Dude, I've watched a lot of your videos over the years. I've learned a lot from you, I owe you a lot of thanks. Thanks for taking the time to explain all this stuff and for making it available, it's such a huge thing. Thanks for breaking down the individual components of the IT world and making them understandable. You really helped me man. Know that.
My idea is that a Decentralized VPN is better, because you do not have to rely on a third party which means you are the owner of your own data. We may be in the early stages, but decentralization is the future.
The best teacher online!!! Lectures are very interesting and easy to understand!!! You can read thousands of technical books about VPN and still not understand the meaning!!Continue what you doing man!!!
+Afro Head Pretty happy with HideMyAss www.hidemyass.com/vpn/r20533/ myself, it doesn't saturate my cable connection, but it's definitely fast enough. You have to connect to certain servers for torrent ports. Not using torrents anymore but when I was, speed didn't seem to be an issue for me on those servers.
Very useful video! You get straight to the point and do a good job of explaining the underlying technologies, much better than a lot of TH-cam channels that dumb things down far too much, and just tell you what a VPN does - something you could Google in about two minutes.
This is the first time I'm EVER commenting on a video and man your videos are just awsome!! Elli , your videos are simplified yet complete . Thanks for it.
i literally had to stop the video to write a thank you comment! The video is brilliant and your explaining methods are great! Thank you for making this video Eli!
You have some audio problem with this video, I'm on a headphone, the audio on the left side is louder than on the right and I've also got some noises here
Indonesia I can hear through my left ear it is so irritating I checked both my headphones with the same results; hyper cloud x and astro's 40's. and the right ear is fuzz
Thank you very much for this---I appreciate it a lot, very concise and organized with effective synopses at each end of the chapters. Very well done. Edit: You got my subscription for life.
Eli thank you for breaking it down, It really makes more sense to me know I had somewhat of an idea about it but I feel more confident that I can now explain it and troubleshoot VPNs now. Thanks just as everyone says you are truly amazing.
for every1 complaining about "left ear thing" just pull out the 3.5 mm jack about 1 mm from the place , that should spread contact to both speakers ....or just pull them out all the way and listen on computer speakers ;)
HideMyAss passed on their activity logs when asked to by authorities. This helped in the arrest of LulzSec members. If security/anonymity is your concern (I'd assume it is if you're using VPN's) then best to look at providers that don't keep these logs. HideMyAss keeps log on and log off times, at the very least, and will pass them onto authorities when asked to do so. Doubt anyone serious would recommend them these days.
dude just wanted to let you know your videos are really well written. I'm a Network Engineer and I listen to your videos for refreshers. you really know what your talking about. keep it up!
ELI! Thanks for the videos you are doing a terrific job at explaining and simplifying the technical bull**** into relevant language and examples. I wanted to offer a suggestion. . . with all due respect. I think you should create a "Course Test" for each video that folks like myself can take to enforce the concepts of your video training. I think you could be huge!! Thanks for all your hard work and dedication to the computer/networking world.
think of this Internet traffic is a river You connect a pipe from one end to the other in that river. That pipe is a tunnel in that river. With VPN the pipe structure is encrypted coding that is with other internet traffic, but it is structurally unique
I appreciate the metaphor, but I understand what a real-life tunnel is. And I understand how information sent/received can be encrypted. But I still don't understand what the walls of the tunnel are made of. The tunnel in the river may be made out of metal or concrete. But what can a tunnel mean regarding internet traffic?
well to understand that, you have to understand how packets of information flow over the internet basically it will be layer - 1st header[where it is going/from] 2nd data 3 header. in encryption the packet is like this - 1st header 2nd encryption 3 data 4 encryption 5 header. Technically this isn't exact, but for a basic idea, easier to understand this is how it works. but research packet TCP/IP to really understand
To fix the annoying sound problem with this video, try this quick fix (Windows 10): 1. Right click volume icon on taskbar, and go to *Playback Devices* 2. Click on the sound device you are using (typically your speakers/headphones) and click on *Properties* 3. Go to the *Enhancements" tab, and enable *Headphone Virtualization*/ 4. You will need to reload this TH-cam video for it to take effect. You should now get sound on both speakers/headphones.
