Explanation of a VPN

If you have a private network in say your office or home you can extend that network using a virtual private network. This means that people can receive and send data which is encrypted over distances. The connection is thought of as a tunnell Security and ease of management are hugely important for it's users. Many companies use VPN to allow their staff to access the companies servers in a secure manner allowing them to work away from the office or indeed for those working in seperate offices in say different states.

For those who are the majority of the users of this site the main use is to avoid censorship in their country or organizations that block people by geolocation. VPN are often banned in countries such as China. Types of protocols include Internet Protocol Security (IPsec), Transport Layer Security (SSL/TLS), Datagram Transport Layer Security (DTLS), Microsoft Point-to-Point Encryption (MPPE), Microsoft Secure Socket Tunneling Protocol (SSTP, ), Multi Path Virtual Private Network (MPVPN)and Secure Shell (SSH) VPN

With VPN authentication - this MUST be established before the tunnels can be connected. Commonly used are biometrics, passwords, two factor authentication, digital certificates and other encryption methods. You can also have VPNs on your smartphone - They are especially useful for securing yourself on WIFI. Public services such as police use for access sensitive data or e.g. dispatch data. For more information go here Wiki VPN

There are of course many VPN available for individuals, most you have to pay for, usually on a monthly basis. However there are some free VPN. I tend to use reviews in the PC Mag where here is a list of the free ones - Free VPN As with the paid ones you can use to avoid stalking, changing your IP, watching Netflix if you are blocked regionally. The main differences between paid and unpaid are the free ones tend to have ads on them and be limited as to the amount of bandwidth you can use and how fast the VPN will run.

This site of course provides a proxy service that is perfectly safe with no restrictions as to bandwidth usage and are free. We add a few adverts to pay for the bandwith and the dedicated servers. All our sites are fully encrypted ad the domain name changed at least five times a week to avoid being blocked. So when to use a VPN - when you find specific things you can't wo with a proxy such as accessing Netflix. Then it is worthwhile looking at paying for a decent VPN with high speed, and unlimited broadband.

Online Privacy Advise

Internet Privacy Ever since the internet came to be, the issue of online privacy has been a growing concern. Every time people are online sharing, there is always the possibility that someone is watching, listening or even stealing! Such concerns have now exceedingly risen with the arrival of online banking and social networks. Today, it is only natural to be skeptical on how much of your online activity is indeed private. Besides the laws and treaties being signed to protect privacy while on the internet, there are measures that we as individuals could deploy to ensure that we are secure online. Some of the measures include; Configuring Your Browser You can easily configure your browser to better privacy and security while online. Perhaps the most common and basic measure you can do it yourself is going to your browser preference settings and enable your browser to turn down any cookies of any site you have not visited (third party cookies) since it is logical that you would want cookies from the sites you normally visit Encrypt Your Cloud Storage Storage of anything personal and private in the cloud requires the strongest kind of encryption. Encryption strengths come in several standards. However, the best possible strong encryption you could use is the RSA 2048-bit key encryption. If youíve any information stored on the internet that you donít want anyone accessing or seeing it except yourself then this is a good reason to have it encrypted. Two Levels Of Authentication The use of password based methods of authentication is being replaced since they are prone to hacks. technologies such as two-factor authentication, fingerprint scan, and keyfob-generated password methods are now being used as they are more secure. In case your account uses a password based form of authentication, ensure you have a strong password. It should be hard to guess nor should you use the same password on multiple accounts. Always ensure your password test returns show strong anytime you are creating a password. In overall, nothing can be done to advance internet privacy if we do not take the necessary steps also as internet users. The internet runs on a borderless network. Its reach is far way bigger to be limited by any form of law or treaty. However, in the time being, we can ensure that our privacy is secure and that our information is safe by applying the above-mentioned measures among much more. It is up to you to choose which method better works for you as long as your privacy is protected online!