It gives you Online privacy and anonymity by creating a private network from a public internet connection. Actually most of the people don't know that why VPN is used and how its work. so no need to worry about it. I will cover all the topics of VPN which everyone should know.


What is VPN?

VPN stands for Virtual Private Network. It is an encrypted connection over the Internet from a Device to a network. When you use VPN it gives you online privacy and anonymity by creating a private network from a Public internet connection. Its encrypted connection helps ensure that sensitive data is safely transmitted. And due to this it makes more difficult situation for third parties to track your activities online and steal data.
  • VPN technology is widely used in Government agencies and Corporate environment because An employee can work outside the office/corporate and still securely connect to the office/corporate network.

How VPN works ?

 VPN encrypts your communication on any device you are using, including Phone, laptop or tablet. It sends your data through a secure tunnel to the VPN service Providers servers. Your data is encrypted and routed to whatever site you are trying to reach.

  • VPN connection will encrypt your data traffic, making it much more difficult for Hackers and Other Parties to Intercept and view your personal information.
  • In VPN secure connection also provides the user with increased anonymity, because the internet traffic is rerouted through an external VPN server. Here you are surfing the web via the IP address of the VPN server, your real IP address will remain hidden.

Benefits of a VPN connection

  • Encrypt your web activity
  • Hide your Physical Location
  • Adding to your web anonymity
  • Protecting your online data from being used to make you vulnerable to spear phishing.
  • Securing the personal information you and receive while on public wifi.
  • Avoid Bandwidth-throttling
  • Access region-blocked services
  • Avoid censorship when traveling abroad.

List of Best and Most used VPN Worldwide

  • Nord VPN
  • Surf Shark
  • Express VPN
  • HotSpot shield
  • CyberGhost
  • Proton VPN
All these VPN are Mostly available for all the platforms Like Windows, Mac, Linux, Android, IOS.

Types of VPN
There are basically two types of VPN 

1.Remote Access VPN

  • Remote access VPN allow a user to connect to a private network and access its services and resources remotely.
  • The connection between the user and the private network happens through the Internet and the connection is fully secured and private.
  • Remote access VPN is useful for business users as well as home users.
  • An employee of a company, while he/she is out of station, Using a VPN he/she can connect to their company's private network and remotely access files and resources on the private network.
  • Home users of VPN, primarily use VPN services to bypass regional restriction on the internet and access blocked website. and it also enhance Internet security and privacy.

2.Site to Site VPN

  • Site-to-site VPN is also known as Router-to-Router VPN.
  • It is mostly used in the large companies.
  • Companies or organization, with branch office in different geographical locations, use Site-to-site VPN to connect the network of one office location to the network at another office location.
  • Basically, Site-to-site VPN creates a virtual bridge between the network at geographically distant offices and connect them through the internet and maintain a secure and private communication between the networks.
  • Site-to-site VPN is based on Router-to-Router communication. In this VPN type one router acts as a VPN client and another router as a VPN server.

Site-to-site VPN are of two types

  • Intranet Based VPN:-When multiple offices of the same company are connected using site-to-site VPN type, it is called as Intranet based VPN.
  • Extranet Based VPN:-When companies use site-to-site VPN type to connect to the office of another company, it is called as Extranet based VPN.

Types of VPN Protocols

Each of these VPN protocols offer different features and different levels  of security

1.Internet Protocol Security Or IPSec:-

  • Internet Protocol Security or IPSec is used to secure Internet communication across an IP network.
  • IPSec secures Internet Protocol communication by authenticating the session and encrypts each data packets during the connection
  • IPSec can also be used with other security protocols to enhance the security system.
IPSec operates in two modes to protect data transfer between two different networks
  • Transport Mode:-It encrypts the message in the data packets.
  • Tunneling mode:-It encrypts the entire the data packets.

2.Layer 2 Tunneling Protocol (L2TP):-

  • Layer 2 Tunneling Protocol is a tunneling protocol that is usually combined with another VPN security protocol to create a highly secure VPN connection.
  • Layer 2 Tunneling Protocol creates a tunnel between two L2TP connection points. and IPSec protocol encrypts the data and handles secure communication between the tunnel.

3.Point-to-Point Tunneling Protocol(PPTP):-

  • Point-to-Point Tunneling Protocol creates a tunnel and encapsulates the data packet.
  • It uses a Point-to-Point Protocol to encrypt the data between the connection.

4.SecureSocketsLayer(SSL) and Transport Layer Security(TLS):-

  • SSL(Secure Socket Layer) and TLS(Transport Layer Security) create a VPN connection where the web browser acts as the client and user access is restricted to specific applications instead of entire network.
  • SSL and TLS Protocol is most commonly used by online shopping websites and service providers.
  • Now a days Web browsers comes integrated with SSL and TLS. SSL connection have https in the  beginning of the URL instead of http.

5.OpenVPN:

  • OpenVPN is an open source VPN that is useful for creating Point-to-Point and site-to-site connections. It uses a custom security protocol based on SSL and TLS protocols.

6.Secure Shell(SSH)

  • Secure Shell or SSH creates the VPN tunnel through which the data transfer happens and also ensures that the tunnel is encrypted.
  • SSH connection are created by a SSH client and data is transferred from a local port on to the remote server through the encrypted tunnel.

According to my Opinion and most of the cyber security experts also say that everybody should use VPN to stay anonymous on the internet and for their privacy. And one of the most important thing is that whenever you are connected to a public WIFI don't forget to use a VPN connection.

If you loved this post and found something informative Do share with your friends.


Thanks For reading.... 😃