What Is a VPN? Virtual Private Networks Simplified

A VPN, meaning virtual private network, is a connection method that adds security and anonymity to WiFi networks. Almost all Internet users would benefit from using a VPN. However, they can be hard to understand if you aren’t familiar with technology and Internet privacy. In this article, learn what a VPN is, how one works, and how to select the right one for you.

What is a VPN?

A virtual private network (VPN) creates a secure and encrypted connection between your device and a server. It allows you to browse the Internet anonymously and securely. By encrypting your Internet traffic, a VPN protects your data from third-party interception. This includes Internet service providers, governments, and hackers.

It adds security and privacy to both public and private WiFi networks. Think of it as a tunnel that encrypts and hides your Internet traffic. Whether you use the Internet often or just to check your email, using a VPN can help improve your online privacy.

How does a VPN work?

A VPN secure network

Using a VPN isn’t like using Incognito Mode, since your VPN doesn’t hide your traffic but encrypts it. Virtual private networks use advanced encryption protocols and secure tunneling techniques to encapsulate all online data transfers.

The virtual private network tunneling process encrypts traffic through the server. Here's what happens when you use a virtual private network.

  1. You connect to a VPN server. Once you choose a VPN provider, you can download and install the software to your device.
  2. Traffic routes through the VPN server. The server encrypts all your outgoing traffic as you browse the Internet. It acts as a proxy between your device and the Internet.
  3. It masks your IP address. The VPN server essentially assigns you a different, virtual IP through this encryption process. This hides your real IP address, giving the appearance that you're accessing the Internet from a different location.
  4. Data is decrypted and routed back to your device. When the response comes back from the webpage you're accessing, it goes through the same process. The encryption process begins at the VPN server and ends at your device.

Virtual private networks aren't the only "gateway" between a user and the Internet. Proxies are also a popular option for increasing network security. However, many users prefer virtual private networks over proxies since they protect all traffic.

Benefits of using a VPN

Regardless of what you use the Internet for, a VPN makes your online experience more private and secure. Virtual private networks protect your data on the web. This includes your browsing history, social media use, emails, and any other personal data. Here are just a few reasons why you should use a virtual private network.

You can use free or public WiFi without worry

Public WiFi networks can put you at risk of getting hacked. But a secure VPN encrypts your traffic, meaning your Internet connection is much more secure. You can visit coffee shops, libraries, or any other place with public WiFi and connect without worry.

You can evade network censors to access blocked sites

Because a virtual private network disguises your IP address, you can access sites blocked by your work or school. Furthermore, you can spoof your IP address to make it seem like you’re from a different region or country. This gives you access to different countries’ streaming libraries on sites like Netflix. You may even find better deals when shopping for big items like airline tickets.

It protects your data from the government

The government collects a lot of data from Internet users, largely gathered from their browsing histories. A VPN protects you, reducing the data the government and other third-party sites can collect.

You can choose between free virtual private network services and paid virtual private network plans. A free one may do the job depending on how much security you need.

Paid virtual private network providers typically provide more high-quality services. Users get robust gateways, proven security, free software, and increased speeds. However, all virtual private network providers support a VPN’s main purposes. These are added security, privacy, and IP location flexibility.

How to set up a VPN

Setting up a virtual private network is a rather straightforward process. In many cases, it’s as simple as entering a username and a server address. Most big-brand smartphones can configure virtual private networks using PPTP and L2TP/IPsec protocols.

Furthermore, most VPN providers include an app in their service that auto-configures your device to use their VPN. This makes the setup process simple for all users, regardless of their familiarity with technology.

However, if you prefer to configure your settings manually, follow these instructions.

Setting up a VPN on Windows 10

To connect a VPN on a Windows 10 PC, you must first set up a virtual private network profile. If you have a VPN profile established, skip to the steps below.

To set up a VPN profile:

  1. Select the Start button, then type Select Settings, then Network & Internet, then VPN. Click Add VPN.
  2. In Add VPN, perform the following actions:
    1. For VPN provider, choose Windows (built-in).
    2. In the Connection name box, enter a name for the VPN connection that you will recognize.
    3. In the Server name or address, enter the address for the VPN server.
    4. For VPN type, choose the type of VPN connection you want to create. You’ll need to know which type of VPN connection your VPN service uses.
    5. In Type of sign-in info, choose the type of sign-in info (or credentials) to use.
  3. Select Save.

To connect the VPN:

Setting up VPN on a computer
  1. Go to Settings.
  2. Select Network & Internet, then
  3. Next to the VPN connection you choose, select Connect.
  4. Enter your username and password or other sign-in info.

Setting up a VPN on MacOS

To connect to a VPN on Apple devices, enter settings in Network preferences. This is necessary for MacBooks and other Apple products. If you have a VPN settings file, import it to set up the connection. If you do not, you can enter the settings manually.

To import a VPN settings file:

  1. Double-click the file to open Network Preferences and automatically import the settings.
  2. Choose the Apple menu and then System Preferences. Click Network, then click the Action pop-up menu.
  3. Choose Import Configurations.
  4. Select the file, then click Import.

To enter VPN settings manually:

  1. Choose the Apple menu and System Preferences, then click Network.
  2. Click the Add button in the list at the left. Click the Interface pop-up menu, then choose
  3. Click the VPN Type pop-up menu, then select the type of VPN connection you want to set up and give it a name. Click Create.
  4. Enter the server address and the name for the VPN connection.
  5. Click Authentication Settings, then enter the information you got from the network administrator.
  6. If specified by the network administrator, click Advanced to enter additional information. You can access session options, TCP/IP settings, DNS servers, and proxies.
  7. Click Apply and then click OK.
nordvpn banner

Types of VPNs

There are a few main types of virtual private networks. We divide them into categories depending on how they work. They are remote-access VPNs, intranet-based site-to-site VPNs, extranet-based site-to-site VPNs, mobile VPNs, and cloud VPNs.

  • Remote access VPNs are primarily for personal use. They connect the user to a secure remote server in order to access a private network with added encryption.
  • Intranet-based site-to-site VPNs work for bigger businesses and companies. They let multiple users in fixed locations access each other’s resources with the same encryption and security.
  • Extranet-based site-to-site VPNs are also for bigger businesses or companies. But they work when multiple companies or groups need to connect without the possibility of direct access.
  • Mobile VPNs are virtual private networks optimized for on-the-go or mobile use. They typically exist in the form of an app. This allows users to easily download the virtual private network and switch between Internet connections seamlessly.
  • Cloud VPNs create a connection over the Internet between the user and cloud-based network infrastructure. They typically offer higher-speed connections as they aren't limited by network speed.

Virtual private networks prioritize privacy and security. Remote access VPNs, however, are significantly easier to implement and more flexible than site-to-site VPNs. However, site-to-site will be the best bet if many users need virtual private network coverage.

Virtual private network protocols

Virtual private network protocols determine how data routes between your device and the server. Protocols provide a stable connection. The number of virtual private network protocols and available security features continues to grow with time. However, the most common protocols are the following:

An image of a user establishing VPN protocols on a computer
  • Point-to-Point Tunneling Protocol, or PPTP, which has been around since the days of Windows 95. It can easily be set up on every major operating system. PPTP tunnels a point-to-point connection over the GRE protocol. However, due to its age, it’s no longer the most secure protocol available.
  • Layer 2 Tunneling Protocol over IP Secure, or L2TP over IPSec, which has more secure connections than PPTP. L2TP is a way of implementing two different protocols together in order to get the best features of each. It combines the tunnel of L2TP protocol and the secure channel of IPSec. Together, these create an impressively secure package.
  • OpenVPN, which is an SSL-based virtual private network. It has become more popular in recent years; the software used is open source and freely available. SSL is a mature encryption protocol. Furthermore, OpenVPN can run on a single UDP or TCP port, making it extremely flexible.

Common uses of VPNs

There are many reasons why someone may want to use a virtual private network. It works well for both personal and professional causes. Common uses of a virtual private network include:

  • Private browsing. Users can utilize a VPN to browse the Internet without the government or their ISP tracking their activities. It's like using a private browser such as Tor.
  • To protect business information. You can use a VPN to encrypt sensitive business data while working on a public or free WiFi network.
  • When torrenting. Users can download torrents without exposing their IPs by using a virtual private network.
  • For online games. Sometimes, using a virtual private network can help reduce lag and thus improve online gaming performance.
  • To access restricted content. Many users bypass geo-restrictions by installing and using a virtual private network.

There are many reasons why you may choose to use a virtual private network. Regardless, make sure you pick a good provider that will protect your data and keep your activity anonymous.

Frequently asked questions

Does a virtual private network change your location?

Yes, a virtual private network changes your location - at least, as it appears to the Internet. You don't actually change locations. However, your network will register as somewhere other than your location because it changes your IP address.

Some virtual private networks, like NordVPN, allow you to pick a connection location. This is particularly helpful when accessing other streaming services' libraries, for example.

When you're choosing a VPN provider, consider the number of server locations they have. This tells you how many options you will have when choosing where you want your traffic to route from.

Can a VPN be hacked?

Unfortunately, yes, a virtual private network can be hacked. Nothing on the Internet is completely impervious to hackers. However, virtual private networks aren't particularly vulnerable; generally, users trust their safety and security.

There are only two ways to hack a virtual private network. The first is through breaking encryption, which is quite difficult and can take years. The second is by stealing a key, which is not easy for even the best hackers. Overall, you will be safer on the Internet when using a virtual private network than you would be without one.

Does a VPN change your IP?

Yes, it changes your IP in a sense. It works similarly to your location when using a virtual private network. You don't actually get a new IP address to use forever.

Instead, your virtual private network disguises your actual IP address. This makes it appear as if the address originates elsewhere.

With some virtual private networks, your IP will change every time you use the network to surf the web. This provides a very secure browsing experience.

Is using a VPN illegal?

No, using a VPN is not illegal as long as you don't use it to perform illegal activities.

Are virtual private networks slow?

Virtual private networks aren't typically slow. However, using a free VPN can slow down your Internet speed. Free VPNs often lack the proper infrastructure and amount of servers to support the traffic they route.

What does VPN stand for?

VPN stands for virtual private network.

Does a VPN hide your IP?

Yes, a virtual private network hides your IP address. That's its primary purpose. Your virtual private network goes through all the steps of encrypting, decrypting, and tunneling your Internet traffic.

That way, it can hide your true IP address. That allows you to browse the web without limits and added security.

However, depending on the configuration, someone could see your real IP address. After connecting to the virtual private network, visit the What Is My IP homepage to see your IP address.