What are virtual private networks?

A few weeks ago, Ranveer wrote a post about the different ways you can surf the net anonymously. In it he mentioned that you could surf using a VPN client. In this article I am going to explain what a VPN is.

A VPN (or virtual private network) is a secure network connection, which can be used to send files, browse the net and download material securely. As the transfer is protected by encryption, the data sent can’t be read if intercepted.

A padlock on an ethernet cableThere are three key parts of a VPN: a host computer which can send and receive data; the internet, which is used as a medium to transport/transmit the data; and a device which can connect to the network, in order to receive the data. The last part of the network (the receiver) isn’t essential, but without anything to view the data, what’s the point in sending it?

Put simply, a VPN allows two computers to talk, as though they were connected on a private network, when in fact they are connected via a public network – the internet.

The way VPNs work is by establishing virtual point-to-point connections, using encryption or dedicated connections. Unless you are an IT engineer, you probably don’t need to worry about how it works though, just know that it does!

VPNs are very useful for businesses, as it enables employees to access secure internal files, remotely, without a security risk, as the network connection is private.

There are many reasons why an organisation may choose to have a VPN. VNPs can reduce firms need to hire dedicated secure long-distance lines to transmit data, as they use the existing infrastructure in place which the internet uses.

VNPs also reduce the need for long-distance telephone calls, which can often be very costly, therefore reducing them could save a business a lot of money!

As a VPN is a way of privately and securely connecting, it therefore be used to access the internet anonymously. That links back to what Ranveer discussed in terms of browsing the net anonymously. The way a VPN works, the data you request from a website when browsing, would go through the VPN first, before it gets to you, therefore if you are in the UK and the VPN is in the US, the site would think you were in the US due to it being the VPN requesting the data. Make sense?

There are definitely benefits of having a VPN for businesses, and if secure data needs to be shared to remote locations, it is one of the safest. That said, if the host has an unreliable IP, then the entire network is affected. Furthermore, they can also be costly to set up, as you need expert knowledge to establish them, which is why many organisations choose to outsource them, offloading the costs onto a third party who’s core business is VPN, and can therefore offer the service cheaper.

Do you have access to a VPN as part of your work? I would be interested to know, so if you do feel free to share your experiences in the comments.

Different ways of surfing anonymously

This is a sponsored post. To find out more about sponsored content on Technology Bloggers, please visit our Privacy Policy.

Many of the file sharing websites like Mediafire, Megaupload, Rapidhshare and torrent websites like torrentz.eu, monova.org, fenopy.eu etc. are blocked now in India in order to stop piracy of software and movies. But music and video lovers are looking for alternate ways to access these blocked websites. There are many alternative and secure ways to access these blocked websites without using proxy.

Using VPN Client

One of the easiest options is to use free VPN (Virtual Private Networks) services which can connect your network to remote servers in other countries and you can access these blocked sites easily. VPN uses a secure VPN tunnel to connect to remote sites through private channel. There are many free VPN services like proxpn, UltraVPN, OpenVPN etc. which can be downloaded free of cost. You can download the VPN client and install it on your desktop or laptop. Once you install and connect to the internet through VPN whatever data traffic and requests come from your machine will be sent in encrypted format through a secure VPN tunnel. Also the request will be anonymous and it won’t be possible to track your source IP address as NAT (Network Address Translation) happens which converts your private IP to public IP address.

Once you have installed the VPN you can automatically access any of the blocked sites as you will be accessing through a VPN server located remotely in some other country. Hence you can enjoy downloading your favorite movies and videos from websites like MegaUpload, Rapidshare, Mediarefire and other popular torrent websites even if you use HTTPS for secure connection. VPN is secure and safe way to access blocked sites and prevents your computer from getting attacked by spyware or malware. Many of modern browsers use VPN for connecting securely over internet.

Another option is use to free DNS services like Open DNS. You can use settings as 4.4.4.4 for preferred DNS and 8.8.8.8 for alternate DNS server. Once you download the VPN client install in your machine and restart it. Then start the VPN client by providing the username and password which is registered while downloading the VPN software. After that select any free server in USA, UK or any other foreign country and click Connect. You will notice the message that data transfer is SSL secure and now you are connected to internet through the VPN client. Now you can access any of blocked torrent websites and file sharing sites like Rapidshare or Megaupload easily.