Im trying to research how to bypass internet censorship, Turkey is thinking about blocking youtube and facebook and I wana know are VPNs the best way to get around this?? I allready know that proxys cant do vids so no good for youtube, would the same thing occure in a VPN?? Im aware of TOR but am reluctant as quite chunky and slow. As intresting as the deep web seems, im totally freaked out about going there and only wana use youtube/facebook so is really gonna be my very last plan.
Try this VPN I use it, It's very affordable and it has great features. My friends in Turkey are using it and works great for them www.privateinternetaccess.com/pages/buy-vpn/EMILYLIFE Hope this helps you!
Few people, however, realize that the Web was born at CERN, the European Laboratory for Particle Physics in Geneva, and that it was invented by an Englishman, Tim Berners-Lee
Many many Compliments Eli you're are born teacher ! I just discovered your teaching lessons(folllowed 2 of them) and I am impressed ! Thanks very much!
Summary: 1. VPN creates a tunnel between server and client where all the transmitted data is encrypted. 2. When a hacker tries to break into the tunnel, then the tunnel closes up and creates a new tunnel. 3. Upload speeds matter for VPN
If the data in the tunnel is encrypted, how is it that the target computer at the end of the tunnel is able to translate the encryption. Does the data come with a formula of translation, and if so, why doesn't a hacker's penetration of the tunnel reveal the formula?
Eli you re so good at teaching new things to me, I use your channel as google for everything I want to know more on, like "vpn eli the computer guy". Thanks man!
yeah, the problem with you're comment is that those things actually correlate. Virtual Private Networking was built for safely communicating during a time of crisis. You should give this guy a listen, he speaks in terms an elementary student would understand but the subjects are definitely college-grade.
May I assume to be more precise, this means the VPN server is responsible in creating/shutting down the tunnel? It creates the tunnel by establishing a fixed data path through specific routers between the server and the client? To detect packet loss, the first packet in each batch from the client will include the number of packets that the server should expect?
Thanks! I use this to explain VPN's to my friends. This is the best, most simple explanation, that's easy for beginners to understand I have ever seen. :)
I've been watching these videos for quite some time and the content is very good, Eli's knowledgeable about everything he talks about but you would expect "Eli the COMPUTER Guy" to have his audio working properly haha! keep uploading man!
The internet was created by a British Computer Scientist (Sir Tim Berners-Lee). Typical American arrogance... You call yourself a computer guy yet you fall for the myth/urban legend that it was created by the US military to combat nuclear war. A quote for you: "The widespread urban legend that the Internet was designed to resist a nuclear attack likely arose as a result of Baran's earlier work on packet switching, which did focus on redundancy in the face of a nuclear "holocaust" Read up on it...
Common misconception. Tim Berners Lee invented the World Wide Web, not the internet. They are different things. The internet stems from ARPAnet which is indeed American military based. Berners Lee invented the Language we now use on the internet, web browsers, hyperlinks etc. The infrastructure was the internet, the way we communicate over it is the World Wide Web...
Eli, you are awesome, man! I love how you explain these networking concepts. It is easy to understand even for people like me, with no technical studies. Keep up the good work! Cheers
HMA is priced pretty reasonably. In fact, last year they had massive discounts in the summer ( I think August) and for the Holidays (December). I think I got the whole year for $60. It's in their blog.
