SlideShare ist ein Scribd-Unternehmen logo
1 von 35
VIRTUAL PRIVATE NETWORK
SIKANDAR E AZAJM=55
SANA UR REHMAN=39
SYED M. HASHIR RAZA ZAIDI=07
UMUT PAPATYA=31
DAVUT KARASU=30
WHAT IS VPN?
•A technology that creates a network that is
physically public, but virtually private
•That is a Secure way of adding an extra level of
privacy to your online activity Like web surfing.
TRADITIONAL SYSTEM
Leased lines
VIRTUAL PRIVATE NETWORKS (VPN)
BASIC ARCHITECTURE
TYPES OF VPN
There are two basic VPN types which are explained below.
 Remote Access VPN
 Site – to – Site VPN
• Intranet VPN
• Extranet VPN
REMOTE ACCESS VPN
• A remote-access VPN allows individual users to establish secure
connections with a remote computer network.
• There are two components required in a remote-access VPN. The first
is a network access server(NAS).
• The other required component of remote-access VPNs is client
software
• Remote Access VPN is useful for business users as well as home
users.
• Home users, or private users of VPN, primarily use VPN services to
bypass regional(ISP) restrictions on the Internet and access blocked
websites. sensible Users of Internet security also use VPN services
REMOTE ACCESS VPN
SITE – TO – SITE VPN
• A Site-to-Site VPN is also called as Router-to-Router VPN and is
mostly used in the corporates.
• Companies, with offices in different geographical locations, use Site-
to-site VPN to connect the network of one office location to the
network at another office location.
• Basically, Site-to-site VPN create a virtual connection between the
networks at geographically offices and connect them through the
Internet and maintain a secure and private communication between
the networks.
INTRANET VPN
• Intranet VPNs link corporate headquarters, remote offices,
and branch offices over a shared infrastructure using
dedicated connections.
EXTRANET VPN
• When companies use Site-to-site VPN type to connect to the office of
another company, it is called as Extranet based VPN.
TYPES OF VPN PROTOCOLS
i. Internet Protocol Security or IPsec
ii. Layer 2 Tunneling Protocol (L2TP)
iii. Point – to – Point Tunneling Protocol (PPTP)
iv. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
v. Open VPN
INTERNET PROTOCOL SECURITY OR IPSEC
• Internet Protocol Security or IPsec is used to secure Internet communication
across an IP network.
• IPsec secures Internet Protocol communication by authenticating the
session and encrypts each data packet during the connection.
• IPsec can also be used with other security protocols to enhance the security
system
• IPsec exists at the network layer (Layer Three) of the OSI model. Ex in IP v4
optional
• Transport mode to protect data transfer between two different networks.
• Tunneling mode to encrypts the message in the data packet and the
tunneling mode encrypts the entire data packet
LAYER 2 TUNNELING PROTOCOL (L2TP)
• L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that
supports VPNs.
• Layer 2 Tunneling Protocol is a tunneling protocol that is usually
combined with another VPN security protocol like IPsec to create a
highly secure VPN connection.
• L2TP creates a tunnel between two L2TP connection points and IPsec
protocol encrypts the data and handles secure communication
between the tunnel
• L2TP was developed by Microsoft and Cisco as a combination
between PPTP and L2F(Layer 2 Forwarding).
POINT – TO – POINT TUNNELING PROTOCOL
(PPTP)
• PPTP or Point-to-Point Tunneling Protocol creates a tunnel
and encapsulates the data packet. It uses a Point-to-Point
Protocol (PPP) to encrypt the data between the connection.
• PPTP is one of the most widely used VPN protocol and has
been use in of Windows 95.
• develop by the Microsoft.
• compared to other methods, PPTP is faster
SSL AND TLS
• SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a
VPN connection where the web browser acts as the client and user access
is limited to specific applications in the whole network.
• SSL and TLS protocol is most commonly used by online shopping websites
and service providers.
• SSL connections have https in the beginning of the URL instead of http.
OPEN VPN
• Open VPN is an open source VPN that is useful for creating Point-to-
