Protect 'Yo Self - VPN & USB Blockers | Philip 'dm' Campbell | Skillshare

Protect 'Yo Self - VPN & USB Blockers

Philip 'dm' Campbell, Decentralised Your Life

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
8 Lessons (13m)
    • 1. 1.0 - introduction

      0:53
    • 2. 1.1 - what is a vpn

      1:45
    • 3. 1.3 - not all are equal

      1:51
    • 4. 1.2 - why you need one

      2:01
    • 5. 1.4 - four choices to consider

      2:10
    • 6. 1.5 - usb port blocking bonus

      3:23
    • 7. 1.6 - the roundup

      0:53
    • 8. 1.7 - share and review (...)

      0:12

About This Class

did you know that on a public wireless network people can be easily listening and sniffing the network traffic to know what you're doing? do you use a public wifi network in a coffee shop a lot? do you charge your phone from USB ports inside a restaurant/bar or someone's laptop in the airport?

if so, I need you to take this course. this course will help you understand why you need to start thinking about your device(s) when your using any kind of internet connection that you do not own - I've also dropped in some advice about USB ports as a bonus to try and protect what comes in and out of your computer and stop things being loaded up on your computer.

we look at a few areas to help, this is not a complete solution but it will help with protecting your connection and the ability for someone to USB load jack you. you can still get infected with viruses and malware but we do not cover that here.

I give this advice in the hope that cutting down the 'surface area' of leaking your login details, banking logins and having background processes load up on your machine from the start might help you keep a little bit safer for longer. truth is, trust nothing and always change your passwords - have a plan of recovery if everything goes wrong quickly, keep analog numbers on tap!

in this course, we will look at the following. . .

  • what is a vpn
  • why you need to have one
  • not all vpns are made equally
  • suggestion of premium, cheaper and free solutions
  • additional security bonus tips about usb ports

my hope is this course will make you consider your hardware and connection a little more saving you time and money and also maintaining a level of reliability and uptime so you can work!

crucial advice for digital nomads in transition!

don't forget to grab a free month of the awesome expressvpn!

