vpn's questions - English 1answer

890 vpn questions.

Why don't VPN services use TLS?

3 answers, 2.408 views tls vpn
In corporate environment, security examiners use filters & firewalls to block VPN connections for security purpose. VPN traffic is distinguishable and that's also the reason why openVPN doesn't ...

I use Pia, arguably one of the most popular paid VPN's on the market today. Imagine this HYPOTHETICAL scenario. I stay on the East coast, and i use my virtual IP location as the VPN's Datacenter in ...

I have an open vpn configuration with the lines auth-user-pass my-login-creds.conf static-challenge "Enter Google Authenticator Code" 1 in it. When I try to connect with openvpn my-config.ovpn I ...

I use a mobile app that forces all device traffic through a VPN. I’d like to mimic the app’s connection by setting up the VPN on a router and forcing all traffic through the VPN connection at the ...

I saw a few breaches on a very large scale where an organization like JP Morgan suffered a huge breach just by allowing their employees to connect via VPN to their machines at work. Seems that hackers ...

I am looking for a deep down technical explanation of how it works. My understanding is its an SSL VPN and works as follows: - Anyconnect creates a TLS session to the configured remote servers, ...

We would like to build a Host-to-Host IPSec VPN (both RedHat Linux). Is it really mandatory to activate IP Forwarding which is by default deactivated because of our security policy (/etc/sysctl.conf ...

I would like to create a L2L VPN between two organizations. Due to the hyphotesis that WannaCry was propagated in great part using these kind of connections, I would like to implement security ...

Can this person be tracked

1 answers, 87 views vpn ip
This person somehow spoofed an IP address or used VPN This person used a bandwidth or text now number on a track phone that is disposable This person hacked a social media account using the above^ and ...

Would a VPN cause this?

1 answers, 116 views vpn ip
A friend of mine was recently being harassed on Instagram, with the person claiming to know her and saying he'd let her know if he saw her on a night out. To help her out, I used grabify IP tracker to ...

Is Wireguard suitable for road-warrior scenarios where the IP address of the client keeps changing? If anyone tried it out already, I also would like to know if it's really easier to setup than, say, ...

Does a VPN protect against a malicious DNS configuration on the Access Point? By my understanding it should, since traffic to the final destination should be encrypted and encapsulated inside packets ...

I have a debian router that is connected directly to the internet. It has 3 interfaces: eth0 (internet/wan), eth1 (lan), tun0 (vpn). All traffic should be routed through the tun0 vpn. It's a minimal ...

In many computer magazines I found the recommendation to use a public Wifi only with VPN (of course, you should trust the VPN provider). Assuming all websites with sensitive data (complete website, ...

I want to know if it's possible to reveal the real IP address of a user with JS:ScriptIP-inf [trj] or by other means, who is browsing a webpage which doesn't contain any Java Applet and the user uses ...

We have an AWS network which can only be accessed once connected to a VPN. .opvn. Currently in order to connect to the VPN our IP needs to be whitelisted from within aws which can only be done by a ...

I have family in China. During the past weeks their internet connection was severely limited. VPNs such as Astrill and similar weren't working anymore. Is it possible to setup my own VPN (or ...

So basically can they use some sort of man in the middle attack and decrypt and read my packets? I use their own app to use their SSL proxy and i tried scanning it with Kaspersky and it found no ...

Preamble: I live in Russia where some web sites (linkedin e. g.) are blocked by government (Roskomnadzor). So I and many citizens use popular free browser-extensions (and mobile apps from same brands) ...

I have a server that has 1 IPv4 public address and 10 public IPv6 addresses (each one /128, not in the same subnet like a /64 or /48) - I know it sounds strange but I have no control over this, it is ...

Let's say for instance I want to sign up for Revolute/Paypal/Transferwise, etc. However I don't live in the country, although I do have a VPN that has an IP in that country. Question is, does the ...

1.1.1.1 might be encrypting the DNS request but then between my ISP and the website I'm accessing, IP addresses are exchanged.Does my ISP see the IP address of the website I'm accessing but not its ...

I'm planning to use my trusted VPN to upload a file to my webhosting (through FTP). However, I don't want the hosting company to know my real IP. Another option is connecting to my VPS and uploading ...

I've got an SSH server setup in a remote location, which I use to tunnel traffic from an android tablet. On the tablet, I have the Cisco AnyConnect app to connect to my company's VPN. We want to be ...

Is VPN able to hide the traffic from the tracking and viewed by the ISP or even government units? Is VPN able to bypass the ISP internet hotspot quota limit? How did ISP track/identify whether user is ...