Using Tor Browser for Anonymous Surfing

Another easy way for accessing blocked websites is by using proxy server. There are internet filters and firewalls which monitor user traffic and block access to such illegitimate sites. But using certain advanced tools you can bypass this filter and enjoy access to such blocked websites. One such tool is the Tor browser which was designed by U.S. Naval Research Laboratory for the purpose of anonymous and secure browsing.

In order to anonymously browse through internet without relying on external proxy server, you can use the Tor browser which can be downloaded freely from Tor website https://www.torproject.org/.

Tor ProjectOnce you download and install the Tor browser, start the application and open Vidalia control panel which automatically opens the Mozilla Firefox browser. Whatever requests come from your machine will get routed through anonymous servers maintained by Tor and will bypass internet filter which block access to specific websites. Hence, you can browse through your favorite file sharing and video sites without using an external proxy server. All, the user data will be erased from cache once you close the browser and is very secure.

EDITOR NOTE: There are many different ways you can access the internet, of which most are safe and legal. That said some methods could damage your computer and may not be legal in the country you are in, so always check beforehand – note by Christopher

Problems with online anonymity

The internet probably knows what your favourite shoes look like. How you may ask? Your data is being monitored through your PC without you hearing as much as a peep about it. Private firms can spy on users from the comfort of their own computers.

The FTC has recently handed in a report advising private firms to be more open about their data collection practices. New laws regarding user privacy are also currently being worked on.

Users who want to preserve any semblance of privacy left are looking into do-not-track tools. Some suggest adding a do-not-track option directly into browsers, while others are in favor of different software that can curb data collection altogether.

With regular website cookies come other tracking cookies that help the sites we’re visiting identify our user pattern and collect our data. Current data collection practices aren’t transparent, so we have no idea what these sites are up to once they have what they need.

Failure to comply

The universal do-not-track button goes as far as requesting a website that a user’s information not be tracked as they browse a site. However there’s no guarantee that the site will comply with the request.

This option does close to nothing in terms of blocking the websites access, largely because it can’t. Google’s recent fine for lifting data from open Wi-Fi connections without user permission and Facebook’s accessing people’s texts on app user’s cell phones is proof that firms don’t always adhere to the norms of privacy – and those are two really big firms.

At best a do-no-track tool will lull you into a false sense of security where in reality you have more than one front to protect yourself on. Large private firms aren’t the only ones stealing data; there are numerous other threats which one needs to take into account.

Monsters beneath your bed

Fighting against tracking cookies alone is as much the same as looking for the monster in the closet without realizing what’s hiding under your bed.

Options such as AVG’s Do-Not-Track or DNT+ will only go as far as the do-not-track button is meant to. However, PC monitoring tools and other forms of spyware could already exist on your system – granted the data would be going to a person and not a company.

Most computer monitoring software is wired to record your browsing history. Whether or not you’re deleting your cookies becomes irrelevant here. The same is the case with spyware or malware that you mistakenly download by clicking on obscure links or opening spam emails.

No free lunches

Free Wi-Fi is a real treat till you realize that there’s a chance it’s been decked up with computer monitoring software which can record every move you make on your browser. Software such are Firesheep and Wireshark can easily make their way into your system if you’re on a network that has them preinstalled. The Wi-Fi owner has no need to break into your system manually or be anywhere near you to figure out what you’re using the Wi-Fi for.

The WiFi LogoThat’s if you’re using someone else’s Wi-Fi. However even if your own Wi-Fi is open you’re in danger of being attacked. During 2010 reports that Google was lifting private data through open Wi-Fi’s first surfaced, and regardless of how apologetic Google was, it never stopped the practice.

Even with new laws in place for the preservation of user data and more transparency as to what cookies are infiltrating user systems, there’s still a large potential for data collection against a user’s will.

The best idea would be to take a holistic approach to your browsing experience and stay safe from all sides – after all don’t-track-tools are only one a small aspect of online safety, not the key.