Open In App

What is the full form of VPN?

Answer: VPN stands for Virtual Private Network

It basically encrypts the connection and makes the user’s IP address hidden by using various tunneling protocols. It is used to bypass geo-blocks and for security purposes. It is secure and private means for file sharing, communication and remotely accessing data without any risk of a hack. 

 



VPN tunneling ensures encryption at the user’s end and decryption at the receiver’s end, for this to happen the device should be connected to a VPN client software application.VPN acts as an intermediator between user and connection to the internet. It hides user IP address and makes a connection from VPN’s private network rather than the user’s ISP(Internet Service Provider). 



 

History of VPN

In 1996 a Microsoft’s employee started working on Peer to Peer Tunnelling Protocol(PPTP) from where the idea of VPN originated. In 1999 the first VPN was published. 

 


 

Characteristics of VPN
 

VPN protocols

It ensure an appropriate level of security with connected systems when the underlying network infrastructure can not provide it alone. To secure and encrypt, several different protocols can be used:

Working Principle of VPN 

Advantages of VPN

Disadvantages of VPN
 

Types of VPN 

There are mainly two types of VPN. They are –

  1. Remote Access VPN: A remote access VPN allows users to connect to a private network from a remote location. This type of VPN is often used by employees who need to access company resources from a remote location.
  2. Site-to-Site VPN: A site-to-site VPN connects two or more networks together over the internet. This type of VPN is often used by companies with multiple locations.
  3. Client-to-Site VPN: A client-to-site VPN allows individual users to connect to a private network from a remote location. This type of VPN is often used by individuals who need to access their home network from a remote location. 

VPN Privacy

A VPN can hide a lot of information that can put your privacy at risk. Here are five of them.

  1. Your browsing history
  2. Your location for streaming
  3. Your IP address and location
  4. Your devices
  5. Your web activity — to maintain internet freedom
Article Tags :