This is not entirely correct? Initially he talks about not using a VPN, and a man in the middle being able to spy on our data if he gets access to one of the routers. If we are using HTTPS as the application protocol to communicate, the data will be encrypted anyways between the computer in Seattle and the destination computer in DC? The data will still be encrypted when it reaches the routers on the way? Correct me if I'm wrong.
yes HTTPS is encrypted but there are ways that you can bypass https using attacks like ssl tripping. Also, in https the payload is encrypted and the header is not, the header is the reason the routers are able to route the packet on the internet and we know the header can have a ton of information that a hacker can use. In tunneling/vpn the concept of encapsulation comes into play, where the packets are encapsulated within the packets. The packet which is encapsulated and it is the main ip packet that is going to let us inside of our private network is totally encrypted including the header and the payload so, all of the packet is not readable, which means if we only use this packet to reach the network, we will get nowhere because the header is encrypted and the router can't read it and therefore won't route it. We then take another ip packet and encapsulate our encrypted packet inside of this packet. Now we have packet in a packet. The outer packet acts as a tunnel and has header not encrypted. This is tunnel, it allows us to make a connection to our router's public side and the payload part of this tunnel contains our totally encrypted packet. Now if the hacker tries to hack this, they will get the header of the tunnel which only tells about the public network and the routing path and nothing about the private path. If the hacker bypasses the https and is able to decrypt the payload of the tunnel he will only get the fully encrypted ip packet whose header is also encrypted. The hacker therefore, won't have any clue about which machine are we trying to access and the private addresses of our computers inside of our private network. so, we are adding a whole new layer of security using VPNs.
This totally encrypted packet is then decrypted by our VPN server and we can access the network. i know i replied a little late, maybe you already got the answer and it might be a bit confusing but i hope it helps :)
@@hoomanhu Cool. Thanks for that. I understood how a VPN works by completely encrypting a packet and encapsulating this packet in a transport packet. By only using just HTTPS, the packet headers are exposed.. Good point.
You mention a tunnel through which encrypted data is then sent. Isn't the encryption part of that tunnel, and in fact can be thought of as the tunnel itself? Putting a wrapper around packets doesn't do anything to protect them. Encrypting those packets, and then putting a wrapper around them to allow routing, does protect them. Or am I missing something?
Good instructor. I'd have liked a little more depth, though I know it was more of an overview. A question I've had is about IP address, if you enter one like your example, isn't it going to find a ton of addresses? Are addresses really that unique? Is this safe for doing secure things from a cafe? Or should ytou still just stay away? I don't like to do anything with passwords in public wifi.
hey Eli this was a great explanation of how VPN works for the beginner like me to understand. After watching this video i got a much better grasp of VPN. ive also learned lots from other networking videos you made.
21:20 LOL Eli is a legend lol...thanks....can you improve VPN connection speed by using certain tunneling protocols or methods? *LMFAO* When I visualize a tech newbie stumbling onto this channel and this specific video and hearing 3:05 ...they'll be like *"WTF?! I was just looking for a way to hide my creepy Japanese porn fetish from my ISP"!* _"VPN clearly sounds like overkill for my needs.....what, with its nuclear armageddon redundancy protection functionality. I bet that would make VPNs very pricey. I wonder if you can get VPN without all the nuke related stuff?!......"_ _"VPN maybe for enterprise...I'm going to need to find something else for my personal needs. I'm even willing to pay a little extra for an alternate solution that just protects against...stuff like electric surges..._ _"but war related protection is beyond my budget..even if its just the run of the mill regular warhead protection but definitely won't have $$ for protection against even ONE nuke let alone enough to cause_ *Nuclear Armageddon* _"hmmm...on second thoughts only God knows how long we'll be stuck in underground bunkers post the nukes...having access to super creepy Japanese porn..._ would be *HANDY* ....hmmm *HANDY* ... indeed" > > ----- Sorry, lol...I was cleaning up YT channel subs...and remembered this...still subbed...although scanning through Eli's videos post this one... RE:content and Eli transformation makes one 1/ Hope Eli is in a good place....his content were perfectly crafted for tech hobbyist newbies to get a solid primer...without ever needing to scratch ones head half way through a video...when the level of complexity makes a sudden and abrupt parabolic uptick. 2/ The carrot of being able to make a good-living by targeting neglected and confused SME's...has helped me make a little cash from a hobby. I;m sure many other channel viewers have found Eli's content helpful during early stages of a networking/sys admin contracting career 3/ That said, hope he re-discovers that Eli.... a splits his channel into however many he needs...so that this channel stays a rich source for great networking technology tutorials for newbie's looking for a quick primer, that is well delivered from an actual expert. I'm staying subscribed in the hope of a course-correction....back to the channel that's the first stop ..when tech hits you with another *'What the f8k is this sh88 moment?!" However, if the noise i saw scanning through new videos, keeps up will ensure...only an occasional check-back and only for the great archival footage.
