.

This process is not particularly important to us. Professionals are created by increasingly powerful and serious ways of authorization on servers.

To be in such a network, then at the entrance you should know the following:
1. Name, PC name, for example, or other login used to pass on the network;
2. Password, if so installed to complete authorization.
Also, the computer wants to connect to the next VPN network, "carries" all data for authorization. The server will make this data into its database. After registering your PC in the database, you will no longer need to be the aforementioned data.

3. VPN and their classification

The classification of VPN networks is shown below.

Let's try to figure it out more.
- DEGREE OF PROTECTION. Selected on this criteria of the network:
1. Protected fully - these are initially protected networks;
2. Protected "confidentially" - less protected networks are used in cases where the initial or "parent" network is reliable.
- Sales. Methods of implementation. Selected on this criteria of the network:
1. Combined and software methods;
2. Hardware method - Using real devices.
- Purpose. VPN selected on this criterion:
1. Intranet (Intranet) - is used most often in companies where several branches must be combined;
2. Extranet (Extranet) - is used specifically for the organization of networks in which there are various participants, as well as customers of the company;
3. Aksess (Remote Access) is an organization of VPN networks, where there are so-called deleted branches.
- According to the protocol. The implementation of VPN networks is possible using AppleTalk and IPX protocols, but in fact I use most often more often than TCP / IP. The reason is the popularity of this protocol in the main networks.
- Level of work. Here preference gives OSI, but the VPN network can only work on channel, network and transport levels.
Of course, in practice one network, you can include several signs at the same time. Let us turn to direct configuration points. VPN networkWith your PC or laptop.

4. How to configure a VPN network (virtual network)

The first method is designed specifically under Windows 7.
On Windows 7, the setting takes place with sufficiently simple actions and following the following instructions:
1. Go to " Network Management Center and common access " Click on the panel quick access On the connection icon and in the window, choose the item you need.

2. The program does not always have such a species as in the figure above, it may be still like this:

3. In the new window we find the section " Configuring a new connection or network" In the figure, this section is highlighted.


4. In the next point we find " Connect to workplace"And go through" Further».


5. In the event that any VPN connection already exists on the PC, a special window should appear, as in the figure below. Select "No, create a new connection" and again go " Further».


6. In the new window we find " Use my Internet connection (VPN)»


7. Now enter the address, the name of the VPN network. You can find out all the details at the network administrator, which will also tell you the special window.

If the connection happened to the already functioning network, it is best to know the data from the administrator of this network. Usually this procedure does not take much time. Enter data to the intended fields.
8. In the same window, we put a tick to " Do not connect now ...", And after moving" Further».


9. Enter your data (login and password) from the network. In the following figure, these fields are highlighted.

If the connection is the first to with the network, the data will have to create new, after checking with their server you will be passed to the network, and use it.

If the connection is not primary, the server will not check your data and will directly let you in the desired network.

10. After entering the necessary data, click on " To plug».


11. The next window will propose to connect to the network now. It is better to close it.


Setup is safely completed and only to connect to the network remains. To make it need to go back to the first item " Center Network Management and Shared Access».
12. In a new window, choose " Connect to the network».


13. Here you choose our connection and connect it.

Configure VPN on Windows 7 Completed.

Let us turn to the VPN configuration on Windows 10, the algorithm and the action there are almost the same. Difference only in some interface elements and access to them.

So, for example, to get to the "Network and Common Access Center" need to do everything that both on Windows 7, besides there is a special item " Creating and configuring a new connection or ...».
Further, the setting is done in the same way as on Windows 7, only the interface will be a little different.


Some inconvenience of Windows 10 users may be related to the fact that they will look for a classic network type. Should go to " Network and Internet", And after selecting" Viewing the Status of Tasks and Networks "for further work with setting up NPN networks.

In essence, there is nothing difficult in the setup. By the way, such a VPN connection can be configured even on Android devices, it will be devoted to this section below.

5. Setting up VPN on Android

To perform such an operation, you will need to install and download the tool called SupervPN Free VPM Client from Android official stores.

