What is a VPN?

what is VPN

You’ve heard the term, but what is VPN? And what are some of the specifics of VPN technology? These are some questions you might want to answer before checking out our VPN options, and knowing the answers will make you look smart in the company of your tech-savvy friends.

Virtual Private Network

VPN stands for Virtual Private Network. Let’s break down the each individual component. Virtual relates to the fact that a VPN network is a non-tangible mechanism which facilitates a point-to-point connection by using encryption, a dedicated connection, or a combination of each. The VPN is virtual in the sense that it doesn’t physically reside where you connect to the Internet. A VPN is private because only those who have the credentials supplied by the VPN administrator can connect to it. Finally, it is a network in that the VPN connection is shared by multiple users. That’s the elaborated answer for “what is VPN?”

Simplified, a VPN is a remote connection that allows an authorized group of users to access the Internet via an encrypted connection.

VPN Security Protocols

A specific characteristic of VPN technology is that it operates according to certain security protocols, thereby making it a safer option for Web access. VPN’s prevent personal information from being disclosed by only allowing authenticated access to the server and also by encrypting (think of creating a ciper or secret code) the data that is passed across the network.

VPN’s work on a model of security which includes three primary elements:

Confidentiality insures that those who access the VPN network are protected against attempts to “sniff” personal data. Data becomes unrecognizable gibberish when it is encrypted, and complex keys are required to decrypt the data. This aspect can also reflect the VPN provider’s policy to not log or otherwise keep records of user’s browsing activity.

Authentication means that only those with the proper credentials can access the VPN tunnel. Each time a user attempts to access the VPN their access must be authenticated by multiple measures, beginning with a username and password.

Integrity is used to detect and identify any tampering with transmitted messages. Basically, the integrity of a VPN is an outgrowth of the first two security principles.

Simplified, VPN security safeguards you against tampering and observation of your Internet activities and private data.

Know the basics of VPN

One of the best things about a VPN account from VPN-accounts.com is that you don’t need to be able to explain all the technical aspects of tunneling and encryption to use the technology. A VPN is a bit like a lightswitch. Once the technology is in place, you simply need to turn it on to take advantage of the benefits. If you know the basics, when someone asks, “What is VPN?”, you can give an intelligent answer, but realize that you don’t have to be a technology wizard to use a VPN for added security. To buy a vpn click here.

3 Steps for a VPN

01

Sign upGet an affordable VPN account.

02

ConnectConfigure the VPN on your device.

03

Enjoy VPNEnjoy the benefits of a VPN today.

Get a VPN Account

Connect & Enjoy: Internet Freedom, Privacy & security.

What is VPN Tunneling

VPN Tunnel - TunnelingIf you are new to the concept of a VPN, you’ll probably notice that the words tunnel or tunneling keep popping up in the things you read. It is important for you to know that understanding the specifics of VPN tunneling is not necessary for you to use a VPN.

Tunneling is the idea upon which VPN technology is based. The tunnel is the medium through which your Internet traffic is encrypted and secured by the VPN. For those that are so inclined, we offer the following information on a VPN tunnel.

Two types of VPN tunneling

There are two types of tunneling used in a VPN. They are known as voluntary and compulsory, respectively. We’re going to focus more on a VPN tunnel that is voluntary because that is the type of VPN service we provide to increase your Internet security, but first let’s briefly discuss compulsory tunneling.

A compulsory VPN tunnel is one where the carrier network provider manages the setup of the VPN connection. The main thing you need to know about a compulsory tunnel is that the ISP has full management control of the VPN tunnel. This is not the type of VPN tunneling you want to select for your personal service.

A voluntary tunnel, like the one VPNaccounts provides, puts you in full control. You manage the setup of your VPN, and you choose when to connect to it. First, you make a connection to your access point or ISP. Next, you connect to your VPN which creates the tunnel to the VPN server over your live connection.

The great thing about a voluntary tunnel like the one we offer is that how and when you use the VPN to connect is something you decide. There may be times when you don’t feel a VPN is necessary, like when you are using your own secured network at home (although, using a VPN even at home can sometimes be very useful). Other times, such as when you are traveling abroad, a VPN tunnel will be a necessity.

Your own private tunnel bear

As we mentioned, the concept of the tunnel is central to VPN technology. What is a tunnel? It is a passage, plain and simple, from your machine to the access point. Before information can get to and from your machine to the access point is has to pass through that tunnel.

Standing guard in the tunnel is something called encryption. You can think of encryption as your own private tunnel bear. The tunnel bear (encryption) provides  the security which makes a VPN effective in preserving your anonymity online.

The VPN protocols

Tunneling works because of something known as a protocol. There are actually three types of protocol, but we’re going to hit the high points on the most common one: PPTP.

A few different corporations worked together to develop PPTP for VPN tunneling, but what made it the most popular protocol from the beginning was full Microsoft support. Pretty much every modern version of Windows includes PPTP support in the form of an integrated client. In the beginning, some people criticized the security of Microsoft’s built-in client, but over time the computer giant has developed better PPTP support.

The key thing to understand here, without getting bogged down in a lot of technical jargon, is that your device already has a VPN client installed. That means you do not need to download any software when you purchase a VPN from VPNaccounts. All you need to do is configure it, and we provide simple instructions that will have your VPN up and running in a matter of minutes.

An overview of VPN tunneling

Here is an overview of the basic steps in establishing the VPN tunnel:

  1. You buy a VPN account.
  2. You connect to your ISP.
  3. You connect to your VPN.
  4. PPTP creates a control connection between the VPN client and the VPN server.
  5. The tunnel is established.
  6. You browse as normal, but your data transfer is now encrypted.

PPTP is what maintains the VPN tunnel. It supports authentication, encryption, and packet filtering.

A VPN tunnel is very useful when you are traveling and want to view restricted content or web services that are not available outside of your home country. In truth, that is what most people use a VPN for. Let’s not forget, however, about the VPN tunnel’s role in overall security. When you create that tunnel, your data becomes much harder for anyone to snoop. This is very important if you spend a lot of time connecting to public Wi-Fi hotspots.

Learning a little about the tunneling process is helpful, especially if you want to talk with your VPN provider about the specific protocols they use. At VPNaccounts, we are always happy to answer any questions you may have about VPN service.

3 Steps for a VPN

01

Sign upGet an affordable VPN account.

02

ConnectConfigure the VPN on your device.

03

Enjoy VPNEnjoy the benefits of a VPN today.

Get a VPN Account

Connect & Enjoy: Internet Freedom, Privacy & security.