A VPN tunnel is an encrypted link between your computer or mobile device and an outside network. A VPN tunnel — short for virtual private network tunnel — can provide a way to cloak some of your online activity. How? A VPN tunnel connects your smartphone, laptop, computer, or tablet to another network in which your IP address is hidden and all the data you generate while surfing the web is encrypted. By connecting to websites through a VPN tunnel — and not directly — you can help keep businesses, government bodies, hackers, or other snoops from tracking your online activity or viewing your IP address — which, like your actual address, identifies your location — while you’re online. A VPN tunnel is useful when you’re logging onto the internet using public Wi-Fi at hotels, coffee shop, or library. How does VPN tunneling work?To connect to the internet through a VPN tunnel, you'll first have to sign up with a virtual private network service, better known as a VPN. The VPN is the key to hiding your IP address and shielding your online activity from snoops. Before visiting websites, you'll log into your VPN provider’s service. When you then start searching online, the websites you visit and your own internet service provider — ISP, for short — won't see your IP address. Instead, they'll see the IP address of your VPN provider, helping to protect your privacy. In essence, when you click on links or download files from a site, no one will know it’s your activity. It’s as if your VPN provider has built a tunnel around your online activity, providing a barrier between it and everyone else. Using a VPN alone may not be enough to protect your online privacy, though. That’s why VPN providers take one more step to encrypt the data you send and receive while you are online. When your data is encrypted, it is scrambled so snoops can’t intercept and decipher it. When you enable this added layer of protection, hackers, businesses, governments, or others won't be able to track what sites you visit, files you download, videos you stream, or online games you play. Hiding your IP address and encrypting the data you send and receive is a powerful combination to help keep your online browsing sessions private. VPN tunnel protocolsNot all VPN tunnels are equally effective in protecting your online privacy. The strength of a tunnel depends on the type of tunneling protocol your VPN provider uses. Some protocols are outdated and may not provide data encryption that is strong enough to deter online snoops so it’s a good idea for you to work with a VPN provider that relies on the strongest possible tunneling protocol. PPTPPoint to Point Tunneling Protocol — better known as PPTP — is one of the oldest versions still in use today. The strength of this protocol is its speed: It features extremely fast connection speeds. This speed comes at a cost, though. PPTP is fast partly because its level of data encryption is weak by today's standards. This means it's easier for outsiders to crack the encryption provided by this protocol. If you want more protection, investigate a stronger form of protocol. L2TP/IPSecLayer 2 Tunneling Protocol, when used with Internet Protocol Security, is a step up from basic PPTP. That's because this level of tunneling protocol offers two stages of protection: Both the L2TP and IPSec portions of this protocol create their own encryption. This results in two layers of protection for your online data. The downside? This type of tunneling protocol, because of the two layers of encryption, can result in slower online connection speeds. L2TP/IPSec sometimes gets blocked by firewalls, too. That's because this type of VPN tunneling uses fixed ports. SSTPSecure Socket Tunneling Protocol is unusual because it is only available on Windows operating systems. This type of tunneling protocol is very secure, making it a safe choice. It also doesn't use fixed ports, so it's easier for SSTP to get through firewalls. The problem, of course, is that this protocol isn't available for operating systems other than Windows. That shuts out many potential users. OpenVPNIf you're looking for the strongest protection while online, you should consider investing in a VPN service provider that relies on the OpenVPN protocol. This protocol works with all the major operating systems, Linux, Window, and Mac, on the mobile operating systems of Android and iOS. Maybe you prefer an independent operating system? OpenVPN might have you covered, because it works with such systems as FreeBSD, NetBSD, Solaris, and OpenBSD. OpenVPN is currently considered the top form of VPN tunneling protocol. That's because its encryption is especially strong. It's also adept at getting past firewalls. Protecting your privacy while onlineThe key to VPN tunneling is to actually use the service. A VPN can’t keep your identity private or encrypt the data you send and receive if you skip that extra step of connecting to your VPN provider first before you access the internet. Remember, too, that to truly protect your online privacy, you’ll need to enable VPN protection on any device you use to reach the web from public locations. It doesn’t help to have your laptop protected by a VPN only to log onto the internet with your smartphone while you’re relaxing at the coffee shop. The bottom line? VPN tunneling is a must for online privacy. Just make sure you use your VPN service once you sign up with it. Page 2
