- [ Hacking 101 ] :: [ Outline ]
- [ Hacking 101 ] :: [ Introduction ]
- [ Hacking 101 ] :: [ The Basic Skills of Hacking ]
- [ Hacking 101 ] :: [ What We Mean By Hacking]
- [ Hacking 101 ] :: [ Do You Need A Handle? ]
- [ Hacking 101 ] :: [ HTML ]
- [ Hacking 101 ] :: Mac Spoofing
- [ Hacking 101 ] :: Web Proxies
- Private: [ Hacking 101 ] :: Unit 9 :: Learn Linux 4 :: sudo, nano, users and groups
- [ Hacking 101 ] :: VPNs
A VPN gives you some degree of confidentiality (encryption) and privacy (anonymity), and works great in a business situation where you can have end-to-end encryption. But consumer VPNs aren’t the same, because encryption isn’t end-to-end, and providers are a privacy issue.
Here’s a look at different connection types from the perspective of a hacker: web proxies, network proxies, proxychains, VPNs and TOR. There’s a use case for each of these, which I discuss in the video.
Assignments: VPNs (Unit 4)
1. Install OpenVPN.
2. Rummage around online looking at free OpenVPN providers.
3. Do you trust them?
4. If you have a safe machine to do it from, try one out. This is what virtual machines are for. You’re a researcher, right? 😉