VPN (virtual private network) is a technique which is used to create safe encrypted connections between point A and point B over an unsafe public network such as the Internet. The VPN (Virtual Private Network) will allow you to access all the Internet resources through our servers using a secure encrypted connection. This allows you to hide your internet traffic and identity from praying eyes as well as bypass restrictions from your ISP or system administrator.
With a VPN, your computer or mobile device is connected to the Internet as usual. Then you connect to one of our secure VPN servers. All your internet traffic is then encrypted and routed securely and anonymously bypassing your ISP.
VPN’s create “virtual” point-to-point connections using a technique called tunneling. As the name suggests, tunneling acts like a “pipe” which penetrates through a network to connect two points. Normally activated by remote users, tunneling encrypts data into standard TCP/IP packets and encapsulates it for safe transmission across the Internet. VPN ensures the confidentiality and integrity of the data as it travels over the public Internet because it requires: Remote user identity authentication/Secure private transmission of data (no unauthorized listeners Verification of unadulterated data transmission. The VPN connection behaves like this: You connect to the Internet in the normal manner, through your ISP. The VPN4ALL software on your computer initiates a connection with the VPN server. The VPN server encrypts the data on the connection so it cannot be read by others while it is in transit. The VPN server decrypts the data and passes it on to other servers and resources.
When a data packet is transmitted from a client, it sends it through a VPN gateway, which adds an Authentication Header for routing and authentication. The data is then encrypted and, finally, enclosed with an Encapsulating Security Payload which contains the decryption and handling instructions. The receiving VPN router/ server strips the header information, decrypts the data, and routes it to its intended destination. With such a heightened level of security, an attacker must not only intercept a packet, but decrypt the packet as well. Intruders who employ a man-in-the-middle attack between a server and client must also have access to at least one of the private keys for authenticating sessions. Because they employ several layers of authentication and encryption, VPN’s are a secure and effective means of connecting multiple remote nodes to act as a unified Intranet.
Is the information incorrect or does it contradict what we say somewhere else at the site? These FAQs are a work in progress and unfortunately as a result our product updates and network changes we can't always get it right instantly in all the FAQs. Please let us know if you see something incorrect and we'll do everything we can to straighten out the misleading bits and pieces! None of these FAQs answer your question? Search our Knowledgebase or Ask Support.
Powered by WHMCompleteSolution
4825 AX Breda
Commercial director: Peer Visser
Company Registration No.: 51242338
D-U-N-S Number 216972890
Copyright 2009-2013 © VPN4ALL Ltd. All rights reserved. All other registered trademarks on this website are the property of the corresponding proprietor. The content and illustrations of this website are protected by copyright. Any reproduction, even in excerpts, and any replication of the illustrations, even in an altered state, requires our prior written permission.
Please find the Terms of Service at: http://www.vpn4all.com/terms-of-service/
Please find the Refund Policy at: http://www.vpn4all.com/refund-policy/
Please find the EULA at: http://www.vpn4all.com/eula/
You require an up to date browser supporting XHTML and CSS to display our website pages correctly. Examples are, Internet Explorer at least Version 5 (Win32) or up to date versions of Mozilla, Netscape 7 or Opera. Older browsers will only display a greatly simplified or faulty version.