There are anonyous images boards blocking write operations from Tor exit nodes. In such cases I use Opera VPN. How private and secure is Opera VPN? Better than real IP address? I wonder why this ...

I've read lot of questions asked on various websites about the pros & cons of using a VPN with Tor. As said on Tails website VPN make the situation worse by introducing a permanent entry guard or ...

I use ubuntu. The only apps I have in it are firefox and telegram, both downloaded through official channels. I use other apps with virtualization, so my main machine is mostly clean. I use a VPN so ...

Robocalls and VPN

0 answers, 26 views vpn
From what I know, robocallers use a VPN to hide their origination point. But, if VPN's can be tracked to a user, why can't they robocallers be identified?

I'm trying to set up corkscrew to make an SSH tunnel over HTTP, but I need to add custom headers after the "CONNECT" statement and before the ssh tunnel. Does corkscrew support it? If yes, how can I ...

The diagram below is a thought experiment that could provide a certain level of privacy to mobile (smart)phone users, beyond what they currently have. Some of it is purely theoretical, but it should ...

I would love to protect my privacy online. I thought of a setup when I connect through a VPN, get a Linux VM and use VPN on that, then use just a proxy on the browser in the VM. My computer > VPN &...

From what I understand, Shadowsocks masks SOCKS5 traffic as HTTPS traffic, so that the GFW cannot detect it by packet inspection. Shadowsocks can be installed on my own server, naturally. For usage, I ...

So let's assume the following: 1. A host machine running a clean BSD-based OS that has no backdoors, malware, spyware or other potentially de-anonymizing harmful software. 2. One home internet ...

Recently as we started contributing to a project hosted on GitHub we observed that there are problems with connecting securely: $ ssh -T git@github.com Connection closed by 192.30.253.112 port 22 ...

I was at home and had some work to be finished so I used IE connected remotely to my work PC finished the job but forgot to disconnect. After a while I started watch not-safe-for-work material in ...

I use Nord and have it set up on my Netgear R7000 using tomato firmware and I have port 53 blocked so it doesnt get my ISP DNS from my modem. Instead of putting in the nord dns servers I just leave it ...

When I ask the VPN server to do the queries for me, does the VPN use its own ISP to run the queries over the internet? Or did the VPN server use my ISP connection to search over the internet and by ...

This applies to any country, but here's some context: Website: BBC iPlayer (a major UK streaming website, registration mandatory) Server: Linode, London data centre VPN: SoftEther on HTTPS port 443 ...

How secure is L2TP+IPSEC?

1 answers, 859 views vpn ipsec
I understand PPTP is widely used still, but insecure. A convenient alternative is: L2TP+IPSEC. How secure is it? What steps in the server setup can I take to maintain a high degree of compatibility ...

It would appear one of my neighbours is monitoring my internet traffic, I am wondering firstly how is this possible and secondly would using a VPN stop the attacker from being able to read / intercept ...

I was trying to enter a website's public chatroom powered by parachat. I don't want users and admins to look up my IP and location. So I bought a VPN and tried to hide my IP, but now I cannot log in ...

As per the question. If I am connected to a website, streaming content from my native IP and I then enable my VPN, what does the website see?

Given a nation-state has full access to the logs of the ISPs operating on its territory and given it knows that a certain activity has been conducted by a user from its territory, can they do the ...

It's clear that someone listening on a network could still find out what website I visit over HTTPS (as discussed here) but what about when surfing in a VPN? What exactly can the underlying network (...

Can I use FortiClient VPN access to secure my FTP client transfers? Is it possible to route the FTP to use the VPN? Does it make sense to do it, is it secure if possible? The reason I am asking this ...

Many popular VPN services (that provide encrypted tunnels between the users' devices and distant VPN servers) authenticate users using a pair of email address and password. What attacks would the ...

I have a vpn, if I connect it and create an email account while connected to the vpn, and then send the email to the desired recipient, what other levels of protection/anonymity am I missing? I use ...

I notice that there are sites on the internet that offer free VPN services via OpenVPN. Is there any danger in downloading and trying the .ovpn files that they offer for download?

2 VPN connections [closed]

2 answers, 52 views vpn
What happens when I connect my phone to VPN1, use the phone's hotspot for my laptop, and connect my laptop to VPN2? Laptop --- VPN2 --- Phone --- VPN1 Is there tunnel in a tunnel or two separate ...

Related tags

Hot questions

Language

Popular Tags