VPN - Virtual Private Network. This is a common name for a technology that allows you to create a virtual (logical) channel over another physical channel.
Following example can be an appropriate analogy (from the master of analogies) from the "ordinary" life:
you send a postcard from the post office to another city, and you get answer with the same postcard. Your neighbour most likely will not recognize the contents of postcards, because of a lot of efforts for this. For example, rob a postman. But in this case, the postman himself can easily read the contents of the card before he gives it to the recipient.
Let’s arrange "VPN". You have an assistant whose assignment is to encode the message in the card. It writes the message back-to-front and shifts the letters of the alphabet (changing A to С, B to D, ..., Y to A, Z to B). The assistant of your recipient knows how the message was encrypted, but the postman is no longer aware. He will have at least to assume that the message is encrypted, and then spend time hacking the cipher.
In the case of a "computer" VPN, hacking cipher becomes so time consuming that it becomes meaningless and you become “Joe whom nobody can catch".
Usually, VPN is used to create a conditionally secure communication channel if only conditionally dangerous channels are available.
In fact, different VPN technologies are used virtually everywhere. Any ATM is connected to the bank via a VPN over a normal internet connection. Branches of organizations in another city can connect to the network of the parent enterprise through the VPN. Providers have recently massively used or are still using VPN to authorize their clients - PPTP, L2TP etc.
You have a lot to hide! Let’s consider one of the possible scenarios (yes, we are paranoid).
You have an Internet bank with an attached payment card. You already know that the pin code from the card shall not be in a purse on a piece of paper next to the card. But at the same time you have a sticker on the refrigerator:
And here in your absence the pizzaman comes to your place and allowed to the kitchen by your kind grandmother. Before leaving he has noticed a sticker and managed to take a photo of it. And in a couple of hours you find a salary card suddenly empty with zero balance.
Is it possible and real? No? Think of a hundred others and be sure - someone has already come up with two hundred.
So how could VPN help in this situation? Virtually all companies that provide financial instruments have the ability to restrict access to an IP address. If you are sure that your IP address will not change, then you can include this restriction in your Internet bank. Now, even if your access is stolen, attackers will not be able to access your bank, and you will even receive a notification of such an attempt to enter if your bank provides such an opportunity.
Thus, simply the fact of having a static IP address allows you to use it as an additional "key" to the safe with money.
Answer is Yes. This is the peculiarity of used technology. You still have to believe someone and you can trust us.
OpenVPN is a program. It is able to make secure communication channels. It is free of charge. It has open source. It can be configured and run in server mode, or it can be in client mode. You can download, install and configure it yourself. And we can work in the transformer box with a wrench.
Commonly nothing good usually happens in such cases. We do not know how work in transformer booths, but know how to set up OpenVPN.
Strange enough, OpenVPN can be downloaded on the Internet. See Instructions for specific links to official sources, as well as the order of installation on various platforms.
There is almost no difference, but there is a nuance. Static IP address means that it will not change in a week, in a month. In general, data centers try to make it change as rarely as possible, since such a change creates a lot of inconvenience to all parties.
BUT! In addition a static IP address can engage a dozen customers along with you. And maybe a hundred - it depends on the greed and the capabilities of the company that provides such a service.
What happens if one client from this dozen starts downloading from the torrents the screen version of yesterday's premiere of a new movie? The right holder will send a complaint within a few hours, and the IP address will be blocked until the end of the proceedings. Of course, together with ALL customers using this IP address. It is long to search for a guilty one.
And here is dedicated IP address. It’s only yours. You use it alone and you can forget about the situation described above. Of course, in the event that you do not download same torrent yourself.
Your e-mail address and password entered during the purchase are used to access a special section of the site - the billing system. There you can write us a letter, and pay money. And there you can download a special configuration file for your OpenVPN client. Roughly speaking, this file also stores passwords for creating a VPN channel, i.e. when you connect, you do not need to enter anything.
The project is in test mode. Traffic is unlimited, as well as speed is without restriction. We collect statistics, according to the results of which we will see the further development of the service.
Theoretically, neither traffic nor speed problems should arise, since the capabilities of servers in data centers usually are by times better than opportunity of today's tariffs from providers.
For today, virtually any home router\ADSL-modem is able to ensure port-forwarding. Long ago, when the grass was greener, and the IP addresses were in sufficient number, when connecting to the Internet you received from your provider a dedicated real IP address. It could be dynamic, i.e. to change during reconnection, but, nevertheless, it remained dedicated.
So, there is the situation: the home computer is turned on, the magic program radmin is installed on it. You are at work, but suddenly something is urgently needed at a home computer. For example, "suddenly" MS-Access database failed and a backup copy is at home. But in fact in a router you already forwarded port 4899 from external to the internal address. Now feel yourself a winner and enter the external IP address into the radmin client, enter the home computer, download the database and earn the adoration of the accounting department.
So it was, until the number of WWW-users increased and there are no enough IP addresses. Now the providers provide the Internet through NAT. In short, you no longer have a dedicated IP address, so you cannot forward anything on your router.
There are some magic programs that bypass this problem. For example, TeamViewer, which can install VPN. The only problem is that not so long ago it was already hacked with quite serious consequences.
Since we are able to provide a dedicated IP address with a VPN, it is perfectly logical to provide the ability to forward the port, just like in a router.
ATTENTION! If you run a vulnerable service or specify a weak password, and then release it into the world, then it is highly likely that it will end badly. Using port-forwarding, you assume full responsibility for the possible consequences. For example, it's a very bad idea to run radmin with a login and password admin\admin.
You can forward tcp/udp-ports above 1000. We provide several examples in our instructions.
Services that can be deployed on home computer, in fact, are limited only by your imagination: RDP (Remote Desktop), VNC, various video surveillance systems, smart home, torrent clients, game servers, etc.
We'll mark the keys as obsolete and make new ones. The main thing is to report this to tech support as soon as possible.
If your account had been deleted, then this IP was issued to another client, thus there are no ways. Or you can wait and hope that this other client will also forget and not pay his/her account.
To avoid such problems, prepay your internal balance in billing for any amount. The service will be automatically renewed in this case.
In accordance with the contract for the provision of services, you, as a client, are fully responsible for the damage caused by the rented service. Even if you are not guilty.
NO. Complaints must always be handled. The faster is the better. Usually we wait from 0 to 1440 minutes before blocking the service.
Our company does not provide "bullet-proof" services. We do not ignore complaints.
Any questions and problems regarding complaints are resolved on an individual basis. If we see that the complaint is unreasonable, or sent by anonymous person, then such a complaint gets an informational status. I.e., you will be notified, and decision is up to you.
Complaints about information protected by copyright must be resolved within 24-48 hours. Of course, if we get such complaints against your IP from a dozen at once, then our reaction will be immediate.
Complaints, followed immediately by the termination of our cooperation with you, are already described in the contract: spam, phishing, carding, vulnerability scan, botnets, ddos attacks and other harmful acts. Later you can send claims to the Reptilians Government.
We have logs. Client, IP address (provider), start of VPN use, end of VPN use. Moreover, we will try to store them for the last couple of years.
Your logs will be disclosed in one case only, i.e., if XXX is the law enforcement officer of the state of the VPN server location and provides official writ. In Germany such a person shall be a representative of German Federal Police. If Federal Ministry of the Interior acts on the request of a third party, it will decide on transfer and disclosure of certain data to a third party.
According to many years of experience: the police will respond to a spread of child pornography or carding (theft of credit card information).