VPN – a brief summary on Virtual Private Networks

What is a VPN?

Put simply, a Virtual Private Network, or VPN, is a group of computers (or discrete networks) networked together over a public network—namely, the internet. Businesses use VPNs to connect remote datacenters, and individuals can use VPNs to get access to network resources when they’re not physically on the same LAN (local area network), or as a method for securing and encrypting their communications when they’re using an untrusted public network.

When you connect to a VPN, you usually launch a VPN client on your computer (or click a link on a special website), log in with your credentials, and your computer exchanges trusted keys with a far away server. Once both computers have verified each other as authentic, all of your internet communication is encrypted and secured from eavesdropping.
The most important thing you need to know about a VPN: It secures your computer’s internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes.

Benefits of using a VPN

The downloader. Whether they’re downloading legally or illegally, this person doesn’t want on some company’s witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrent—everything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?

The privacy minded and security advocate. Whether they’re a in a strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether they’re at home or abroad. To them, unsecured connections mean someone’s reading what you say.

The globetrotter. This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.

Even if none of the above really sound right to you, you can still benefit from using a VPN. You should definitely use one when you travel or work on an untrusted network (read: a network you don’t own, manage, or trust who manages.) That means opening your laptop at the coffee shop and logging in to Facebook or using your phone’s Wi-Fi to check your email at the airport can all potentially put you at risk.

The best VPNs offer a solid balance of features, server location, connectivity protocols, and price. Some are great for occasional use, others are geared towards getting around the location restrictions companies put on their apps and services, and others are targeted at people who do heavy downloading and want a little privacy while they do it.

What makes a good VPN?

Logging: When you connect to a VPN, you’re trusting the VPN service provider with your data. Your communications may be secure from eavesdropping, but other systems on the same VPN—especially the operator—can log your data if they choose. If this bothers you (e.g., you’re the privacy/security advocate or the downloader), make absolutely sure you know your provider’s logging policies before signing up.

 

This applies to location as well—if your company doesn’t keep logs, it may not matter as much where it’s located. (There’s a popular rumor that US-based VPN providers are required to log, in case the government wants them. This isn’t true, but the government can always request whatever data they have if they do log.)

Anti-Malware/Anti-Spyware Features: Using a VPN doesn’t mean you’re invulnerable. You should still make sure you’re using HTTPS whenever possible, and you should still be careful about what you download. Some VPN service providers—especially mobile ones—bundle their clients with anti-malware scanners to make sure you’re not downloading viruses or trojans. When you’re shopping, see if the providers you’re interested in offer anti-malware protection while you’re connected. For example, previously mentioned Hotspot Shield offers malware protection to its premium users. It may not be a dealbreaker for you, but it’s always good to have someone watching your back.

Price: Finally, go into your user agreement with both eyes open. You should read the privacy policy for the service you’re interested in, and be very aware of the differences between free and paid services.

For example:

Free VPN Providers are more likely to log your activities and serve contextual ads while you’re connected. They’re also more likely to use your usage habits to tailor future ads to you, have fewer exit locations, and weak commitments to privacy. They may offer great features, but if logging and privacy are important to you, you may want to avoid them. However, if you just need quick, painless security while traveling on a budget, they’re a great option.

Subscription VPN Providers usually take your privacy a bit more seriously, since you’re paying for the service. It’s unusual for them to show ads, although whether they do logging or store data about your usage varies from company to company. They usually offer free trials so you can give the service a shot first, but remember: just because you’re paying for a service doesn’t mean you shouldn’t do your homework.

Thinking VPN?

Contact PlanIT Computing today on 014852222 for a breakdown of options available for your VPN requirements.

Managed IT Hosting & Managed IT Services

Despite budget cutbacks and personnel reductions, IT organizations must continue managing and expanding existing infrastructure. Managing that technical infrastructure is an increasingly complex and time consuming proposition.

PlanIT Computing provides the tools and manpower necessary to ensure your entire system or any part of IT – computers, servers, network, peripherals, etc. – are optimally performing. When you sign up for our Managed Services, we use our Watch Guard technology to proactively monitor and maintain your systems with automated reporting that describes your system health and security.

Continue reading

Hamachi’s Gateway VPN and Guest OS on a Windows 2012 / Hyper-V Installation

While testing the installation of Hamachi on a Hyper-V Guest, the install broke the network configuration.  This is due to the way Hyper-V and Hamachi operate.

In Hyper-v you have to have it add a legacy network adapter and then open command line in Administrator mode and enter the following commands:

  • netsh bridge show adapter
  • netsh bridge set adapter 1 forcecompatmode=enable

Then begin the install for Hamachi in Gateway network mode.

