May 17, 2024

Proxy vs VPN



Published June 18, 2023, 3:20 p.m. by Naomi Charles


proxy vs vpn discusses the benefits and differences between the two services.

You may also like to read about:



so welcome back this great French today

we're going to talk about proxy versus

the VPN these are the proxy servers and

the VPN servers that have become very

popular last few years as ways of

getting around restrictions firewalls

any kind of service or country that is

imposing a lot of censorship using the

internet so they could both be used

proxy we're going to learn is a little

bit different than the VPN where the VPN

uses what's called tunneling and

tunneling involve some encapsulation and

some encryption so we'll talk about that

but if you look at this diagram here you

can see we have a user here he's coming

through a firewall and router this could

be a firewall an ISP unit service

provider and then he's connecting to his

server that he's either paying for or

finding free but it's Abby the proxy

server VPN if it's a VPN we're creating

a tunnel from the user to the VPN but

they both operate pretty much the same

except the VP and we're going to find

out creates that tunnel or the

encryption through something capsulation

and then from that server we create we

connect to our websites and what's nice

about the proxy VPN we're substituting

out our own IP address for the proxy or

the VPNs so I can provide a little bit

more security as far as surveillance so

it might be useful let's get going here

proxy here we have a user and a proxy

server is connected to proxy allows you

to get around firewalls and other

restrictions to access public internet

so if you're at a school or have a

country or company that has a lot of

restrictions on your internet as far as

where you can browse what sites that you

can view one way of getting through that

is getting through your firewall using a

proxy that would be available on a

server and a lot of times these don't

have the restrictions so you can find

them exec time without any problem

it also substitutes on your IP address

for the proxy which makes it harder to

track users now a lot of the services

have logs but some of them go ahead

looks so if they're not keeping locks

they're not actually recording your IP

address but your service provider is in

between here somewhere and they do have

lux

so if for some reason you connect to a

site that has a problem and FBI or some

other service is trying to track back

they can usually get back to the service

providing the service provider can

provide the IP addresses that have been

used connect to them and then to some of

those services that maybe the FBI or

some other services having problems with

so you need to be careful this first

became popular or some countries as I

mentioned try to limit their citizens

internet access and also is very popular

now in the high schools or any of the

schools for students to use to get

around the school district filters so

they have been used a lot in the

classrooms especially of late VPN has

become more popular because it's a

little more secure creates a tunnel

between the user and the service and

this tunnel is created through the

encapsulation of the packets now

everything is sent through the internet

is is chopped up into what we call

packets and the packets contain some of

that information and you might be

sending a letter or some other document

and you might be sending maybe five

packets that represent that letter or

document each one of these packets would

be had the address of where it's going

and where it's from just like a letter

and it would also be enclosed or

encapsulated with some header

information and some of the data that

comprises that letter or document and

since we're sending maybe five packets

each packet would be numbered one

through five and when they're received

on the other end if one of those packets

is missing receiver would just request a

reset of that one packet so it would

have all the packets that one

be needed drink recreate that document

so tunnel says the tunnel is formed by

the encapsulation of the packets by an

encryption protocols and encryption

protocol is what's going to actually

encrypt this data so that nobody else

can read it then it's going to create

some encapsulation where it creates the

packets and encapsulate these packets

with some information so that other

devices and routers can send them on

their way the VPN protocols such as open

VPN which is a new one that's supposed

to be very good IPSec PPTP l2tp SSL and

TSO these all encrypt the data and adds

the new header information this has

helped companies to minimize the

expenditures of having to use leased

lines or private lines that are routed

through telephone companies by using

existing lines of but the clients the

internet the Internet has the high speed

writing services trying to keep this

stuff moving very quickly so you don't

have the expense of having at least set

that high-speed ride equipment or having

a leased line so it can save you quite a

bit of money the internet to transfer

the data more securely using the

encryption protocols nothing nothing on

the internet that's a good note to make

nothing on the internet is ever

completely secure the PPP PPP protocol

is said to contain user ID and passwords

in plain text this could be a problem

usually I think we just have the IP

information in plain text but here we

have actually got the password and user

ID so somebody could capture that

man-in-the-middle or whatever could

create a opportunity for getting that

data and possibly circumventing the

channel and allowing somebody to get the

information or at least your personal

information VPN stay today is being

mostly used overseas to circumvent get

the internet website filtering

restrictions this is done by rerouting

the data using VPN servers to make it

appear at your website that just another

local visitor is connected so if your

connected to a VPN server another

country then that server can go ahead

and connect to some local websites which

to the websites it will just look like a

local user is connected so for some of

the countries that don't allow any

foreign visitors this would be one way

of connecting and getting getting

connected to some of the local websites

vpf description subscription software

applications substitute the users IP

address that we mentioned before just

like the proxy and replaces it with the

VPN server IP address so a little more

secure for the tracking or surveillance

that we're maybe concerned with today

VPN security you get what you pay for so

security is a concern you need to use a

very reliable company that can help best

safeguard your data however VPNs are

also targets and are compromised quite

frequently now because people realize or

criminals realize that there could be a

some data that maybe they are trying to

get their hands on or release of

personal information for the casual

internet surfer the advantage of not

having your data examined by other

surveillance or criminal cyber criminals

might just be the benefit you are

looking for especially from the school

situation where the students are just

trying to get around to local filter or

firewall they're very popular HT HT

HTTPS which is the hyper transfer

protocol with the s4 security making it

secure this is encryption so Gmail a lot

of other big websites have gone ahead

and secured on other sessions we connect

them just like the banks and other

services where there's exchange or funds

they've been using it for quite a while

most websites have moved to the HTTPS

which encrypts your session and helps to

make your data more secure again if

somebody is determined to get to you or

capture your data there are ways for

them to do that so nothing is completely

secure VPN free VPN services

there are some surveys reports some

analysts other people that have talked

about and have suggested that many other

third party free services are nothing

more than criminal enterprises trying to

gain access to your data your valuable

data or your personal information so I

would be very careful with any free

services out there you wouldn't want to

be transferring any important or

valuable information because it could

very easily lose that and also lose your

personal information that's it

proxies versus VPN very similar they

help to protect your IP address but I

the VPN actually does the encryption or

the tunneling to the public IP address

or the public Internet to allow your

data to stay encrypted and thereby

fairly secure so VPNs have become the

more popular device or software

application that's being used on both by

students and individuals in other

countries that are trying to get around

any kind of filtering or restrictions

thank you very much work on some more

hope to see you soon

Resources:

Similar videos

2CUTURL

Created in 2013, 2CUTURL has been on the forefront of entertainment and breaking news. Our editorial staff delivers high quality articles, video, documentary and live along with multi-platform content.

© 2CUTURL. All Rights Reserved.