Point and Site-to-Site connections. It uses a custom security protocol
based on SSL and TLS protocol.
FIREWALL CONFIGURATION
• Firewall provides network security and business continuity .
• It prevents attacks, and secures your data communications with
multiple parallel Virtual Private Network (VPN) connections.
• There are two approaches to using a firewall with a VPN server:
VPN server in front of the firewall..
VPN server behind the firewall..
VPN SERVER IN FRONT OF THE FIREWALL.
VPN SERVER BEHIND THE FIREWALL
BENEFITS OF VPN
i. Access Blocked Websites & Avoid
Geographical Restrictions.
ii.Online Security & Privacy:
iii.Public Wi-Fi Security:
iv.Secure Connection to Remote Networks
v.Anonymous Browsing
ACCESS BLOCKED WEBSITES & AVOID
GEOGRAPHICAL RESTRICTIONS.
• VPN allows a user to access blocked websites and
circumvent geographical restrictions.
• Some countries keep restrictions on certain websites and
block these websites from being accessed by people living
in that country. This is called as Geo-blocking of the
websites. VPNs have a work around for this too and is more
popular for enabling users to access websites which are
otherwise blocked in their region or country
ONLINE SECURITY & PRIVACY:
•Our VPN uses high strength 256-bit encryption to
protect your data from spoofing eyes. Browse freely
from Wi-Fi hotspots with the comfort that you can’t
be tracked or monitored.
•It protects you from the prying(spoofing) eyes of
hackers and snoopers who want to capture your
passwords and personal information
PUBLIC WI-FI SECURITY:
• A VPN increases the security when connected to a public Wi-Fi
network.
• Public Wi-Fi networks like the ones you would find in a coffee shop or
in a hotel room are not as safe and secure as one might believe they
would be. Most public Wi-Fi networks are insecure and open since
they lack public Wi-Fi security encryption.
• It is easiest to hack or snoop into your connection when you are
connected through a public Wi-Fi network. If a user is connected on a
public Wi-Fi or an untrusted network (such as in a hotel, coffee shop,
other public places, etc.), the browsing activity of the user on non-
https websites could easily be snooped upon. Using Wireshark and
others
SECURE CONNECTION TO REMOTE
NETWORKS
• VPNs also allow users to connect to remote network securely.
• Most business use Virtual Private Network to allow their employees to
access their company’s private network securely while being
physically away from the company premises. The employees could be
traveling around the world and still connect to the secure private
network of their company to access files, applications, and other
resources on the office network.
ANONYMOUS(SECRET) BROWSING
• VPN service enables a user to browse through the Internet completely
anonymously(secret).
• A lot of people who are concerned about their security and privacy
prefer to browse the Internet anonymously. A VPN connection would
create a secure encrypted tunnel between a user’s computer or
mobile device to the VPN Server, enabling the user to carry out online
activities anonymously.
DISADVANTAGES OF VPN
• VPNs require detailed understanding of network security issues and
careful installation / configuration to ensure necessary protection on a
public network like the Internet.
• The reliability and performance of an Internet-based VPN is not
under an organization's direct control. Instead, the solution relies on
an ISP and their quality of service.
PRACTICAL EXAMPLE
• My Recommended website of VPN.
“WWW.VPNBOOK.COM”
1st of all open the vpnbook.com and select on PPTP Tab.
STEP:2
• Then open the CONTROL PANEL and select the NETWORK AND
SHARING CENTER.
STEP:3
• Select the SET UP A NEW CONNECTION and select the
CONNECT TO A WORK PLACE.
STEP:4
• Select NO CREATE A NEW CONNECTION.
• Select USE MY INTERNET CONNECT (VPN)
STEP:5
• Type the VPN server Address or name of the server then click on
create.
“EURO217.VPNBOOK.COM”
STEP:6
• Click on the NETWORK ICON
• Click on VPNBOOK EURO (type in pervious step)
• Then click on CONNECT and then type the USER NAME and
PASSWORD of the VPN server from VPNBOOK.COM and click on ok
QUESTIONS & COMMENTS ?
Virtual Private Network

