vpn's questions - English 1answer

863 vpn questions.

I notice that there are sites on the internet that offer free VPN services via OpenVPN. Is there any danger in downloading and trying the .ovpn files that they offer for download?

2 VPN connections

2 answers, 42 views vpn
What happens when I connect my phone to VPN1, use the phone's hotspot for my laptop, and connect my laptop to VPN2? Laptop --- VPN2 --- Phone --- VPN1 Is there tunnel in a tunnel or two separate ...

TLDR I'm trying to create a proxyVM with VPN, which I could use as "Network VM" in AppVMs. Previous attempts Adding following rule in sys-net and setting VPN in sys-net I am able to connect. [sys-...

We are getting dinged on a federal audit because OpenVPN does not appear to support invalid login restrictions (i.e., only 3 before the account is locked). Has anyone else experienced this? We are ...

This question is kind of asked already but it was asked with different context: VPN tunnel in VPN tunnel Connect through two VPN clients https://superuser.com/questions/763433/tunnel-in-a-tunnel-...

I'm wondering if this kind of technology is already exist (not VPN), I'm looking for a method to make secure internet connection within a dedicated server, where my laptop has a desktop application to ...

I am referring to the vulnerability reported here: Cisco secuirty advisory on "Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability" CIS adviory on the same ...

I'm using mail.com over HTTPS. I sent a mail and I was connected over my access to the company VPN. Is it possible that the administrator of my company can read my mails? I used Firefox / Webbrowser ...

WireGuard is extremely simple and fast kernel-space VPN based on modern cryptography. I want to use it in production and need automatic IP assignment for new peers. The project provides two short ...

Is it possible to detect the use of a VPN in a network? Let's say that I'm going to use a VPN during my connection in a country where internet is filtered, and to avoid been monitored I installed ...

An advice in warranted concerning (IP address)-based defence and its evasion. Certain vandal targets Wikimedia servers presumedly using one (or more) anonymizer service having exit points thinly ...

I setup access to my family's home server over VPN, restricted by ip address. Sometimes a family member would have an ip6 address (they Google "ip") from their location. My firewall (pfsense) accepts ...

We would like to build a Host-to-Host IPSec VPN (both RedHat Linux). Is it really mandatory to activate IP Forwarding which is by default deactivated because of our security policy (/etc/sysctl.conf ...

From what I understand, Shadowsocks masks SOCKS5 traffic as HTTPS traffic, so that the GFW cannot detect it by packet inspection. Shadowsocks can be installed on my own server, naturally. For usage, I ...

I would like to create a L2L VPN between two organizations. Due to the hyphotesis that WannaCry was propagated in great part using these kind of connections, I would like to implement security ...

According to Browsec's website this application can be used to Bypass firewalls. So in countries like Iran it seems a useful tool to bypass censorship and filtering. For start using this application ...

I'm trying to access some server using VPN(Or generally say, proxy). But sometimes the server could detect that I'm behind a proxy(And sometimes not). So I'm wondering what information could be ...

I want to know how to ensure the most complete anonymity when browsing the internet and connecting to remote servers: I want to be as anonymous and secret as possible. I don't know exactly how VPNs ...

Hacking by metasploit

2 answers, 67 views vpn metasploit
Is it possible to hack an Android device while the victim is using vpn? I've tried hacking my Android device on WAN and it worked but when I connected my cellphone to a vpn network it seemed that the ...

If one uses VPN, eavesdropper can not get any information in the IP packet header. However, at least he knows that the packet contains IP sec header by inspecting upper layer protocol field in the IP ...

Let's say I have a PC and a smartphone, both connected to my home router. Scenario #1. The PC and the smartphone have VPN client installed on each device. Both devices connect to the same VPN server ...

I recently moved into a new apartment, and with rent "free fiber connection" was included. I was skeptical, but the building location and proximity to my office was a no brainer. Now I'm regretting it....

So as security student, I have been tasked with the challenge of trying to figure out a way of bypassing an ISPs data limit of 1GB . When the 1GB ceiling is hit the internet becomes really slow I ...

I can connect to a wifi hotspot that is free and only asks registration (this is the city's facility). I got kicked from using it, because it detected my Tor usage. But thankfully, it was only ...