The window of the program that will offer creating a VPN. Networks on android.


In general, everything is clear here, click on " Connect.", After which the search for available networks will begin and further connection with them. Configuring VPN on Android is made without additional programs.

VPN and proxy servers have one similarity: they are designed to protect confidential information And hide your IP address. On this similarity ends.

Proxy or VPN. Proxy VPN.
Access to any content
Hides your location (IP address)
Hides your personality from scammers
Works with browsers (Chrome, Firefox)
Works with various devices (Smartphones, Tablets, Consoles)
Works with games and applications
Encrypts your activity, protects against hackers
Protects you OT. malicious programs and phishing tactic
Constantly changes the virtual location (IP address)
High Speed \u200b\u200bSurfing and Streaming Content

Output

As you can see, VPN is superior to a proxy server. Both services allow you to hide IP ADERS, but additional functions VPN - reliable encryption, comprehensive system protection, etc. - Make tax technology more secure and confidential than proxy server.

How to choose the best VPN

Now you understand why in modern digital jungle need VPN. How to choose a service ideal for you? Here are several useful Sovietsthat will help you make the right choice.

Price

The price always matters, but much more important to get exactly what you paid for. With free VPN services, as a rule, are full of problems - they almost always have any rigid restrictions. And how can you be sure that they will not try to make money on selling your data? After all, to serve the network of VPN servers - the occupation is not from cheap, so if you do not pay for the product, then most likely you are a product.

Speed

A variety of factors affects the speed of the VPN. The server network must be well optimized so that you get at the output, so make sure the service you choose optimizes its network. In addition, really good service will not limit the volume of traffic and throughput Data transfer channel so you can enjoy high speed as much as you like.

Confidentiality

Some VPN services retain your personal data, which reduces all the essence. using VPN. To protect privacy! If confidentiality is important for you, then only a service that strictly adheres to the principle of "no entries" is suitable. Also to maintain privacy well if the VPN service accepts payment in bitcoins.

Safety

To make sure that the service provides good defense From various threats, see which encryption protocols it uses. In addition, the service client must be the "Stop Crane" function to block any data exchange of devices with the network if the VPN connection was broken or torn.

Number of servers / countries

- This is an absolutely necessary condition for ensuring a fast and stable VPN connection. The greater the VPN service servers and the larger the list of countries in which they are located - the better. But that's not all. Check if the service allows you to switch between different VPN servers. You must have the opportunity to change the Internet access point at any time.

Number of simultaneous connections

Some services allow you to simultaneously connect to your VPN network only to one device. Others allow you to simultaneously connect a PC, laptop, smartphone, xbox and tablet. We in SafervPN believe that more is better. Therefore, we allow you to simultaneously connect up to five devices to each account.

Support

Many VPN users need help to get used to new technologyTherefore, an important factor in choosing a service can be the presence of a good technical support service, which, firstly, promptly answers users of users and, secondly, gives truly sensible tips. The SaferVPN command is always ready to answer your questions by email. mail or through online chat.

Free trial, money back guarantee

Take the product before buying - really. Not every VPN service is ready to provide it. But not better fashion Find out whether service is suitable than to try yourself. It is also good if there is a guarantee of the return of money, especially if the refund is performed promptly.

Software

Not so easy to find a VPN service that is convenient to use, easy to install and at the same time it provides decent protection and has a rich functionality. Our connection function with one touch of a button is incredibly convenient, and the function automatically guarantee your safety.

Cross-platform compatibility

Each platform requires a separate VPN client. This is a difficult task, but a good VPN service must have a client in arsenal for any device, to offer customer users for various platforms, as well as promptly provide technical support And help users correct problems.

VPN dictionary

Terminology in Internet security is a rather complicated and confused. But do not rush to despair! The SaferVPN command will help you understand all the subtleties.

Adqualker

English Advanced Encryption Standard is an advanced encryption standard. The 256-bit AES is currently considered to be the "gold standard" of encryption, the US government is used to protect secret data. AES is the best encryption standard available to VPN users.

Backdoor

Mathematical loophole, secret cryptographic code, which is embedded in the encryption sequence so that the cipher then can be hacked.

