Go Premium for a chance to win a PS4. Enter to Win

x

VPN

23K

Solutions

23K

Contributors

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Share tech news, updates, or what's on your mind.

Sign up to Post

Hello, EE Experts!

I wanted to make sure that all Apple users understand what's going on with the new Wi-Fi (WPA2) vulnerability "KRACK."

Apple is working on a fix to roll out as soon as possible to all its users. They've stated that there is a fix for this vulnerability in the beta versions, but that the fix is not in the latest update you have on your device.

So, what can you do?

Don't connect to Wi-Fi at hotels, coffee shops, or anywhere outside your place of business or home. Even at your house or area of work use a VPN.

Wait, even at my house?

Yes. Essentially the attacker can read all the information that is being transmitted wirelessly throughout your home. That said, if you use a VPN you're making an encrypted tunnel around the information you're sending and not relying on the WPA2 protocol that should keep your data safe. So, even if the attacker is looking at the data on your home network, the VPN is making it unreadable.

Also, if you're out and about, please turn off the Wi-Fi capability on your iPhone or iPad. By turning off the Wi-Fi, you're making your iPhone or iPad solely dependent upon cellular data, which is not susceptible to this attack.

Where can I get a VPN?

I use Encypt.me because it's fast, simple, relatively cheap, and works on all of my devices without In-app purchases. However, there are free VPNs that you can grab …
4
 
LVL 99

Expert Comment

by:John Hurst
IOS 11.1 is out today to address the Wi-Fi vulnerability. I am updating both phones here. Carrier settings are being updated at the same time.
0
Technology Partners: We Want Your Opinion!
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

0
2
 
LVL 17

Expert Comment

by:Kyle Santos
If it walks like a dictatorship and talks like a dictatorship, its probably a dictatorship.  I've read perspectives of Russians saying their elections are a joke...merely for the sake of appearances.  On the other side, many Russians love Putin.  Trump and Ajit Pai are trying to repeal Title 2 so ISPs can monopolize one of the last things US citizens still have their own control over.  I guess the only difference between Russia and here (USA) is when a member of the administration in Russia is let go its not treated like The Apprentice: White House edition. xD
0
The people behind ProtonMail (a secure email service) have released a Free option for their VPN service:
https://protonvpn.com/

Generally I'd shy away from a "free" VPN, because who knows who is really behind it or why it even is available, however ProtonMail has a really solid reputation. If you need a basic VPN for when you are on public wifi, I'd check it out.
5
 
LVL 7

Expert Comment

by:Brian Matis
Thanks for the link! Gotta say, I find it comforting that they're in Switzerland. Seems rather appropriate!
1
 
LVL 18

Author Comment

by:Lucas Bishop
If you're concerned with data privacy, Switzerland was historically good in this regard, but they've recently passed laws to allow mass government surveillance.

Estonia, Iceland and Georgia are generally top class of the countries that aren't part of the "14 eyes" alliance.

The VPN I use is US based, so it's not necessarily the best in terms of data privacy. However it does have great performance and a huge IP range.
0
I am looking to have a script run and create a shortcut on users pc across the corporation.

This would be similar to bg info, but would be a shorcut users can double click and info would pop up into the gui windows.


MAc address pc name wirelesss ip wired ip and vpn ip.

Any Help would be great
1
 
LVL 25

Expert Comment

by:Brian B
Hi Angelo.

I think it could be done in powershell or via policy. However, for the appropriate Experts to see this, I think you might want to submit it as a question with appropriate topics and not a post.

Thanks,
Brian
0
Haven't tried it out yet, but this looks cool.

Why DNSCrypt is so significant
In the same way the SSL turns HTTP web traffic into HTTPS encrypted Web traffic, DNSCrypt turns regular DNS traffic into encrypted DNS traffic that is secure from eavesdropping and man-in-the-middle attacks.  It doesn’t require any changes to domain names or how they work, it simply provides a method for securely encrypting communication between our customers and our DNS servers in our data centers.  

https://www.opendns.com/about/innovations/dnscrypt/
2
3
 
LVL 4

Author Comment

by:Doug Walton
I mainly use my VPN to change my location (Netflix has different shows available in different countries, and you can watch Doctor Who on BBC in England), but otherwise I don't use it much.
0
 
LVL 18

Expert Comment

by:Lucas Bishop
I run a vpn on my home computer and on my phone (when using public wifi) just because I can't stand the thought of my data being collected without my permission. It's not foolproof though. For example, on public wifi many of your personal apps will connect to the internet, before the VPN connection is established... hence a bunch of personal data is potentially exposed. Or your VPN could go down and the same scenario happens. Putting together an article might be a good exercise though!
2

VPN

23K

Solutions

23K

Contributors

A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or travelling users access to a central organizational network securely. VPNs encapsulate data transfers using secure cryptographic methods and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.