Everything you always wanted to know about Virtual Private Networks (VPNs) but were afraid to ask.
What is a VPN connection and why are so many people talking about it? The term crops up in every conversation about the internet lately, and for good reason. While VPNs were once novel tech solutions, they are now necessary tools. At the basic level, VPNs protect your privacy online so you cannot be targeted, tracked, or discriminated against based on location.
This guide tells you everything you need to know about VPNs. By the time you’re done reading, you’ll be a VPN master.
A VPN, or virtual private network, is a secure, encrypted connection between two networks or between an individual user and a network. VPNs allow you to surf the web in privacy.
Another way to understand it is to imagine that the internet truly is a cyber highway, and we zip around it on stylish Tron light cycles. We visit our favorite websites, make purchases in shops, check our portfolio, get our news from preferred sources, play games, and more.
Anyone with a mind to do so can follow you along these digital highways and byways. To see your online activity, who you are, where you like to visit, all anyone has to do is look. Worse, they can follow you home. You’re traceable.
A VPN works like a shroud of disguise, masking you in anonymity. You are trading in your identifiable light cycle for a rented car with tinted windows. You are cloaked in data encryption and safely hidden behind a false IP address.
The VPN encrypts everything you do online, everything you send and receive. By accessing the web only through a VPN gate, the source of your connection is shown as one of the many VPN routers, not your own.
A VPN is the closest you can get to true anonymity online without using the TOR network, which bounces your connection around a widely distributed network of volunteer relays, basically keeping your web activity in constant motion so nobody can focus on it. VPNs do not use this protocol, but they do offer sufficient — and essential — protection as you cruise through today’s deregulated and hacker-lined cyber highways.
Now that you know the VPN definition, let’s talk about why you need one. Because you do now more than ever.
Net neutrality is the principle that all ISPs (internet service providers) should treat all internet data equally — no discrimination and no favoritism. In December 2017, the FCC repealed net neutrality, which means you may now find yourself up against any number of conditions or prejudices based on what you’re trying to do online.
Back in April 2017, the FCC took its first step in this direction by overturning a rule that required ISPs to obtain customer consent before sharing or selling their specific data. Now, ISPs are free to sell your social security number, your geolocation, your health info, your browsing history, and any details it collects on you to the highest bidder. Using a VPN keeps you private, even to your own ISP, so nobody can track your movements or see your data.
Another strong reason for VPNs is the rise of the modern coffee shop, where you see as many laptops as you do lattes. Any public Wi-Fi hotspot is a haven for hackers. If you like to browse while enjoying your brew, using a VPN will block any hacker perched on the same Wi-Fi hotspot, trying to spy on you.
With this recent deregulation of the rules and the increase in sophisticated cybercrime, the internet is a lot like the wild west. VPNs keep you protected through the madness.
VPNs offer several advantages. Because you’re anonymous in that tinted-window rental car, nobody can tell where you actually are. Before you set out on the cyber highway, you can choose from a selection of IP addresses. If the VPN provider is robust enough, it will offer a good selection of different geographically-located IP addresses.
For instance, if you are visiting Paris and you come up against region-restricted access to a site you typically visit in the US, you just need to choose a US-based IP address from the VPN service and, suddenly your virtual rental car has US plates and you’re granted access. Likewise, for access to a site that is only available in France: choose an IP based in that region and, voilà, you’re French. Here are some use cases where a VPN would come in very handy:
Are there any downsides to VPNs? Comparatively speaking, the negatives are negligible, and the good outweighs the bad. Nevertheless, you should be in the know.
Is a VPN iPhone compatible? Does a VPN allow Android devices to hide from hackers’ spying eyes? The answer to both is yes. Anything connected to the internet will benefit from the privacy VPNs provide, and VPN services typically offer connection for multiple devices. Avast SecureLine VPN will cover up to five devices with one account.
However, while computers, tablets, and phones can each be connected individually to a VPN, it’s not so easy with IoT devices. For those, the best option is to set up your router with VPN protection. Then, everything that passes in and out of that main hub is protected. Certain routers are sold with VPN software already built into them.
