ONE OF THE most important skills any computer user should have is the ability to use a virtual private network (VPN) to protect their privacy. A VPN is typically a paid service that keeps your web browsing secure and private over public Wi-Fi hotspots. VPNs can also get past regional restrictions for video- and music-streaming sites and help you evade government censorship restrictions—though that last one is especially tricky.
The best way to think of a VPN is as a secure tunnel between your PC and destinations you visit on the Internet. Your PC connects to a VPN server, which can be located in the United States or a foreign country like the United Kingdom, France, Sweden, or Thailand. Your web traffic then passes back and forth through that server. The end result: As far as most websites are concerned, you’re browsing from that server’s geographical location, not your computer’s location.
We’ll get to the implications of a VPN’s location in a moment, but first, let’s get back to our secure tunnel example. Once you’re connected to the VPN and are “inside the tunnel,” it becomes very difficult for anyone else to spy on your web-browsing activity. The only people who will know what you’re up to are you, the VPN provider (usually an HTTPS connection can mitigate this), and the website you’re visiting.
When you’re on public Wi-Fi at an airport or café, that means hackers will have a harder time stealing your login credentials or redirecting your PC to a phony banking site. Your Internet service provider (ISP), or anyone else trying to spy on you, will also have a near impossible time figuring out which websites you’re visiting.
On top of all that, you get the benefits of spoofing your location. If you’re in Los Angeles, for example, and the VPN server is in the U.K., it will look to most websites that you’re browsing from there, not southern California.
This is why many regionally restricted websites and online services such as BBC’s iPlayer or Sling TV can be fooled by a VPN. I say “most” services because some, most notably Netflix, are fighting against VPN (ab)use to prevent people from getting access to, say, the American version of Netflix when they’re really in Australia.
Esta historia es de la edición PCWorld February 2017 de PCWorld.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor ? Conectar
Esta historia es de la edición PCWorld February 2017 de PCWorld.
Comience su prueba gratuita de Magzter GOLD de 7 días para acceder a miles de historias premium seleccionadas y a más de 9,000 revistas y periódicos.
Ya eres suscriptor? Conectar
Private Internet Access: A low-price, high-value VPN for everyone
This veteran VPN shows it can still hang with the best.
Hands-on: Kensington's first Thunderbolt 5 dock is built for the future
Thunderbolt 5 is here...but you'll need more than just this well-built Kensington dock to take advantage of it.
Tested: Intel's Lunar Lake chip wants you to forget Qualcomm laptops exist
Great battery life, mediocre performance, surprisingly decent gaming: That is how Intel's Lunar Lake chip stacks up.
7 laptop habits that coax the most out of your battery
Don't send your laptop into an early grave.
WordPad is gone from Windows 11. Here's how to bring it back
With the arrival of Windows 11 version 24H2, WordPad is officially gone. Want to keep using it? You're in luck.
Hackers know your social security number. Here's how to stay safe
Thanks to a multitude of data leaks, your most sensitive information is now easily accessible to the world.
20 insanely useful Windows 11 keyboard shortcuts I use every day
After so many years, I'm still discovering new keyboard shortcuts.
WHAT THE HECK IS AN NPU, ANYWAY? HERE'S AN EXPLAINER ON AI CHIPS
ALL PCS WILL SOON HAVE NEURAL PROCESSING UNITS. HERE'S WHAT THAT MEANS FOR YOU IN SIMPLE TERMS.
WINDOWS 11'S 2024 UPDAATE: 5 BIG CHANGES I REALLY LIKE (AND MORE)
WINDOWS 11'S ANNUAL UPDATE IS ROLLING OUT OVER THE NEXT FEW WEEKS.
Hackers are using AI-generated code for malware attacks
Two separate attacks have been spotted using code that was probably written by artificial intelligence.