Bitcoin

Decentralized pyring (transmitted from one user to another directly) Open virtual currency (cryptocurrency). Like traditional money, Bitcoops can be exchanged for products and services, as well as on other currencies. SafervPN accepts payments in Bitcoins.

Journal of Connections (Metadata)

The registry in which records are stored on the dates of your connections, their duration, frequency, addresses, etc. The need to keep such entries is usually due to the fact that they help solve various technical problems and deal with all sorts of violations. SafervPN does not fundamentally lead such records.

Common speed

The amount of data transmitted during a certain period of time. Usually measured in kilobits or megabits per second.

Cookies

English Cookies - Cookies. These are small data fragments that the browser stores in the form of text files. With their help, you can do a lot of useful (for example, to memorize data for logging in the system or personal settings on the site), but Cookies are often used for surveillance for users.

DD-WRT Open firmware for routers, providing you with better router management options. Excellent alternative branded firmware for those who want to configure the router on their own needs.

English DOMAIN NAME SYSTEM - Domain Naming System. This is a database capable of transforming the addresses of web pages (URL) from the usual and understandable species to the "real", digital format, understandable computers. DNS-translation, as a rule, makes your Internet provider, passing and censoring all your traffic.

Save data

Rules or laws in accordance with which the company collects data on its users. In most countries, Internet providers are required to store some user data (for example, surfing history) for several months.

Encryption

Coding data with a mathematical algorithm to prevent unauthorized access to them. Encryption is the only thing that can protect digital data from unauthorized persons. It is the cornerstone of security on the Internet.

Geo-blocking

Limiting access to online services based on geographic location. These restrictions are usually entered in order for the right holders to make advantageous transactions for issuing licenses with distributors around the world. Of course, intermediaries make the product more expensive for the end user.

HTTPS is a SSL / TLS protocol to protect websites that enjoy banks and online sellers.

IP address

English Internet Protocol Address - address on the Internet protocol. Each device on the network receives a unique digital address - IP address. SafervPN hides your IP address from external observers, thereby providing confidentiality and access to any Internet services.

Internet provider

A company that supplies access to the Internet. The right to provide such services is strictly regulated: Internet providers by law are obliged to monitor and censing the traffic of their customers.

Hi friends! Many people use the Internet on the principle of "I have nothing to hide", but it's like saying "I don't care about my rights." This article is for those who do not care about their rights, as well as for those who think about security on the Internet. I'll tell you simple words About what VPN is, why it is needed, as well as how to use it.

What is VPN.

VPN is decrypted as Virtual Private Network. Translated into Russian - a virtual private network. VPN is a technology that provides an encrypted connection over your Internet connection.

Thanks to the VPN, you will be protected from interception of logins / passwords in unprotected or public Wi-Fi points, the history of your sites will not be available to anyone, but you will forget sites like a terrible sleep. This also applies to torrents, and to any other allegedly prohibited sites.

The project of the projects of the "blockers" also reached. Recently, the popular Bitcoins Exchange, a major investment forum and still unknown how many sites was blocked. Block can and access to the site any payment system, for example, to. The benefit that the ridiculous blocking of VPN users do not touch :)

What makes VPN

1. VPN replaces your real IP on a duct, for example, to Italian or Dutch, if you use VPN, then you are practically invisible in the network. You go to the site, but see that you, for example, not from Russia, but from Germany. Due to this, no blocking sites are not terrible.

2. Environment is encrypted - neither your provider nor a sysadmin knows where you came out.
- What does the sysadmin / provider sees at all when you do without VPN? The whole story of your surfing, all the sites, which you come to.
- What does he see when you work via VPN? What you connected via VPN and ... everything, nothing more is not known :)
As well as attackers when intercepting data, they will not be able to recognize them due to encryption.

3. In the amount of IP substitution and traffic encryption, you become completely anonymous.


Why do you need VPN.

