In a simple VPN (virtual private network) in the user perspective can be interpreted services that can provide security and privacy that cannot be seen (anonymously) by outside parties when you are connected to the internet by connecting through what is called a VPN server

How the process of a VPN service works

  1. If the internet user does not use the VPN
  2. An internet user without using VPN services is usually connected via a device, router or server before heading to the website or platform that you want to go to. Data that is connected from the user to the device, router or server that goes to a website can be seen even stolen by the controller from the tool, router or server. They can see what websites are there and what internet activities you are doing. Why? because your data is not encrypted.

  3. Internet users who use VPN (virtual private network) services
  4. When using a VPN service where data traffic before going to the website you want to go to will first be connected to the VPN server. So the web or the platform you are heading to will not see you directly. They will see which VPN server is currently visiting their website or platform. Because when using a VPN service all your internet data traffic will be encrypted and not clearly visible. For example, you are actually in Dubai when accessing the site parties can find out clearly the IP address of your device and location in Dubai. By knowing that, they can see more of the internet activities that you have done so far. But when you use a VPN server located in the United States, will see your IP address and location in the United States and your data traffic is encrypted.

The types of protocols that exist on the VPN

  1. PPTP (Point-To-Point Tunneling Protocol).
  2. is the oldest VPN protocol. This protocol is by Microsoft. This protocol is very easy to use on all devices, both Android, Windows and GNU / Linux. This protocol has a fairly high speed compared to other VPN protocols. For this reason, the PPTP VPN protocol is still popular with internet users. Especially users who are new to VPN whose main reason is very easy to use.

  3. L2TP / IPsec (Layer 2 Tunneling Protocol).
  4. This L2TP / IPsec protocol is a PPTP protocol combination with the VPN protocol developed by Cisco. With this combination, it is certain that the data encryption process that runs on the L2TP VPN protocol is higher than using the PPTP VPN protocol. For speed, this protocol also has a fairly high speed. While in terms of use, this protocol is not so difficult to use. Because the use of this protocol is almost the same as the use of the PPTP protocol, there is only an IPsec shared key that we must input on our device if we want to connect using the L2TP VPN protocol.

  5. SSTP (Secure Socket Tunneling Protocol)
  6. A VPN protocol that was also built by Microsoft. A protocol made by Microsoft with an encrypted SSL / TLS connection. But many experts say that this protocol is only suitable for Windows and is quite difficult to use or configure. In general, this protocol is very rarely used by many people

  7. IKEv2 (Internet Key Exchange, Version 2)
  8. The protocol is also one of Microsoft's development. This protocol has higher security than the PPTP protocol. L2TP and SSTP. But this protocol is quite difficult to use

  9. Open VPN
  10. This protocol is a very good protocol with a fairly good speed and using high data rates compared to other protocols. But of course the higher the level of data encryption on a VPN protocol will certainly affect the speed in sending and receiving data.

About Us logo

Providing VPN Servers from countries that are on the Continent of Asia, Europe and America. VPN Server using the PPTP protocol (Point to point tunneling protocol). Free VPN services while still prioritizing user privacy without seeing or utilizing user data for our personal or interests.... Read more