Weitere ähnliche Inhalte

Was ist angesagt?

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
Kanika Gupta
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 

Was ist angesagt? (20)

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn
VpnVpn
Vpn
 
Vpn ppt
Vpn pptVpn ppt
Vpn ppt
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
VPN
VPNVPN
VPN
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 
Vpn
VpnVpn
Vpn
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
VPN Network
VPN NetworkVPN Network
VPN Network
 
Network security
Network securityNetwork security
Network security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewalls
FirewallsFirewalls
Firewalls
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Ähnlich wie Virtual Private Network

Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
Debasis Chowdhury
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
Abhinav Dwivedi
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajan Kumar
 

Ähnlich wie Virtual Private Network (20)

VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
online-module-guide.pdf
online-module-guide.pdfonline-module-guide.pdf
online-module-guide.pdf
 
Vpn
VpnVpn
Vpn
 
VPN
VPNVPN
VPN
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Husky VPN.pdf
Husky VPN.pdfHusky VPN.pdf
Husky VPN.pdf
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
Virtual private network feature and benefits
Virtual private network feature and benefitsVirtual private network feature and benefits
Virtual private network feature and benefits
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
The Virtual Private Network
The Virtual Private NetworkThe Virtual Private Network
The Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn networks kami
Vpn networks kamiVpn networks kami
Vpn networks kami
 

Kürzlich hochgeladen

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Kürzlich hochgeladen (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 