Transcripts

1. 1.0 - introduction: this course is around 20 minutes. Pecked yourself VPN and USB course about protecting yourself, protecting your connection, your machine while you're on the go. So we're gonna go through a few things we're gonna go through. What is a VPN? Why you need to have one, not OVP. Ends are made equally. Four choices for you to consider on USB security bonus for travelers making sure that your USB ports are blocked. So if you leave your machine in a coffee shop or if you need to the toilet or if you even just paying for something, somebody can't sneak in and put a USB stick on your machine on infected with malware. It's quite kind of a crucial bonus step a little bit different from V P M. But it's in general. This course is about encrypting protecting your machine 2. 1.1 - what is a vpn: so virtual private networks are is a method used to secure to give you security and privacy on private and public networks, mainly used in private networks in corporations. They use it to protect sensitive data. You basically have your machine one. End the Internet at the other end on a server in the middle, and you send encrypted data through that. It creates a virtual tunnel between you and a server, and the server talks to the Internet. So basically, your whole Internet experiences changed because you're encrypting your connection between you and a server. And then it's the server that talks to the Internet. So it gives you another level off protection because the I P address is actually the server , not from you. So imagine it if you like. As your connection is like a Christmas present, you don't know what's inside the wrapping. There's something inside of it, but that's your data inside being encrypted, the gift wrapping, being the encryption on the outside. Now the encryption. I'm going to go into too much detail here, but it's a symmetrical cipher algorithm, which sounds very advanced than it is. It's a mathematical calculation, which is a encryption method off decrypting, encrypting and decrypting the data that goes through that tunnel. Andi. There's office, obviously a trade off most of time between the strength of the cipher on the speed of which your data is pushed back and forth on DSO. The different kinds of algorithms have been made over the years that give certain levels of strength that can't be cracked or what's called a man in the middle attack, which is something trying to pretend to be the server in the middle, doing the encryption. So there's various different levels. Most of the time. If you by any provider you, they will have the latest and greatest encryption on there because they want to be better than the competitors. 3. 1.3 - not all are equal: one thing I will say about VPN XYZ there, Noel the same. Don't expect to just get a VPN service on it. Be it worked perfectly. Work well all the time. There is different kinds of quality of VP enzyme to try and get into that now. And I want you to shop around for very specific needs that you might have for your VPN virtual private network. It's kind of most of time of balance between performance cost. The feature set on the points of presence around the world. Now points of presence. The pops are basically different service in different countries. So you might have one in England, Germany, France, Thailand and each one of those has a country specific I p range. Every country in the world has a different I p range. That's how you know you're coming from a different country traveling around the Internet to different places. Your initial I P origin followed you with you with the VPN, you're connecting to a server in that country and then connecting out from that server. This is how you get an I P address in that country. So while free services are out there, there's a lot of decent ones out there. I find that in the long term, they don't do as good a job as premium premium bump shopping, the service level if you're business user. If you're traveling a lot, I would heartily suggest you just paying the fee for a 12 month package with a premium service. You get the extra support level, your access to better servers, but a quality of servers more time on limited time on most of them. And also they tend to react better. When you do have any problems, you can get hardware on yearly packages, which are great value mentioned. The yearly packages You can actually get boxes now hardware boxes that if you're in a hotel , for instance, you can connect into and then onto the Hotel WiFi instead of having software running on your machine, which is a great way of off locking down your connection. And in the next section, I'm going to be discussing some options that will work for you. 4. 1.2 - why you need one: So if you use a coffee shop regularly for use any open public network, you are prone to potential not absolute, but potential. Attack off your connection so you should always being crypt in your connection. Whenever you're using a open public WiFi network or network that you don't manage or regulate yourself, V pens are very useful as well to get around specific country content protection. So if you're traveling to a different country, maybe against Thailand, someone like this, you can get around having an I P address, which is from a different country, by connecting to a UK server to be able to watch things like I player and who. Lou etcetera. The reason why I also suggest VPN is banking and transitional data. When it comes to money, it's harder to hijack. If if you're connecting to a banking system, Andi, you don't have encryption on, then there's a possibility that people could be listening in on your connection and stealing some of that data. It is a lot more difficult. Obviously. We mobile banking now because you've got on your your mobile phone is via what's called Haiti TPS, which is a secure socket layer on. There's various other things that you need to do. Keep hard fingerprint additional codes, things like this. But that's not to say that it can't be what's called sniffed and your data be exposed. If somebody years scanning that WiFi network looking for traffic, all they will see is encrypted data. They'll still be able to see the encrypted data, but obviously they need the key to be able to decrypt that data. That it makes it pretty much impossible, not totally impossible. Nothing's impossible when it comes to data and connections to make incredibly harder to decrypt on D. C. Your data Also, I found that with VP ends, you could get around some of the issues that some of the I S P s block ports or reduce the traffic actually do a thing called throttling to throttle down the speed of certain connections to certain point reports. And this happens with bit torrent and things like that. Getting a VPN can also help with the speeds of downloading your torrents 5. 