VPNs or Virtual Private Networks as Fast As Possible
Techquickie
·Techquickie
·2015-05-07
·
876 words · ~4 min read
0:00
virtual private networks or vpns for short are used today for many reasons
0:05
but all of them fall under the same general umbrella securely connecting an
0:10
individual client off in a PC to a larger server or provider now in the
0:15
past these types of connections were mostly used in business settings when a
0:19
large employer wishes to allow employees access to a secured internal network
0:23
over the Internet while working from home or in the field but it's becoming
0:28
more and more common now to see them used by even small businesses or even
0:32
individuals who for a range of reasons wish to keep their activities online
0:37
secure and private reasons that range from the completely understandable to
0:41
the legally Andor morally gray to the downright paranoid and delusional now
0:46
the first step of the security process for a VPN involves creating a tunnel
0:51
protocol which acts as well a tunnel or
0:54
conduit for the information packets being transferred to pass through it
0:58
creates a security layer which instantly terminates the connection whenever it
1:02
detects an intrusion and then reconnects the client back to the server using a
1:07
different route avoiding the compromised Point points or the entire previous
1:11
route alt together the next time around some Services even utilize highly
1:16
specified Roots which they consider to be lower risk than other ones usually
1:21
based on some sort of internally established metrics or a working
1:24
partnership with the operator now inside this protective hard chocolate tunnel is
1:30
where the gooey caramel and nougat Center or data can be found this data is
1:35
also encrypted as one might expect but on top of this further efforts are made
1:39
to ensure that the contents of one's email don't become public Sony anyone
1:45
Beyond standard encryption nonlinear transfer methods such as utilizing
1:49
multiple routes for the traffic or the introduction of dummy code into the
1:53
information packet prevents prying eyes from seeing anything but a small garbled
1:59
slice of the overall Pi so to summarize
2:02
the way a VPN security works I'll turn this into a classic analogy it's like a
2:06
taco inside a taco within a Taco Bell that's inside a KFC within a mall that's
2:10
inside your brain Okay then lonus if
2:13
data transfers happen in basically the same way that all other internet traffic
2:17
does while offering a tremendously higher level of personal protection and
2:21
the ability to access secure networks from abroad then there's no downside
2:25
right let's just use them all the time well actually basically yeah VP are
2:30
super cool but come on man these videos are pretty much a formula at this point
2:34
you know the other shoe was going to drop although some VPN companies have
2:38
made utilizing their service as easy as double clicking the correct icon and
2:42
beginning to Surf and they're getting more affordable than ever some pages and
2:46
services might not work correctly over a VPN and content loading performance can
2:51
be affected as well since encryption efforts coupled with what can be
2:54
considered less direct routes can lead to a slower overall experience in many
2:59
cases though this can be solved quite easily by keeping another stock web
3:03
browser installed on your computer for non-mission critical use and it's also
3:07
worth noting that many VPN users actually report faster speeds on certain
3:12
popular sites such as YouTube at peak times presumably because their traffic
3:16
is avoiding some of the congestion seen along the other traditional routes there
3:20
are some other less easily addressed problems too though in buildings with
3:23
shoddy wiring packet loss can look like the network is compromised causing the
3:28
connection to be continually dropped and reestablished and another is the widely
3:33
reported one where the NSA in the United States has actually been known to flag
3:37
accounts for using keywords related to accessing these Services meaning that
3:42
seeking out extra security could potentially open one up to intrusion
3:47
speaking of intrusion Dollar Shave Club you know the guys that walk past you
3:51
while you poop kick the door open to your stall while you poop and bother you
3:55
while you're nugget mining in poop well
3:58
there today's episode sponsor they offer affordable and highquality bathroom
4:02
supplies razor handles razor blades butt wipes for men shaving butter aftershave
4:07
you name it as long as what you name is one of the things I just mentioned and
4:10
they'll ship that stuff to your door once a month so you don't have to leave
4:14
your house to be as well groomed as your friends who do save time and save money
4:18
today by joining up at dollarshaveclub.com Linus thanks to
4:23
Dollar Shave Club for sponsoring this episode thanks to you guys for watching
4:26
like this video if you liked it dislike it if you thought it sucked leave a comment if you have suggestions for
4:29
future fast as possible episodes just like this one and a shout out to another
4:34
new writer who wrote today's episode I did make some tweaks but uh yeah let us
4:38
know what you think of new writer number two oh and don't forget to subscribe if
4:43
you haven't already