A VPN service I've encountered supports connecting to it with NetworkManager in linux. The options are OpenVPN as the connection type, with Password with Certificates (TLS) as authentication type. ...

In our project we had to build a VPN to get through to computers residing behind NAT. I never did it before. While looking for suitable software I came across WireGuard which claimed to be very simple....

We have an AWS network which can only be accessed once connected to a VPN. .opvn. Currently in order to connect to the VPN our IP needs to be whitelisted from within aws which can only be done by a ...

I know the basics of how a vpn works, but what I cannot get it is why if my computer is connected to a company via VPN, why my computer experience like if it was physically there in the company. I ...

So just how secure and private is the case where you use hushed app with a VPN on Android? Here is what i was thinking , so i have two phones, one is without a sim card just sided loaded apps ...

Logless VPNs, such as ExpressVPN, claim that they can't tell authorities your real IP even if asked. They claim: No connection logs. Never logs connection timestamps, session duration, your ...

The innermost IP header is my publicly routable IP address that has been encapsulated. The outermost IP header is what is used for routing purposes. When using a public VPN over the internet, the ...

How secure is L2TP+IPSEC?

2 answers, 742 views vpn ipsec
I understand PPTP is widely used still, but insecure. A convenient alternative is: L2TP+IPSEC. How secure is it? What steps in the server setup can I take to maintain a high degree of compatibility ...

Background: I work a remote employee in the US for a US based company. I log into our company's intranet via VPN to work every day. I also connect to multiple client networks via VPN (as well as using ...

I'd like to commit my OpenVPN client config to version control, in a repo that's remotely hosted and publicly accessible. This would reveal the server's hostname and port, as well as the filepaths to ...

I have a business partner who claims has never had access to our LLC bank account. Will a subpoena to the bank be able to prove this is not true if I know his computer and phone details?

This is, somehow, a theoretical question. I am working in a software-developer company. We have several customers. For each customer we have a Virtual Machine where we have a VPN to the customer ...

Recently, I asked my manager is it possible for me to take my laptop home in order to work on a project that I've been involved for my company. I received an approval, however he mentioned that I'd ...

My VPN provider gives me the option between using UDP and TCP for connections. According to this site UDP is faster over short distances. I'm on the same continent as my server, is that considered ...

The Iranian government has harshly cracked down the Internet. Aside from denied access to many websites and services, many VPN services are disrupted. Formerly, Cisco AnyConnect Compatible VPN ...

I have a personal OpenVPN server. I am worried that the fact the DNS resolution coming out of the server isn't encrypted, since I am the only one that uses the server at the moment, attribution isn't ...

I connected to my home-made VPN, which uses OpenVPN and 2048bits encryption keys, from my work. What are the security risks of doing so, given the fact that the servers are in the same network my ...

I work at coffee shops a lot and signed up for Mullvad VPN to be more secure (after reading many reviews). The service works fine at home but rarely works on public Wi-Fi, whether from a chain like ...

I have been reading a certain article about SSL VPN and it got me thinking. Is it possible to integrate this technology in a banking server? can or does it support standalone mobile applications?

I have a question in my exam last week on Network Security whether a malware can be transferred over a VPN tunnel? My answer was YES, since VPN only provide encryption, and makes sure data travel ...

We have corporate network where remote workers connect via encrypted latops (Windows 7) using VPN (Cisco AnyConnect client), log into the Windows domain and access their network shares, Outlook e-...

I have the following situation: Attacker machine connected to a router with public IP assigned from ISP, forwarding enabled. Victim machine connected to another router, (obviously) different IP ...

I work in a small company and we have recently invested in a new server that provides VPN services. I contacted the IT company in charge today in order to connect my laptop so I can work from home. I ...

Background: So I use a private VPS to host my own VPN, rather than pay/trust another company to host it for me. I am an intermittent traveller so it is cheaper for me to spin up or down my server as ...

Scenario: An attacker is connected via VPN to an unknown remote host. The remote host is assumed to have two NICs, one serving the VPN and the other serving another unknown subnet. In addition, the ...

Situation: We usually perform penetration tests from Linux machines connected to the clients local network. However for this test the client wants the start point to be a windows machine and has thus ...

Related tags

Hot questions

Language

Popular Tags