1.4 - four choices to consider: So my daily driver, the one I absolutely love and started to use a lot more, is expressly piano was using tunnel Bear on. While I like tunnel bear, I find that the feature set in the speed and the torrent unblocking in experts VPN is the reason why I stay with it. So it's global, super solid, super fast, and it unlocks. The Torrance is not cheap, but I won't say it's expensive either. And I think it's one of the best ones out there. Did a lot review reading, did it a lot of testing from four or five different VP ends, and all in all, I found this one to be the most solid. Like I said, I think that next one in that list will be Tunnel Bear will be my next solid offering. It's got a super easy. You It's really, really cute. It's ah, I got this nice little plug in for your browser to when you're going online. It's the simple on and off Andi, you guys really slick, but I won't say it has many points of presence as expressed VPN, and I've tried it with torrents is not as good one of the free solutions, I would say is better net dot co. They also have a paid hardware solution for later upgrading. If you really like that, if you go into this for the first time and you starting to get into regular usage of a VPN , that's one thing I found about a VPN is that you get one, but you forget to use it or you don't really automatically or your connection is a little bit slower than it was before, so you don't use it, and you're kind of losing out on the benefits of it. I found that express VPN is one that I can use them. Forget about it. But if you're looking to get into this brand new never used it before. It's better. Now is a good starting point if you want something with it built into your browser or one of the good browsers out there, which is similar to chrome. In some ways, Chrome and Oprah or Operation might call it have Web rt seed support out of the box, which is basically the new way of doing video chats. Onda, although it doesn't need a plug in like flash used to it is still kind of experimental stuff, so there's still little bugs and things that go wrong with Web LTC video connections. But Oprah has VPN built into the browser, so you don't need to go anywhere else for a VPN solution. It's also got on IOS app on The best thing about it is it's absolutely, totally free, which is just unbelievable for Web browsers have a VPN built in. 6. 1.5 - usb port blocking bonus: quickly want to get onto a few other areas about protecting your machine. We've been talking about incorrect encrypting your connection from your machine to a server . But I also want to talk about your USB ports because when you have a computer desktop, a laptop in a public space cyber cafe, you have three or four ports on the side of your machine that are open that are exposed on . We're trying. I'm trying to get you into the headspace of thinking about reducing the attack vector as it's called, which is the points where you are most open to attack from your Internet connection to somebody putting a USB stick in the side of your machine and within 10 or 15 seconds without you knowing installing malware or back doors on your machines and people get into your machine. So have you locked down your connection from prying eyes? What about your USB ports? So if you're using open public WiFi networks, be careful of what's called juice jacking. Now this is a new expression for me, but basically there is compromised power sockets or power points or USB cables that are able to install software through your us people. Now I know it's kind of controversial. It may seem sensationalist, but these are possible ways that when you're traveling that these things can happen on If you're a freelance or rely on your computer to do business, you want to make sure it is protected as possible. So there's a few things that you can do to help this. The 1st 1 I would suggest is a thing called Porter Power, which is, or sink stop, which have this element called a data block. So you put this in line in your USB and then do the power. It basically disconnects the data lines, so there's nothing that can move. Data wise from whatever is plugged in into your machine is just strictly power only, which is a really useful way of applying a data block mode on your USB port whenever you're charging it, just in case anybody gives you one of these power sockets or you can connect to a power socket, you're not sinking or have the possibility of sinking data from it. And then the next one would be these micro USB port blockers. Now I did a quick look on Amazon, but you may find one local to you, which are these little keys, and it comes with, like, a USB thing on a key that you put into us people and you turn it and lock it That way, nobody can put anything in there now. Obviously, the danger in in this is losing the key to actually take the USB thing out. But if you're using a laptop in a public space and you're nipping to the toilet or nipping to pay something, remember something can be put into your soil. Your computer on would intend to 30 seconds, depending on the damage that they're trying to do. Depending on the malware that's trying to be installed, they can affect you. Really, What's called Install a group kit in the background in machine, so blocking those ports when they're not in use when you're not using them, I think is a is a smart move. Your traveling Also, I'm not sure where you stand legally with put ports and customs inspections in different countries, but having these in your machine means that they can't plug in something to scan your machine. The last thing if your super super paranoid about your USB data prying eyes dating, you have extort on USB stick. Maybe you can grab yourself one of these crypt tex drives. That's all this is the day. And being a fan of steampunk, I thought it was a cool idea, which is basically a USB stick as a crypt X that you put inside of the tube. And you you set the dial for the code Onda, uh, after under the code before you could put it into a USB stick. 7. 1.6 - the roundup: so hopefully in the roundup had we reinforce the need to be aware and protected when using open public what Internet around the world looked at. Some services that I suggested today from pay to free mileage will vary across those services. Obviously on, I hope some of the advice will motivate you to reduce the potential Internet malware issues to a minimum. I really don't want you to have stress from, you know, having your Internet connection hacked, having software installed on your machine that you didn't ask for, didn't want, but also reducing the impact on your business. This is about productivity and optimizing the whole experience is exactly what all my courses are about. Please leave a review. Share it with your social networks. Anybody you think needs these tips. Of course, if there's anything that you would like to see anything you like suggest, drop me a line on. I'm glad to answer all of your questions. Thanks for watching today 8. 1.7 - share and review (...): while I have you enjoyed the course, Please share and review the course. It really does. Help me out. Click on the triple dot button. Leave a review shared with Twitter and Facebook. I'll catch up with you.