Skip to content

A VPN Masks Your Real IP Address. How It Does That Will Amaze You.

A VPN Masks Your Real IP Address. How It Does That Will Amaze You.

A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs.

Why use a VPN?

Most VPN’s are used to add security. Today’s world is evolving quickly and the security pitfalls of modern conveniences are often ignored. Public WIFI hotspots, common in airports and coffee shops, are a hackers dream because they offer streams of visible data waiting to be mined. Using a VPN keeps your information secure.

Deep Packet inspection is another growing concern. Many ISPs would like to analyze statistics from your online activities for marketing and routing purposes. Using a VPN thwarts efforts to conduct deep packet inspections.

Similarly, search engines and social networking sites, like Google and Facebook, are storing information about your online habits indefinitely. Since a VPN provides the user with a different IP address, these privacy invasions are also thwarted.

VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

Protocols

PPTP is the most common VPN protocol. It uses TCP port 1723 and Generic Routing Encapsulation (GRE) to secure packets. The main advantage of PPTP is that all major operating systems and many smartphones can natively use PPTP without any additional software.

IPsec is a protocol suite developed with IPv6 and often used in conjunction with L2TP tunneling. IPSec VPN services usually require third party software. Associated licensing costs are one of the largest cons of IPsec.

SSL/TLS is the most common encryption protocol on the Internet. Many SSL VPN plans use the OpenVPN client. This free, multi-platform client and the vibrant community that supports it have helped SSL VPNs rise to prominence.

SSTP is the newest popular protocol. It transports PPP or L2TP packets through an SSL 3.0 channel. Since SSTP uses the common HTTPS port 443, it is hard to block in highly censored regions, like the Middle East. Unfortunately, SSTP is only available on Windows Vista and Windows 7 computers.

Pay VPN Service Providers

Select which best describes what you want most from your VPN:
Security
I want protection from hackers
on public Wi-Fi and other
unsecured networks
Privacy
I want to prevent my government,
ISP and advertisers from
tracking me
Unblocking
I want to bypass Netflix
restrictions, geo-restrictions and
other internet filters
VPN Simplifier

Related Articles

All
  • All
  • Easy Prey Podcast
  • General Topics
  • Home Computing
  • IP Addresses
  • Networking
  • Online Privacy
  • Online Safety

Surviving a Romance Scam with Debby Montgomery Johnson

Many are resigned to stay silent about the pain of being scammed, but today’s guest helps empower…

[Read More]

SIM Swapping. Scammers are taking over our smartphones…and text messages too!

Did you know that through a dirty trick called SIM swapping, a scammer could take over your…

[Read More]
WELCOME

About the Website Redesign

I hope you like the WhatIsMyIPAddress.com redesign and how we’ve improved the website for you. The IP…

[Read More]
Twitter Hack

Twitter Hack Lessons: Employees Often Help Hackers Succeed.

There was huge hack of Twitter in Summer of 2020. with all kinds of surprises. Here’s what…

[Read More]
FREE VPN

A Free VPN is Always Better Than Not Using One

A free VPN (a trustworthy one) may be all that you need for more privacy, more security…

[Read More]

On “Giving Tuesday,” Beware of Charity Scams

Take Steps to Protect Your Much-Needed Donations The first Tuesday after Thanksgiving is recognized globally as Giving…

[Read More]