Protecting your online communications with a Virtual Private Network


Author: Andrew Galt

Almost every bit does travel the Internet unencrypted and in plain sight of anyone caring to read them, except for those traveling through SSL tunnels. Don't know what I'm talking about? A question: have you ever visited a website using the https protocol? Then you transferred some bits through SSL.

But not all traffic goes encrypted. In fact, despite more and more servers and websites are implementing https now, the most of them send and receive plain text bits. And this means an occasional attacker could read those bits and extract information: from personal and location information to credit card numbers or bank details.

One way to protect our traffic from this attackers is connecting the Internet through a Virtual Private Network or VPN. A VPN is a secure and encrypted connection that provides security and privacy once your data leaves your computer. This tool has been used for years all around the corporate world to allow mobile workers connect and use corporate servers from anywhere they were. But there are other ways to enjoy them.

We can connect the Internet from an anonymous international gateway, this means some different things: the website we connect to will think we are coming from the server's address and not from our own home. This is useful to bypass censorship and limitations or to overcome restrictions depending where you live, as we will be 'digitally residing' in another country.

Other uses are, for example, hide our connection from the eyes of someone we don't want to know about us, and mask our digital identity. Think of this: When you connect your home computer to the Internet, your ISP logs each and every website you visit. Without exception. The same goes for search engines storing each of your search. And with all this crappy legislation, you should take for granted you are being monitored to some extent.

Finally, a VPN protects us from really bad intentioned attackers, specially if we use insecure networks, as for example public WiFi spots in the street, airports, train stations...

How to choose a good VPN service

When deciding what VPN service to choose, there are a bunch of factors to bear in mind. First of all, there are some services which works with bandwidth and transfer limitations.

You also have to look at the allowed connections: how many devices you will be able to connect using the service (even if not using them at the same time).

A third thing to watch is the gateway switching, because some providers only offer monthly limited gateway switching, this is, changing from one gateway to another. I saw one which only offered 4 changes in a month!

And a fourth aspect is, if you actually use it, torrent quota. There are providers who explicitly ban P2P torrent file-sharing on their VPN plans. Other providers have transfer limits over torrent sharing, and other providers simply don't mind about that and allow full and complete use of any P2P file-sharing software.

Using a VPN service is not only a tool to access to somewhat "forbidden" websites or content. This is not a malevolous 'hacking tool'. It's perfectly legal (except in countries like Iran...) and helps us to protect our entire communications and keep them away from anyone not involved in them. It enhances our privacy, improves the security of our devices and it's a "should have" tool.

About the Author

Andrew has been involved in online marketing and business for years. Specialized in health issues, he also loves playing videogames, mess with tech and computers and, above all, be with his family when he is not running his business.


More Resources

Three-pronged Trojan Attack Threatens Security on the Internet
Glieder (Win32.Glieder.
Personal Firewalls - Secure Your Computer
There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet.
Types Of Computer Infections
Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer.
Network Security 101
As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes.
Secure Your PC From Hackers, Viruses, and Trojans
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
What Every Internet Marketer Should Know About Spyware
If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things.
Delete Cookies: New-Age Diet or Common Sense Internet Security?
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them.
Desktop Security Software Risks - Part 1
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts.
Identity Theft -- 10 Simple Ways to Protect Your Good Name!
Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name.
How Can Someone Get Private Information From My Computer?
From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S.
Make Money Online - Latest Scam Disclosed
Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time.
Protecting Your Home Both Inside and Out
If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged.
7 Ways to Spot a PayPal Scam E-Mail
Paypal is a great site and is used by many to send and receive money. Unfortunately some dishonest people are using the Popularity of Paypal to line their own pockets with gold at the expense of unsuspecting Pay Pal members.
How Free Scripts Can Create Security Problems
With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards.
Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge
Is your enterprise following the rules?The bulk of financial information in many companies is created, stored and transmitted electronically, maintained by IT and controlled via information integrity procedures and practices. For these reasons, compliance with federal requirements such as the Sarbanes-Oxley Act (SOX) is heavily dependent on IT.
Hacked: Who Else Is Using Your Computer?
A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain.
Spyware, This Time Its Personal!
First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission..
A Basic Introduction To Spyware
Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating.
Watch Out For That Scam
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint submissions for 2004, an increase of 66.6% from 2003.

More Security Information:

Related Articles

An Open Door To Your Home Wireless Internet Network Security?
This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk.
Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms
Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
40 Million People Hacked - YOU as Identity Theft Victim
Saturday, MasterCard blamed a vendor of ALL credit cardproviders called CardSystems Solutions, Inc., a third-partyprocessor of payment card data, as the source of loss of 40million consumers credit card information.
Consumers: Shop Online and Get Information Safely
Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker.
Why you Must Secure your Digital Product and Thank You Web Page
A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until.
Hacking Threats and Protective Security
The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000.
DOS Attacks: Instigation and Mitigation
During the release of a new software product specialized to track spam, ACME SoftwareInc notice that there was not as much traffic as they hoped to receive. During furtherinvestigation, they found that they could not view their own website.
Virus Nightmare..Lessons Learned
I got a virus the other day, Thursday I believe and since then I have been making FRANTIC efforts to save all my info.The most important thing for me to save are my Outlook Express emails and my Roboform passwords.
Internet Privacy
Over the past few years as the internet has become more and more popular, privacy has become a major issue.Just as if you are walking down the street and can be watched, every click of your mouse every website you browse, or file you download, is traceable.
Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers
I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800.
Wells Fargo Report Phishing Scam
First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information.
Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders
Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties.
How To Avoid Hackers From Destroying Your Site?
Recently, my site and other internet accounts ( http://www.nabaza.
Make Money Online - Defend Against The Latest Scam
First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product.
Protection for Your PC - Painless and Free!
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance.
Computer Viruses - How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable.
Dont Get Hacked - A Guide to Protecting Your Business from Thieves
You've seen it in the news - 40 million credit cards exposed!With all the news about web sites being hacked and cyberthieves stealing credit card numbers and other personal data,it's no wonder that some shoppers are still hesitant to providepayment information online. You don't have to be.
8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
Ebay is a great site and is used by many to buy and sell new and used Items. It truly is the worlds Largest Garage Sale Unfortunately when an online site becomes as big and popular as E-Bay the scam artists seem to just naturally follow.
Spyware Protection Software
Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically.