Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
0 votes
0 answers
29 views

Network Namespaces security issues

So I created a network namespace for running a vpn only for selected applications, let's call it "myvpn". I understand I need root to set a different namespace, which by default will start ...
Galeno's user avatar
  • 1
1 vote
1 answer
2k views

Why do people discourage using Tor with a VPN?

Why do Tor experts discourage using Tor and a VPN at the same time? Is it because of the network fingerprint, latency, or that there is no point to it?
paranoidrunner's user avatar
0 votes
1 answer
181 views

How to get through restrictions blocking OpenVPN?

I have recently set up a VPN server on my desktop at home in the hopes I can connect to it while at the university from my laptop. I have confirmed that I can connect easily on a mobile data hotspot, ...
Mercury's user avatar
  • 101
0 votes
1 answer
997 views

How do I use Mullvad's post-quantum safe tunnels with another WireGuard VPN client?

Mullvad includes setup instructions on their website for using their service with WireGuard clients on different platforms. Is it possible to use their quantum-resistant tunnel feature in a WireGuard ...
user12638282's user avatar
1 vote
1 answer
1k views

What does the OpenVPN 'auth' directive do?

What does the 'auth' directive do in an OpenVPN config file? I am using a PKI system with my OpenVPN setup, as detailed here, and i have got everything working OK (I.E Client connects to server). ...
M_D's user avatar
  • 469
0 votes
0 answers
280 views

Security risks of using Hyper-V to split tunnel under VPN connection on host

I have figured out a way to "split tunnel" using Hyper-V. My VPN uses a LAN on the host instead of a virtual adapter (I don't know how it works). Anyway, I configured a Hyper-V virtual ...
Guanyuming He's user avatar
1 vote
0 answers
109 views

Is it safer to use a VM and VPN for working with other people's python scripts or executables?

I want to start taking freelancing jobs doing python programming, but I am new to working for others. I want to do everything I can to avoid scams and having my computer infected with malware. I know ...
Scarlett's user avatar
3 votes
3 answers
7k views

Is an open port for VPN protected from hackers?

I'm trying to implement a VPN. I read about configuring VPN servers on Windows (built-in), and also several 3d party software like OpenVPN etc. But all these require a port to be opened in the router ...
alex's user avatar
  • 1,061
1 vote
0 answers
247 views

Persistent errors with certificate hash algorithm proposals on IKEv2 VPN after receiving updates on Windows 11 22H2

I have been dealing with VPN errors that persist across new OS installs and so seem to have to do with Windows 11 updates the PC is receiving. It is an IKEv2-only VPN with the native Windows client. ...
TheOrionArm's user avatar
1 vote
0 answers
213 views

How to convert PKCS12 keys in a way that MD5 isn't used?

I received a PFX file from a company in order to use their VPN. For openfortivpn I needed two PEM files to pass with --user-cert=cert.pem --user-key=key.pem, so I used openssl pkcs12 -in REDACTED.pfx -...
ByteEater's user avatar
  • 213
0 votes
1 answer
1k views

Can the VPN administrators see what I'm surfing on web when I connect to their VPN?

I’m working on a new job and they gave me the choice of using my own computer for working. Once I don't need to install any software I chose to use my MacBook. But, when I start a project with a new ...
Private Name for safety's user avatar
0 votes
3 answers
3k views

Does torrenting expose your information more than simply browsing the clear web? Why a VPN?

Everybody says you need a VPN to torrent. I won't bother posting references because literally everybody says so. Does that only apply to illegal torrenting (which I am not interested in... that's just ...
GPWR's user avatar
  • 511
1 vote
1 answer
2k views

Painfully slow local development and MS-SQL connection

I know some may suggest that this question needs to be asked on StackOverFlow, but I do not believe this is not a Dev issue and probably an IT/Security thing. I have posted this on ServerFault as well....
AleX_'s user avatar
  • 125
2 votes
0 answers
336 views

Can a website still recognize me if I use a VPN and clear my cookies? [closed]

I have a user account on some website, and want to create a new account on it using a VPN. I don't want the website to connect the new account with the old one. What are fingerprints that I should ...
Stackaloo's user avatar
0 votes
1 answer
423 views

Can Hacker See My VPN Data If he have my Credentials?

I have a little question in my mind related to any VPN. As we all know VPN connect through server with private or public encryption key to share encrypted tunnel. My Question is If unfortunately my ...
Fros Vonex's user avatar
0 votes
1 answer
346 views

Is copy and pasting data safer than typing when not using VPN

Forgive my ignorance, I am not well versed in cybersecurity. I tried looking it up but I couldn't find the answer I was looking for, perhaps from a lack of the right search terms. My question is, is ...
Dfvx990mq321pl's user avatar
0 votes
1 answer
30 views

If I were to set up a router to route network traffic directly through a VPN, do I lose the advantages of PFS?

I have been learning about the advantages of connecting to the internet via a VPN but before I jump in with both feet I’ve decided to do some reading around the subject to understand what I’m getting ...
pilky01's user avatar
1 vote
0 answers
501 views

Why is there persistent network activity to my ISP's DNS while connected to VPN, but no leaks are detected?

When using a commercial VPN, it creates a virtual ethernet adapter with its own DNS servers. If I check for DNS leaks using any of the websites for that purpose, it shows the VPN's DNS only. But when ...
tripolon's user avatar
0 votes
1 answer
284 views

How can I prevent anyone from using a windows admin account remotely?

To describe the current setup: We let our workers remote through a windows VPN Server(RAS). Is there a way to enforce a rule that would prevent any of them from logging into servers/workstations as a ...
OTR's user avatar
  • 1
1 vote
2 answers
103 views

Would a VPN over TOR connection be a better option if I trust my VPN provider?

I understand that running TOR through a VPN provides extra encryption because it routes your data through the VPN and then encrypts until it finally goes in the TOR entry nodes and leaves in the exit ...
AgentOrange's user avatar
0 votes
0 answers
1k views

credentials stolen from forticlient

I connect to a network using forticlient. Tonight I used a different wifi connection to connect to the same network using forticlient but I started getting the wrong credentials error. Then I ...
Fakhar Ahmad Rasul's user avatar
0 votes
1 answer
99 views

what type of vpn is there if we specify only VPN?

I had seen tutorials and studied about VPN but now one confusing point which is into my mind that is if somewhere VPN is written, is it a SSL VPN or IPSec VPN? My understanding is that there are two ...
shivaniverma6991's user avatar
0 votes
0 answers
33 views

Route to own server doesn't use VPN

Windows 10. We have a VPN that we use to access our servers and we can also use that to protect internet traffic when connecting via public WiFi. I have checked the IPv4 advanced setting to use ...
Kjell Rilbe's user avatar
1 vote
2 answers
111 views

Is the data safe over VPN if you are in an exploitive WLAN

One often hears/reads that with SSL or better an VPN your data is safe even if the WLAN is not secure. I don't understand much about Handshakes and SSL or VPN security but it was always hard to ...
user54512's user avatar
  • 835
1 vote
1 answer
154 views

VPN on a Bridged Virtual Machine

If one would use a VPN service on a bridged virtual machine running Linux on a Windows host, would the connection's security and privacy be breached in any way or shape due to this situation or would ...
O.A.'s user avatar
  • 131
0 votes
1 answer
411 views

How to tell if my VPN is working?

Hi when I am not connected to my VPN and do a route print I get one 0.0.0.0 entry in the Network Destination column. It has a gateway of 192..... When I connect to my VPN and do a route print I get ...
Sami's user avatar
  • 1
1 vote
1 answer
38 views

VPN connection - any mean against server being hacked?

as per my understanding the answer to this would be mainly no. As it's only making the traffic between such a server and whoever is accessing it through that VPN better then only an encrypted SSL ...
vrms's user avatar
  • 199
0 votes
1 answer
224 views

Do i need to buy a new digital certificate for my Synology NAS? [closed]

I have a Synology NAS at home. I have installed the VPN Server package and enabled Open VPN. There is a default digital certificate provided by Synology installed on it. From a security point of view,...
A j's user avatar
  • 195
0 votes
1 answer
187 views

If I connect to a website over HTTPS via VPN into Tor and make a self-identifying purchase, does that compromise my identity to other sites?

Let's work our way backward. I understand that the Tor exit node would not know who I am, because the request it is sending out is encrypted via HTTPS. But, the website it connects to would realize ...
N N's user avatar
  • 123
2 votes
1 answer
2k views

How to pretend I am using Windows or Android in Browser settings

I've got a link to login into my work outlook mailbox via browser outside of the work campus - it looks like https://vpn...blablabla. I am able to login via Opera on Android phone, but when I try to ...
Ilan's user avatar
  • 258
1 vote
1 answer
525 views

Completely isolating my VM from my host machine

I'm scam-baiting fake tech support people (like the ones who ask you to go to 7/11 and buy $200 Google Play gift cards for payment after running netstat and saying that you've been hacked). Most of ...
Quick's user avatar
  • 88
0 votes
1 answer
605 views

Safety of VPN Connection to Work VPN from work laptop versus private laptop, both on same wireless router

I use a laptop provided by work, which has (maybe for good reason, that does not need to be u for discussion here necessarily) some pretty restrictive IT Policies. I use this laptop to VPN into our ...
user2606742's user avatar
0 votes
1 answer
666 views

Intercept traffic in open wifi hotspot to scare family into using VPN [closed]

I recently setup my own VPN and I love it. Now I'm staying at a hotel and there is only a public wifi hotspot that doesn't even require a password. I'm using my VPN, but my family won't listen to me ...
Josh D's user avatar
  • 113
0 votes
1 answer
72 views

Exposing resources from my home server

I have a small VPS (Ubuntu 16.04) that I use for hosting of a few personal websites, ownCloud, etc. It's fairly slow and doesn't have a lot of storage. I'd like to offload the ownCloud storage and ...
Mikkel's user avatar
  • 855
1 vote
1 answer
417 views

Deployed my own VPN server using SoftEther. Websites are still blocked; advice needed. Further details inside

So, as the title says, I set up my own VPN using SoftEther. I tested it on a few un-restricted devices, and it seems to work fine. Using it on a managed device, however, still results in blocked ...
JohnLHoward's user avatar
-1 votes
1 answer
94 views

Company VPN privacy

In order to connect from home using Microsoft Remote Desktop Connection Manager to the company network's servers we are using a VPN Client called NetExtender (SonicWall). While being connected to the ...
secdave's user avatar
0 votes
1 answer
29 views

Securing access to internal services

I have two Linux servers, one is at my home and one is a VPS. The VPS need to access a LDAP directory on my home server. I would prefer not to open internal services to the world and for that purpose ...
dblouis's user avatar
  • 401
0 votes
1 answer
945 views

How to securely connect a Webserver to a Database server through WAN

I have two servers, one that will be hosting a database. The other a website. The one hosting the website should be able to accept and sent requests from any IP. The database server should ideally ...
Max's user avatar
  • 3
1 vote
2 answers
388 views

Can a VPN protect from malware when on public WiFi?

I used public WiFi once, and ended up having to factory reset my phone due to a virus/malware. Since then, I've simply avoided public WiFi. I'm going to be signing up for a VPN service, now that the ...
Tester101's user avatar
  • 668
0 votes
2 answers
605 views

Can I secure myself from my ISP using a VPN server or other implementation only from my home? [closed]

With the recent US government controversy I am interested in encrypting my traffic past my ISP. I know the conventional way to do this is with a VPN service, but my issue lies in that the only ...
Ryan's user avatar
  • 11
0 votes
1 answer
563 views

Routing certain Internet traffic through browser based VPN or private browser like Epic

There are some free VPNs that only secure browser traffic (so not really a VPN but they say they are a VPN, it's just semantics), but that do not secure traffic from other programs. As of right now, I ...
user685185's user avatar
-3 votes
3 answers
32k views

Copying files from a network location without a trace

If I copy files from my company server, through a VPN to my work laptop at home and save it on the hard drive, will this be detectable by my employer? If so, will subsequently copying the files from ...
user avatar
1 vote
1 answer
952 views

Is this VPN Kill Switch implementation secure enough?

I am using Private Internet Access VPN and it doesn't provide a kill switch for linux distros. So, I have written a simple script using iptables. After running Wireshark, I found that all the traffic ...
Shakhar's user avatar
  • 111
-1 votes
1 answer
1k views

Does a VPN encrypt the entire packet being tunneled, including all headers?

If I send my internet traffic through a VPN, are the packets that I send encrypted completely and encapsulated in a second packet (i.e. every byte in the original packet is encrypted and added to a ...
James Preston's user avatar
-1 votes
1 answer
888 views

Secure communication between linux machines

I have four machines in network which can talk with password-less ssh to each other and themselves. Now, I want to make the communication between them secure. How I can create a VPN between them? In ...
Vikram's user avatar
  • 129
1 vote
1 answer
391 views

Running an OpenVPN service on a VPS web server

I've deployed a VPS server on digitalocean to give node.js and applications like Ghost a try. Meanwhile, I want to use the droplet as a personal VPN as well. Would it be OK to run an OpenVpn service ...
cinnaroll45's user avatar
0 votes
1 answer
322 views

Can an external client access an FTP server?

The current network setup is like this: Company A has a network setup consisting of Cisco devices only. It has an FTP server where all files are stored and accessed. Company B has a different setup ...
user580466's user avatar
3 votes
1 answer
10k views

How to Disable WebRTC in Google Chrome

I understand there are security vulnerabilities exposed when WebRTC is enabled, so I would like to disable it in Chrome. How does one do that? I thought I'd be able to do it under chrome://flags, ...
Chris Geirman's user avatar
3 votes
1 answer
9k views

Disable Checkpoint Endpoint Security Policy

I have the same problem as this (How to disable the security policy with check point VPN-1 secure client?) but with an other client from checkpoint. I have the Checkpoint Endpoint Security Version ...
etalon11's user avatar
  • 199
1 vote
2 answers
1k views

Safety of local network over VPN

I have a Linux machine in a local network that uses an OpenVPN connection to reach the outside world. However, I know nothing about the VPN server itself and therefore I assume that whoever operates ...
Andrzej Pronobis's user avatar