I subscribed to IP Vanish VPN. When I connect to a server in any state listed in the server list, the IP address given for that server is different from the IP address given on "what is my IP address.com" in my browser. How can I confirm that I am actually connected to that server If the IP addresses given do not match. My browser give me a public IP address that do not have same format or number of a typical IP address. Do I need to change my VPN setting? Very confused.
Just learnt a whole lot about VPN's from a prisoner.
Many people don't know what a prisoner did before he was arrested.
+Naffi Axx I believe it was a joke about how he was wearing orange ;3
+The Sushi hahahahahahaah
+The Sushi This made me laught so hard xD
woyeeeee
Dude, I've watched a lot of your videos over the years. I've learned a lot from you, I owe you a lot of thanks. Thanks for taking the time to explain all this stuff and for making it available, it's such a huge thing. Thanks for breaking down the individual components of the IT world and making them understandable. You really helped me man. Know that.
Well explained! What do you think about decentralized VPN then? Is it safer than a traditional VPN?
My idea is that a Decentralized VPN is better, because you do not have to rely on a third party which means you are the owner of your own data. We may be in the early stages, but decentralization is the future.
@hye quin that's my biggest concern as well.
The best teacher online!!! Lectures are very interesting and easy to understand!!! You can read thousands of technical books about VPN and still not understand the meaning!!Continue what you doing man!!!
My
Left
Ear
Really
Enjoyed
This
Video
I thought my Headphones were broken once again xD ouuuuu
where can i setting?
+junpei me too
😂 I clicked on another video to see if my headphone was broken
:lol: me too
My left ear is getting very smart
haha
+Afro Head Yeah, it is true, mine too. But why?
+Afro Head Yeah, hahaha
+Afro Head Pretty happy with HideMyAss www.hidemyass.com/vpn/r20533/ myself, it doesn't saturate my cable connection, but it's definitely fast enough. You have to connect to certain servers for torrent ports. Not using torrents anymore but when I was, speed didn't seem to be an issue for me on those servers.
+Afro Head Hahaha that got me cracken!! :D
Very useful video! You get straight to the point and do a good job of explaining the underlying technologies, much better than a lot of TH-cam channels that dumb things down far too much, and just tell you what a VPN does - something you could Google in about two minutes.
You're TH-cam's top computer guy. You simplify everything and make it easy for beginners to understand many different IT concepts. Good video!
"He tries to penetrate your tunnel"
Couldn't resist.
kek
Had a good wee chuckle to myself there.
Hmm I need to get into the tunnel now.
grow up.
YOu nasty man :()
Not many people can teach as good as this guy!
Agreeed!! :)
@@MEN101 I heard its quiet good.
Its hard to loose focus in his lessons, where as so many Vloggers just bore you the hell out.This guy is spontanous and keeps it interesting.
Alon Fisher I never had any issues
@@MEN101 It is quite worthwhile. I want to learn to make my own customised VPN though.
Eli, you are the best! This is what we need to learn IT! you are an IT Professor!!!!!!
I want to protect my tunnel from penetration. Thank you for the info.
You can hear from both speakers if you unplug the headphones jack a little bit
This is the first time I'm EVER commenting on a video and man your videos are just awsome!! Elli , your videos are simplified yet complete . Thanks for it.
i literally had to stop the video to write a thank you comment! The video is brilliant and your explaining methods are great! Thank you for making this video Eli!
