How to Increase Internet Speed using free Mobile VPN Settings ?




Vitual Private Network

Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network. Therefore, the communication is virtually but not physically there.
Private means to keep something a secret from the general public. Although those two devices are communicating with each other in a public environment, there is no third party who can interrupt this communication or receive any data that is exchanged between them.
A Network consists of two or more devices that can freely and electronically communicate with each other via cables and wire. A VPN is a network. It can transmit information over long distances effectively and efficiently.

  • A VPN is a combination of software and hardware that allows mobile employees, telecommuters, business partners, and remote sites to use a public or “unsecured” medium such as the Internet to establish a secure, private connection with a host network.
  • It uses "virtual" connections routed through the internet from the business's private network to the remote site.
  • VPN extends a private network and the resources contained in the network across public networks like the Internet.

Virtual Private Network, is defined as a network that uses public network paths but maintains the security and protection of private networks.

For example, Delta Company has two locations, one in Noida, New Delhi (A) and Pune, Mumbai (B). In order for both locations to communicate efficiently, Delta Company has the choice to set up private lines between the two locations. Although private lines would restrict public access and extend the use of their bandwidth, it will cost Delta Company a great deal of money since they would have to purchase the communication lines per mile. The more viable option is to implement a VPN. Delta Company can hook their communication lines with a local ISP in both cities. The ISP would act as a middleman, connecting the two locations. This would create an affordable small area network for Delta Company.

 What is VPN

Learn Ethical Hacking - Ethical Hacking tutorial - What is VPN - Ethical Hacking examples - Ethical Hacking programs

Types of VPN’s

  • Remote-Access VPN
  • Site-to-Site VPN (Intranet-based and Extranet-based)

Remote-Access VPN

  • A remote access VPN is for home or travelling users who need to access their central LAN from a remote location. They dial their ISP and connect over the internet to the LAN.
  • This is made possible by installing a client software program on the remote user’s laptop or PC that deals with the encryption and decryption of the VPN traffic between itself and the VPN gateway on the central LAN.
  • Firewall act as a breaking point. It doesn’t allow any request from outside and also doesn’t sent request from inside.
 remote-access-vpn

Learn Ethical Hacking - Ethical Hacking tutorial - Remote-Access VPN - Ethical Hacking examples - Ethical Hacking programs

Site-to-Site VPN

Intranet-Based

  • If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.

Extranet-Based

  • When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.
 site-site-vpn

Learn Ethical Hacking - Ethical Hacking tutorial - Site-to-Site VPN - Ethical Hacking examples - Ethical Hacking programs

IP Spoofing

  • A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host.
 ip-spoofing

Learn Ethical Hacking - Ethical Hacking tutorial - IP Spoofing - Ethical Hacking examples - Ethical Hacking programs

  • Original IP Address can be hidden.
  • VPN spoofed IP Address only shown when unauthorised access. So, it is fully secured. This type of IP Spoofing is used in Banks & other places also.
 how-vpn-works

Learn Ethical Hacking - Ethical Hacking tutorial - How VPN Works - Ethical Hacking examples - Ethical Hacking programs

Traditional Connectivity of Network

 traditional-connectivity-of-network

Learn Ethical Hacking - Ethical Hacking tutorial - Traditional Connectivity of Network - Ethical Hacking examples - Ethical Hacking programs

VPN’s Protocol

  • VPN protocols represent the processes and sets of instructions. VPN providers rely on in order to ensure VPN users get to enjoy stable, secure VPN client-VPN server communications. At its core, a VPN protocol is basically a mix of transmission protocols and encryption standards.
 how-vpn-protocols-works

Learn Ethical Hacking - Ethical Hacking tutorial - How VPN Protocol Works ? - Ethical Hacking examples - Ethical Hacking programs

  • PPTP - Point-to-Point Tunnelling Protocol
  • L2TP - Layer 2 Tunnelling Protocol
  • IPsec - Internet Protocol Security
  • SOCKS - It is not used as much as the ones above

VPN Data Encryption

  • Encryption is a method of "scrambling" data before transmitting it onto the internet.
  • Digital Signature - For Authentication

VPN Data Formats

  • Data encapsulation, also known as data hiding, is the mechanism whereby the implementation details of a class are kept hidden from the user. The user can only perform a restricted set of operations on the hidden members of the class by executing special functions commonly called methods.
 vpn-data-formats

Learn Ethical Hacking - Ethical Hacking tutorial - VPN Data Formats - Ethical Hacking examples - Ethical Hacking programs

VPN Data Transfer

 vpn-data-transfer

Learn Ethical Hacking - Ethical Hacking tutorial - VPN Data Transfer - Ethical Hacking examples - Ethical Hacking programs

How to get my IP Address ?

  • Go to whatismyipaddress.com website in browser.
  • There are also other ways to get IP address.
  • Commands used:
How to get my IP Address

Learn Ethical Hacking - Ethical Hacking tutorial - How to get my IP Address - Ethical Hacking examples - Ethical Hacking programs

Secret Mobile Settings for VPN Configuration

  • Go to Mobile Settings and search for VPN
  • Add VPN by fill out the details of name, choose the type of protocals, server address, user name and password. And enable to connect VPN.
 vpn-settings-add

Learn Ethical Hacking - Ethical Hacking tutorial - VPN Settings ADD - Ethical Hacking examples - Ethical Hacking programs

VPN Network Configuration with New IP Address

Step 1

Step 2

  • The original IP address will be hidden. And the spoofed IP Address will be visible.
 vpn-config-new-ip-address

Learn Ethical Hacking - Ethical Hacking tutorial - VPN Config New IP Address - Ethical Hacking examples - Ethical Hacking programs



Related Searches to How to Increase Internet Speed using free Mobile VPN Settings ?