So you want the rental car with the tinted windows? Then always connect to the web with your VPN service turned on. This immediately connects you to your VPN provider’s router, and it’s from there that you enter the information superhighway. Nobody can see your true IP address because you are now identified by your VPN’s address instead.
Additionally, your online connection itself is encrypted, so nobody can see the data you are uploading, downloading, or sending. What is encryption? It’s a method of changing readable text into an unreadable jumble of code. There are three main types of encryption: hashing, symmetric cryptography, and asymmetric cryptography. Each type has its own nuanced strengths and weaknesses, but they all succeed in scrambling your data so that it is useless in anyone else’s hands.
An extra layer of protection that most VPNs offer is their own DNS resolution system. The DNS (domain name system) is the internet’s phone book, equating text-based URLs with their appropriate IP addresses. The DNS allows you to type in a site name like “avast.com” rather than a long string of numbers. Cybercriminals can monitor DNS requests to track your movements online, but a VPN’s DNS resolution system is designed to thwart them with further encryption.
VPNs did not start out as the consumer product they are today. Microsoft developed the first one in 1996 to grant employees access to the company’s internal network from home. And the remote workstation was born.
This model redoubled company productivity, of course, (“You mean I can work on those spreadsheets in my pajamas?”) and more businesses began adopting it. This type of VPN use is in wide practice today — a standard feature of the modern business landscape globally.
Soon, the merits of having a VPN defender protecting one’s privacy caught on in the consumer sector. Developers saw that this secure “tunnel” in which one could commute to a network could be used to connect to the largest network on the planet, the world wide web. Almost everyone wants to stay private and anonymous online, and VPNs became the turnkey solution.
There are two basic types of VPNs. A remote access VPN allows users to connect to another network, be it the internet or their company’s internal system, through a private, encrypted tunnel.
The other type, a site-to-site VPN, is also called router-to-router VPN. This VPN is mostly used within corporate environments, specifically when an enterprise has headquarters in several different locations. The site-to-site VPN is used to create a closed, internal network where the various locations can all connect with each other. This is known as an intranet.
There are several VPN protocols, or methods of security. The oldest is PPTP, point-to-point tunneling protocol, which is still in use today, but widely considered one of the weaker protocols. Others are IPSec, L2TP, SSL, TLS, SSH, and OpenVPN. Many favor OpenVPN because it’s an open source software, meaning if a vulnerability in the programming is discovered, someone will say something before long and it will get patched quickly.
When choosing a VPN, you have options. Some would prefer to try a VPN free of charge. Free VPNs are great if you want to trial and see how it works. We recommend taking a trial for 7 days of SecureLine VPN Free. Once you try it, you’ll want the full version (yes, it does cost a little, but you get all the bandwidth and servers you need to access the content you want from wherever you are, plus all the protection when on free Wi-Fi).
Things to be aware of when trying a free version are:
1)They sometimes employ weaker protocols like PPTP.
2) they have fewer servers, so you are sharing bandwidth with others, which results in slower speeds.
3) they sometimes contain ads.
4) they usually have download limits. Just know this going in so that once you are convinced you need a VPN, you know these things will have higher performance in a paid VPN service.
Paid VPN services are superior, but each one is different. Here’s what to keep in mind as you search for your perfect VPN app:
There you go. You now understand the origin, evolution, and critical need for VPNs in this day and age. Make the smart choice and enjoy online freedom. Install Avast SecureLine VPN (you can try it for free!) to keep your internet connection secure. Remember...privacy is a right, not a privilege.
Large-scale cyberattack? Secure your devices and protect yourself and your data with these 7 simple tips. Protect your PC, your smartphone, and your family’s devices from big cyberattacks.
Your PC might be full of programs you didn’t even know about, such as trials, pre-installed toolbars and other hidden junk. This guide helps you identify this secret ‘bloatware’ you don’t need.