  • If you like to visit the cafe and sit there online via Wi-Fi or travel and connect and connect to open Wi-Fi Points - No arrogant hacker sitting at the next table, will not capture your plastic card data with CVV code or not password steals From the payment system along with your money. Moreover, it does not matter whether you work from a laptop or from a mobile device - without VNN, they are equally not protected.
  • You value anonymity and you have a unpleasant fact that any sysadmin provider has access to visiting sites you visited or from which EPS you replenish / remove large sums. The provider will no longer know which sites you visit, and sites will not know who visited them.
  • At work, love to sit on YouTube / Vkontakte / Skype, but do not want this to spoil the boss or sysadmin. I know that you are a successful investor and do not go to work for a long time, this is me, just in case :)
  • Want to see the Internet as it should be - to visit sites without restrictions service, which just blocks sites. At the time of writing, more than 2 million sites are blocked (statistics are conducted). It is also not uncommon when you require blocking a specific page or partition, and the provider does not understand the entire site.
  • Favorite service restricts access from your country or provides privileges / bonuses / discounts to specific countries? With the help of VPN, become a resident of any country and get all the advantages of the services.

How to use VPN (on the example of NORDVPN)

I myself sit on the Internet only through the VPN and I can recommend an excellent service called NordVPN. I will say right away, the service is paid, the cost of $ 12 per month, when paying for half a year, the cost per month is $ 9, when paying for a year - $ 7.

Yes, on the Internet is full of free VPN ServicesBut the content of the servers costs money, so if the service does not take payment from you, it earns on you somehow differently and this "otherwise" can do it much more expensive than paying a reliable VPN. Security is not the question on which it is worth saving.

Overview NORDVPN, its capabilities

  • Practically no effect on the connection speed is personally checked :)
  • Support for Windows, MacOS X, Linux, Android, iOS;
  • The ability to use one account on 6 devices at the same time;
  • More than 50 countries and over 500 servers are available to the choice;
  • Connect to NORDVPN with one click;
  • If your VPN connection disappears, the programs that you specified in the settings will automatically close. You can not worry about the data leakage;
  • Protection against recognition via DNS and WEBRTC (these are guys through which your real ip is visible even when VPN is enabled);
  • DoubleVPN support (chain of two VPN servers);
  • No restrictions: Torrents, Skype calls, HD video, online Games - Everything works without problems;
  • Bitcoins and payment through plastic cards. But we love anonymity, so if you have not yet brought yourself a bitcoin wallet, catch the instruction;
  • Any requests are ignored, because the service is under the jurisdiction of Panama and does not obey the laws of other countries.

Create an account in NORDVPN

1) Switch by reference, click "Get VPN" and select the tariff.
2) We throw us on the registration form of the account. Select the tariff, fill email and password, select a convenient payment option and click "Register."
3) Confirm payment and go to your personal account using the login and password.

Download the client and turn on the VPN (on the example of Windows)

1) B. personal Cabinet On the site go to the "Download Area" tab, we find our operating system And swing the client. If you have Windows, choose a line next to which "Recommended". If you need a VPN on mobile device, find NordVPN in your application store and download.

2) Install the program and run it. The screenshot below shows how the program looks like (the screen is increasing by clicking). In the tab " Servers."You can choose any country for connecting.

Setting up nordvpn.

If you want maximum protection and configure everything, then click on "Settings":

For what every item is responsible:

Automatic Updates - When you enter new versions, update the program automatically;
AUTO CONNECT TO - when starting NordVPN will automatically connect to the selected server;
START NORDVPN on startup - run VPN with the start of the system;
Kill Switch - Select programs that will automatically close if the connection to the VPN will disappear. To select the program, click "Add More Applicatios" and locate on the computer the necessary program, for example, browser and skype;
Notifications - to receive notifications when the connection is connected or disconnected from NordVPN;

Show Tray Icon - Show the program icon in the system tray;
Start Minimized - start in the coarse form;
System of Measurement - Select in the metric (km) or imperial system (mile) to show the distance to the servers.

You learned what VPN is for what it is needed and how to use it. He tried to write the most accessible as possible :) Now your anonymity and high-level safety.
Leave your opinions and questions on the topic of the article in the comments.