Loda mera
Why do so many people not know anything about their audio configurations, and then brag about it. Thank you guys for making me smile.
You have some audio problem with this video, I'm on a headphone, the audio on the left side is louder than on the right and I've also got some noises here
Indonesia I can hear through my left ear it is so irritating I checked both my headphones with the same results; hyper cloud x and astro's 40's. and the right ear is fuzz
Indonesia It means your right ear is lonely :D
+Indonesia Interesting, this seems to be the case with a lot of his videos :\
i hope you get to millions soon ... one million is nothing for you ... learned a lot from you over years . THANK YOU
just wanted to say that you are great bro, appreciate what you doin.keep it up
eli,What can I tell you, you are an amazing person, I thank you and appreciate you very precious time you spend teaching us this wonderful stuff
we love you from israel
Thank you very much for this---I appreciate it a lot, very concise and organized with effective synopses at each end of the chapters. Very well done.
Edit: You got my subscription for life.
This is the only video I've seen so far on VPN that actually truly explained what VPN is. Thank you.
Thank you Eli , Your Devotion and desire to share knowledge is an attribute I frankly admire in you. Welcome To kenya
Eli you are the best teacher I have ever seen, I wish I watched your videos back when I had to make a career choice.
Eli thank you for breaking it down, It really makes more sense to me know I had somewhat of an idea about it but I feel more confident that I can now explain it and troubleshoot VPNs now. Thanks just as everyone says you are truly amazing.
"Penetrate your tunnel"
You must be a wizard to not start giggling after like the 5th time you said that lol
literally thought i was the only one who smiled lol
for every1 complaining about "left ear thing" just pull out the 3.5 mm jack about 1 mm from the place , that should spread contact to both speakers ....or just pull them out all the way and listen on computer speakers ;)
Thanks
and everyone trying this note it only works on one side of the cable if you're using an aux
it worked 😀😀
I'm a compute sciences student and your videos have helped me a lot for my studies. Thank you very much !
Eli has secured his girlfriend's tunnel with VPN
hahahahaha
hahahahahahahahaha. Lol
awesome!
HideMyAss passed on their activity logs when asked to by authorities. This helped in the arrest of LulzSec members. If security/anonymity is your concern (I'd assume it is if you're using VPN's) then best to look at providers that don't keep these logs. HideMyAss keeps log on and log off times, at the very least, and will pass them onto authorities when asked to do so. Doubt anyone serious would recommend them these days.
Lol
dude just wanted to let you know your videos are really well written. I'm a Network Engineer and I listen to your videos for refreshers. you really know what your talking about. keep it up!
I am from Dubai and YAY someone noticed us
Adel adil Ya, I think ya'll r much more chill than ur Saudi neighbors tbh. Do u live in Dubai proper or just in the area?
You are really great at communicating. Not very many people do this repetition of information. Thank you.
ELI! Thanks for the videos you are doing a terrific job at explaining and simplifying the technical bull**** into relevant language and examples. I wanted to offer a suggestion. . . with all due respect. I think you should create a "Course Test" for each video that folks like myself can take to enforce the concepts of your video training. I think you could be huge!! Thanks for all your hard work and dedication to the computer/networking world.
Nice idea
I want to say big thank you. You are a great teacher and you explain things clearly, intelligibly and simply.
I still don't understand what a "tunnel" really is. What is the tunnel made of?
good question i would like to know the answer too
think of this
Internet traffic is a river
You connect a pipe from one end to the other in that river.
That pipe is a tunnel in that river.
With VPN the pipe structure is encrypted coding that is with other internet traffic, but it is structurally unique
I appreciate the metaphor, but I understand what a real-life tunnel is. And I understand how information sent/received can be encrypted. But I still don't understand what the walls of the tunnel are made of.
The tunnel in the river may be made out of metal or concrete. But what can a tunnel mean regarding internet traffic?
Brainbuster walls of the tunnel are made of bricks and grout..
well to understand that, you have to understand how packets of information flow over the internet
basically it will be layer - 1st header[where it is going/from] 2nd data 3 header.
in encryption the packet is like this - 1st header 2nd encryption 3 data 4 encryption 5 header.