Written by a NortonLifeLock employee
Our social networks can multiply the cheer of the holiday season. What’s nicer than a platform that allows us to interact easily with faraway loved ones, often in real time? However, social networks can also have their naughty — and downright dangerous — side during the holidays. Follow these tips to stay safe from social networking scams:
There’s a reason cat videos are so popular on social media — cats are cute! But watching cats playing with Christmas tree tinsel could, in fact, be risky. Tip: No video, no matter how cute, is worth giving up your personal information, even if all your friends are LOLing and sharing it. If you are required to provide your details in order to watch a video, just don’t. Be Charitable, But Careful
When you’ve budgeted all your money for Christmas gifts, paying for antivirus may be at the bottom of your list, but the old adage that you get what you pay for can often apply to free software — especially if it isn’t backed by a well-known, reliable company. Read these tips to stay clear of bad freeware: Pay the Price for Reputation Don’t Fall for Fake Anti-virus Software
Online shopping has made holiday shopping more convenient. No circling the mall for parking or standing in long lines for you! But online shopping comes with its own headaches if you’re not careful. Read these tips to shop safely online: Follow the Signs of Security Shop Sites You Know and Trust
During what should be a joyous time of year, cybercriminals take advantage of people’s generosity and interest in shopping. Beware of spam and scams, and check out these tips: Don’t Fall for Phishing Scams Be Smart About Spyware
For many of us, our smartphones have become extensions of ourselves, and we can’t imagine living without them. Because these devices are so important to our daily lives and hold so much personal information, it’s crucial to protect them. Follow these tips to secure your smartphones: Start with the Basics Add on Mobile Device Security Think Before You Download
Malware, short for malicious software, refers to cybersecurity risks such as viruses, adware, spyware, and Trojan horses — the equivalent of online coal in your stocking. These programs are specifically engineered to compromise a computer’s security features and give hackers access to your personal data. Read these tips to avoid malware: Keep Your Software Up to Date Power Up Your Password Think Before You Link
In addition to tablets and smartphones, wearable devices are highly desired Christmas presents. Follow these tips to use yours safely or to gift along with your smart present: Read the Fine Print Secure Your Wearable and Yourself
In the olden days, highway robbery was a real threat. Now, in the online days, Internet superhighway robbery in the form of ransomware is becoming all too common. Follow these tips to avoid having your computer held for ransom: Start Secure and Stay Secure Back It Up Never Pay the Ransom
Who doesn’t want a brand-new TV for Christmas? And a high-def smart TV playing a continuous loop of a burning Yule log may be even more desirable. But it’s not only smart TVs that are popular; smart homes themselves are trending with people who want convenience paired with wireless technologies. These tips can keep your new Internet of Things devices protected from cybercriminals: Fortify Your Connected Home Network Control Your Data
Identity theft is a growing problem that consumers can only do so much to prevent. It’s important to know which preventive steps you can take, but also how to get your identity back if it is stolen. Read these tips to stay one step ahead of identity thief Grinches: Protect Your Computer Secure Your Mailbox Call in the Professionals
On the eleventh day of Christmas, my true love gave to me: A powerful and shiny new PC. Starting fresh with a new PC is on many people’s Christmas lists. Whether you’re receiving or giving, keep your digital gifts more secure this holiday season by following these basic tips: Create a Strong Password Choose Reputable Security Software Update All of Your Software
Wishing you a secure and happy holiday season!
Copyright © 2022 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners. |