Need some explanation

Discussion in 'Android General Discussions' started by sajidali27, Jan 22, 2015.

  1. sajidali27

    sajidali27 New Member

    Joined:
    Jan 14, 2015
    Messages:
    8
    Likes Received:
    4
    Trophy Points:
    3
    Ratings:
    +5
    Can somebody give me a simple explanation of how a vpn works?

    I know enough from here to use it on my works public wifi. How do the bad guys see me to steal info?

    I it necessary to have it on over my service data plan 4G lte?

    What about at home over wifi? I have netgear night hawk I think.
     
  2. Jeffrey

    Jeffrey Premium Member
    Premium Member

    Joined:
    Jan 30, 2012
    Messages:
    6,686
    Likes Received:
    3,548
    Trophy Points:
    1,578
    Location:
    Thailand
    Ratings:
    +4,036
    Current Phone Model:
    iPhone 7 Plus JB
    • Like Like x 1
  3. eddiekeyton

    eddiekeyton Banned

    Joined:
    Apr 19, 2012
    Messages:
    785
    Likes Received:
    58
    Trophy Points:
    28
    Location:
    OHIO
    Ratings:
    +64
    Twitter:
    eddiekeyton
    A vps allows you to securely access a network without compromising any information.
     
  4. Jonny Kansas

    Jonny Kansas Administrator
    Staff Member Rescue Squad

    Joined:
    Jan 21, 2010
    Messages:
    16,481
    Likes Received:
    7,059
    Trophy Points:
    1,278
    Location:
    Michigan's Upper Peninsula
    Ratings:
    +8,401
    Current Phone Model:
    Pixel XL
    Twitter:
    jonny_ks
    Jeffrey's post is a good resource, but long story short, a VPN, or Virtual Private Network basically creates a "tunnel" from your machine to the secure network you VPN in to. This puts all your data into and through the tunnel and encrypts it, rather than just tossing it up in the air for anyone with a little know-how and packet-sniffing software to grab.

    On any network, packet-sniffing software can be used to steal data from users. This is a bigger deal on a public network because anyone within range can use that network, instead of anyone authorized to do so on a closed/protected network.

    Hope that helps for a simple explanation. As I said, Jeffery's link will give you MUCH more detail.
     
  5. eddiekeyton

    eddiekeyton Banned

    Joined:
    Apr 19, 2012
    Messages:
    785
    Likes Received:
    58
    Trophy Points:
    28
    Location:
    OHIO
    Ratings:
    +64
    Twitter:
    eddiekeyton
    Great explanation lol u wish I could explain things in greater detail like that. Pretty much hit it on the head. They have different types a well. The difference is security levels and compatibility levels.
     
  6. Jonny Kansas

    Jonny Kansas Administrator
    Staff Member Rescue Squad

    Joined:
    Jan 21, 2010
    Messages:
    16,481
    Likes Received:
    7,059
    Trophy Points:
    1,278
    Location:
    Michigan's Upper Peninsula
    Ratings:
    +8,401
    Current Phone Model:
    Pixel XL
    Twitter:
    jonny_ks
    Well, I have a degree in computer networks and security systems and several Microsoft certifications, so I kinda have to know a bit about these things, even though I've only been in my first IT position since this summer.
     
    • Like Like x 1