VPN stands for “Virtual Private Network” and is a technology that allows you to access resources from your home network from anywhere in the world.
VPN encrypts your Internet connection from your network card to a VPN server. This encryption takes place in real time and reliably prevents the recording of the transmitted information. The type of your Internet connection (modem, ISDN, GPRS, UMTS, LTE, cable, leased lines, WLAN), the choice of your terminal or the location where you are located is irrelevant Completely encrypted.
How Does VPN Work?
A VPN (virtual private network) is a self-contained sub-network within a larger IP network in which the subscribers are spatially separated (sometimes thousands of kilometers). The participants connect via a VPN protocol to a login server which is available worldwide and receive their own new (internal) IP after the encrypted tunnel has been built. Since the entire connection to the Internet is encrypted, computers outside this network can no longer read or change the communication. This ensures that the client computer can communicate with selected other computers in a secure manner. This is done via a virtual network card in the customer’s computer. This network card appears in the operating system as a normal Ethernet adapter and is used by the system as well as the programs so synonymous; the only difference is the data that is transferred over this network card is automatically encrypted highly. In addition, settings of the best VPN login server prevent the customer from interfering with each other; each customer gets their own tunnel and their own encryption. All transmitted or received data are then sent to the Internet via a single IP (the IP of the respective VPN login server) – this server IP applies to all customers and ensures anonymity again. If the computer is not connected to a VPN or to a VPN provider of the fixed IPs, everyone can be identified by their unique IP at this time.
By encrypting via the internal, virtual VPN network card, it is ensured that the Internet connection is in transparent for providers, data collectors and other computers in the local network and cannot be assigned to the Internet user.