If you require any additional support on setting Hamachi up on a Hyper-V Guest, please feel free to contact us on 014852222.

PJ Hegarthy Online Auction with Wilsons Auctions proves to be a success

 

Wilsons Auctions and PJ Hegarty Logo

 

Recently, we were asked by Wilsons Auctions to add a temporary broadband link to facilitate their Online Auction Services for PJ Hegarthy in Cork.

The location of the rostrum was about 150 metres away from the main network cabinet, with no network connectivity. In an ideal world Fiber or Wireless LoS would be the perfect candidate, but cost followed by its temporary residence there made this an nonviable option. A plan to use a 3G router was discussed but the location was in a “patchy” area for receiving a solid 3G connection.  Latency is also an additional issue when using 3G.

Continue reading

IT Service Plans, Maintenance & IT Support Options from PlanIT Computing

Our IT Service Plans provides your business with all of the regularly scheduled services your business will need, comprehensive server and client monitoring, after hours support access, annual network audits, access to help desk services and emergency onsite visit coverage.

At PlanIT Computing, we provide  proactive IT Managed Services. Our combination of regular remote preventative maintenance and real-time monitoring of your computer systems delivers the following benefits:

  • Minimize your IT downtime and failures. We address smaller IT problems before they become expensive IT failures through our remote monitoring, alerting and support mechanisms.
  • Reduce your IT support costs. The ability to connect remotely to your IT systems to take corrective actions avoids expensive on-site call-outs and provide instant support is the key to PlanIT Computing’s Managed IT Services.  Proactive maintenance means fewer issues and less “unexpected” and costly on-site IT support work.
  • Proactive Support. When our monitoring system detects a potential IT issue we are instantly alerted and will contact you to decide on a course of action to address the issue before it affects your business.

Continue reading

Pro-active IT Maintenance and Support

Proactive Maintenance

Imagine being able to pinpoint and eliminate a problem on your computer network before any symptoms occur within the systems you use.   It would save you money in down time and keep your system running the way you need it to for your business to operate.

This is the advantage of proactive maintenance over reactive maintenance. Proactive maintenance provides corrective actions aimed at the sources of potential failure. The first logical step to proactive maintenance is the implementation of regular onsite inspections of your computer network and systems. We provide this service to our clients and they see the immediate benefit of it. After all, prevention is better than cure.

Remote Support

As part of our commitment to getting issues resolved as quickly for our clients, we also provide Remote Support. This means that we can (in most cases) log into our client PC’s/Servers via a secure channel from our offices and get to the source of the problem within a few minutes. We have found that most issues are resolved within 30 minutes.

Onsite Support

When Helpdesk support or our Remote support doesn’t successfully resolve the logged call, then we can dispatch an engineer (or team) to your offices to resolve the issue on-site. For our contract clients, our response times are fast and part of the contract and for all other clients it is based on a priority system where the most critical problems are addressed first.

Call us now in Dublin on 01 485 2222 or drop us an email on info@planitcomputing.ie to discuss your IT Support requirements.

Network Maintenance and Support

Network Maintenance & Support

PlanIT Computing can provide your business with an IT Support contract to suit your every need. Our support team can provide you with assistance on a 9am-6pm basis or if required on a 24/7 support plan.

Our expertise ranges from network/server solutions to printer, copier, fax, desktop, laptops and smart-devices. Our major strength is our flexibility. We provide different service levels so you can pick the one that suits you.

For example, you can choose a between a 2, 4 , 8 or 12 hour response service based on the critical nature of the problem to your business with engineers calling directly to the site within the agreed time frame. And, because our maintenance services are offered on a fixed price basis, you know exactly how much you are spending on maintenance, keeping in line with your IT budget.

Continue reading

Structured Cabling – The backbone of every network

Structured Cabling – From conception to installation,  PlanIT Computing is with you all the way. We can assess your infrastructure and provide the right cabling products and installation services to maximise the performance of your network and ensure your project is completed on time and on budget.

PlanIT Computing offer a free of charge site survey for all potential cabling installations.

Continue reading

Keeping your network safe with IT Security

What is IT Network Security?

IT Network Security defines the activities that a company or organisation takes to protect its network and its data. It is a basic requirement for all businesses. Threats to a company’s network are many but the most common are spread over the internet.

These include:

  1. Viruses, Worms & Trojans
  2. Data interception & theft
  3. Spam
  4. IT Network Security
  5. Computer Hackers
  6. Spyware, Malware & Adware
  7. Data interception & theft

Continue reading