VPN

23K

Solutions

22K

Contributors

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Share tech news, updates, or what's on your mind.

Sign up to Post

The people behind ProtonMail (a secure email service) have released a Free option for their VPN service:
https://protonvpn.com/

Generally I'd shy away from a "free" VPN, because who knows who is really behind it or why it even is available, however ProtonMail has a really solid reputation. If you need a basic VPN for when you are on public wifi, I'd check it out.
5
 
LVL 7

Expert Comment

by:Brian Matis
Thanks for the link! Gotta say, I find it comforting that they're in Switzerland. Seems rather appropriate!
1
 
LVL 18

Author Comment

by:Lucas Bishop
If you're concerned with data privacy, Switzerland was historically good in this regard, but they've recently passed laws to allow mass government surveillance.

Estonia, Iceland and Georgia are generally top class of the countries that aren't part of the "14 eyes" alliance.

The VPN I use is US based, so it's not necessarily the best in terms of data privacy. However it does have great performance and a huge IP range.
0
The Ideal Solution for Multi-Display Applications
The Ideal Solution for Multi-Display Applications

Check out ATEN’s VS1912 12-Port DP Video Wall Media Player at InfoComm 2017. Kerri describes how easy it is to design creative video walls in asymmetric layouts and schedule detailed playlists ahead of time with its advanced scheduling feature.

I am looking to have a script run and create a shortcut on users pc across the corporation.

This would be similar to bg info, but would be a shorcut users can double click and info would pop up into the gui windows.


MAc address pc name wirelesss ip wired ip and vpn ip.

Any Help would be great
1
 
LVL 24

Expert Comment

by:Brian B
Hi Angelo.

I think it could be done in powershell or via policy. However, for the appropriate Experts to see this, I think you might want to submit it as a question with appropriate topics and not a post.

Thanks,
Brian
0
Haven't tried it out yet, but this looks cool.

Why DNSCrypt is so significant
In the same way the SSL turns HTTP web traffic into HTTPS encrypted Web traffic, DNSCrypt turns regular DNS traffic into encrypted DNS traffic that is secure from eavesdropping and man-in-the-middle attacks.  It doesn’t require any changes to domain names or how they work, it simply provides a method for securely encrypting communication between our customers and our DNS servers in our data centers.  

https://www.opendns.com/about/innovations/dnscrypt/
2
3
 
LVL 4

Author Comment

by:Doug Walton
I mainly use my VPN to change my location (Netflix has different shows available in different countries, and you can watch Doctor Who on BBC in England), but otherwise I don't use it much.
0
 
LVL 18

Expert Comment

by:Lucas Bishop
I run a vpn on my home computer and on my phone (when using public wifi) just because I can't stand the thought of my data being collected without my permission. It's not foolproof though. For example, on public wifi many of your personal apps will connect to the internet, before the VPN connection is established... hence a bunch of personal data is potentially exposed. Or your VPN could go down and the same scenario happens. Putting together an article might be a good exercise though!
2

VPN

23K

Solutions

22K

Contributors

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.