Virtual Private Network

  • 1. VIRTUAL PRIVATE NETWORK SIKANDAR E AZAJM=55 SANA UR REHMAN=39 SYED M. HASHIR RAZA ZAIDI=07 UMUT PAPATYA=31 DAVUT KARASU=30
  • 2. WHAT IS VPN? •A technology that creates a network that is physically public, but virtually private •That is a Secure way of adding an extra level of privacy to your online activity Like web surfing.
  • 4. VIRTUAL PRIVATE NETWORKS (VPN) BASIC ARCHITECTURE
  • 5. TYPES OF VPN There are two basic VPN types which are explained below.  Remote Access VPN  Site – to – Site VPN • Intranet VPN • Extranet VPN
  • 6. REMOTE ACCESS VPN • A remote-access VPN allows individual users to establish secure connections with a remote computer network. • There are two components required in a remote-access VPN. The first is a network access server(NAS). • The other required component of remote-access VPNs is client software • Remote Access VPN is useful for business users as well as home users. • Home users, or private users of VPN, primarily use VPN services to bypass regional(ISP) restrictions on the Internet and access blocked websites. sensible Users of Internet security also use VPN services
  • 8. SITE – TO – SITE VPN • A Site-to-Site VPN is also called as Router-to-Router VPN and is mostly used in the corporates. • Companies, with offices in different geographical locations, use Site- to-site VPN to connect the network of one office location to the network at another office location. • Basically, Site-to-site VPN create a virtual connection between the networks at geographically offices and connect them through the Internet and maintain a secure and private communication between the networks.
  • 9. INTRANET VPN • Intranet VPNs link corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.
  • 10. EXTRANET VPN • When companies use Site-to-site VPN type to connect to the office of another company, it is called as Extranet based VPN.
  • 11. TYPES OF VPN PROTOCOLS i. Internet Protocol Security or IPsec ii. Layer 2 Tunneling Protocol (L2TP) iii. Point – to – Point Tunneling Protocol (PPTP) iv. Secure Sockets Layer (SSL) and Transport Layer Security (TLS) v. Open VPN
  • 12. INTERNET PROTOCOL SECURITY OR IPSEC • Internet Protocol Security or IPsec is used to secure Internet communication across an IP network. • IPsec secures Internet Protocol communication by authenticating the session and encrypts each data packet during the connection. • IPsec can also be used with other security protocols to enhance the security system • IPsec exists at the network layer (Layer Three) of the OSI model. Ex in IP v4 optional • Transport mode to protect data transfer between two different networks. • Tunneling mode to encrypts the message in the data packet and the tunneling mode encrypts the entire data packet
  • 13. LAYER 2 TUNNELING PROTOCOL (L2TP) • L2TP (Layer 2 Tunneling Protocol) it’s another tunneling protocol that supports VPNs. • Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined with another VPN security protocol like IPsec to create a highly secure VPN connection. • L2TP creates a tunnel between two L2TP connection points and IPsec protocol encrypts the data and handles secure communication between the tunnel • L2TP was developed by Microsoft and Cisco as a combination between PPTP and L2F(Layer 2 Forwarding).
  • 14. POINT – TO – POINT TUNNELING PROTOCOL (PPTP) • PPTP or Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the data packet. It uses a Point-to-Point Protocol (PPP) to encrypt the data between the connection. • PPTP is one of the most widely used VPN protocol and has been use in of Windows 95. • develop by the Microsoft. • compared to other methods, PPTP is faster
  • 15. SSL AND TLS • SSL (Secure Sockets Layer) and TLS (Transport Layer Security) create a VPN connection where the web browser acts as the client and user access is limited to specific applications in the whole network. • SSL and TLS protocol is most commonly used by online shopping websites and service providers. • SSL connections have https in the beginning of the URL instead of http.
  • 16. OPEN VPN • Open VPN is an open source VPN that is useful for creating Point-to- Point and Site-to-Site connections. It uses a custom security protocol based on SSL and TLS protocol.
  • 17. FIREWALL CONFIGURATION • Firewall provides network security and business continuity . • It prevents attacks, and secures your data communications with multiple parallel Virtual Private Network (VPN) connections. • There are two approaches to using a firewall with a VPN server: VPN server in front of the firewall.. VPN server behind the firewall..
  • 18. VPN SERVER IN FRONT OF THE FIREWALL.
  • 19. VPN SERVER BEHIND THE FIREWALL
  • 20. BENEFITS OF VPN i. Access Blocked Websites & Avoid Geographical Restrictions. ii.Online Security & Privacy: iii.Public Wi-Fi Security: iv.Secure Connection to Remote Networks v.Anonymous Browsing
  • 21. ACCESS BLOCKED WEBSITES & AVOID GEOGRAPHICAL RESTRICTIONS. • VPN allows a user to access blocked websites and circumvent geographical restrictions. • Some countries keep restrictions on certain websites and block these websites from being accessed by people living in that country. This is called as Geo-blocking of the websites. VPNs have a work around for this too and is more popular for enabling users to access websites which are otherwise blocked in their region or country
  • 22. ONLINE SECURITY & PRIVACY: •Our VPN uses high strength 256-bit encryption to protect your data from spoofing eyes. Browse freely from Wi-Fi hotspots with the comfort that you can’t be tracked or monitored. •It protects you from the prying(spoofing) eyes of hackers and snoopers who want to capture your passwords and personal information
  • 23. PUBLIC WI-FI SECURITY: • A VPN increases the security when connected to a public Wi-Fi network. • Public Wi-Fi networks like the ones you would find in a coffee shop or in a hotel room are not as safe and secure as one might believe they would be. Most public Wi-Fi networks are insecure and open since they lack public Wi-Fi security encryption. • It is easiest to hack or snoop into your connection when you are connected through a public Wi-Fi network. If a user is connected on a public Wi-Fi or an untrusted network (such as in a hotel, coffee shop, other public places, etc.), the browsing activity of the user on non- https websites could easily be snooped upon. Using Wireshark and others
  • 24. SECURE CONNECTION TO REMOTE NETWORKS • VPNs also allow users to connect to remote network securely. • Most business use Virtual Private Network to allow their employees to access their company’s private network securely while being physically away from the company premises. The employees could be traveling around the world and still connect to the secure private network of their company to access files, applications, and other resources on the office network.
  • 25. ANONYMOUS(SECRET) BROWSING • VPN service enables a user to browse through the Internet completely anonymously(secret). • A lot of people who are concerned about their security and privacy prefer to browse the Internet anonymously. A VPN connection would create a secure encrypted tunnel between a user’s computer or mobile device to the VPN Server, enabling the user to carry out online activities anonymously.
  • 26. DISADVANTAGES OF VPN • VPNs require detailed understanding of network security issues and careful installation / configuration to ensure necessary protection on a public network like the Internet. • The reliability and performance of an Internet-based VPN is not under an organization's direct control. Instead, the solution relies on an ISP and their quality of service.
  • 27. PRACTICAL EXAMPLE • My Recommended website of VPN. “WWW.VPNBOOK.COM” 1st of all open the vpnbook.com and select on PPTP Tab.
  • 28. STEP:2 • Then open the CONTROL PANEL and select the NETWORK AND SHARING CENTER.
  • 29. STEP:3 • Select the SET UP A NEW CONNECTION and select the CONNECT TO A WORK PLACE.
  • 30. STEP:4 • Select NO CREATE A NEW CONNECTION. • Select USE MY INTERNET CONNECT (VPN)
  • 31. STEP:5 • Type the VPN server Address or name of the server then click on create. “EURO217.VPNBOOK.COM”
  • 32. STEP:6 • Click on the NETWORK ICON • Click on VPNBOOK EURO (type in pervious step) • Then click on CONNECT and then type the USER NAME and PASSWORD of the VPN server from VPNBOOK.COM and click on ok
  • 33.