Technically this isn't exact, but for a basic idea, easier to understand this is how it works. but research packet TCP/IP to really understand
Always learn everything from his videos, way better than paid ones or any other on youtube
To fix the annoying sound problem with this video, try this quick fix (Windows 10):
1. Right click volume icon on taskbar, and go to *Playback Devices*
2. Click on the sound device you are using (typically your speakers/headphones) and click on *Properties*
3. Go to the *Enhancements" tab, and enable *Headphone Virtualization*/
4. You will need to reload this TH-cam video for it to take effect.
You should now get sound on both speakers/headphones.
***** lol, yeah that can work too
thanks that helped!
I should not have to "try" any quick fixes from a "computer guy" seriously!!
Voice Cancellation works better
iSk00L doe eens normaal
man this is the video i needed. im completely new to this stuff your videos are always great!
Im trying to research how to bypass internet censorship, Turkey is thinking about blocking youtube and facebook and I wana know are VPNs the best way to get around this??
I allready know that proxys cant do vids so no good for youtube, would the same thing occure in a VPN??
Im aware of TOR but am reluctant as quite chunky and slow. As intresting as the deep web seems, im totally freaked out about going there and only wana use youtube/facebook so is really gonna be my very last plan.
change your proxies.
dont use tor for youtube, its too slow. youll go crazy.
Bobby Gecko Got some VPNs, thanks tho.
Try this VPN I use it, It's very affordable and it has great features. My friends in Turkey are using it and works great for them www.privateinternetaccess.com/pages/buy-vpn/EMILYLIFE
Hope this helps you!
This is a good one: www.hotspotshield.com/
Studying for an IT help desk Company (Compucom Mexico)..
This is GREAT stuff and most importantly UNDERSTANDABLE !! THANK YOU
you are awesome! I am happy for every video because I am automatically relieved, that there is someone who can explain it like a god :)
xXnoXx com
Von to
Why does the 'bomXb' always have to go off in New York. Can't it go off in Jersey instead?
Dude explained VPN quicker and more easily understandable than all of my college classes. This is sad.
Best instruction video that I've ever seen explaining what exactly a VPN is. Thank you!
Wow.. Are you a lecturer? I really enjoy the way you explain things...
Gianpaolo Pazzini are u a penguin?
My left ear just learned VPN!! It is attaining more and more knowledge as I am diving deep into your channel!
If this video is in any way invading my privacy or tracking my connection, it looks like my right ear has a VPN.
Few people, however, realize that the Web was born at CERN, the European Laboratory for Particle Physics in Geneva, and that it was invented by an Englishman, Tim Berners-Lee
A tech wiz can't get audio right.
within 54 seconds of listening to this video, I learned more than in half an hour of reading from various websites.
Take a shot every time he says "penetrate the tunnel".
Your lessons never get old. I always come here when unsure. You should do more lessons!
My Right ear understands. My left on the other ear.....
Your speakers are backwards. On headphones it's the left.
Many many Compliments Eli you're are born teacher ! I just discovered your teaching lessons(folllowed 2 of them) and I am impressed ! Thanks very much!
Had my earphones switched around and so I thought the left ear jokes were all sarcasm.
+James Martin lol
Neville Lusimba HAHAHA Some Dumb Shit, Right?
James Martin thats right..i thought it was twisted thinking..funny though
Summary:
1. VPN creates a tunnel between server and client where all the transmitted data is encrypted.
2. When a hacker tries to break into the tunnel, then the tunnel closes up and creates a new tunnel.
3. Upload speeds matter for VPN
My left ear greatly enjoyed this.
If the data in the tunnel is encrypted, how is it that the target computer at the end of the tunnel is able to translate the encryption. Does the data come with a formula of translation, and if so, why doesn't a hacker's penetration of the tunnel reveal the formula?
This Eli the computer guy is awesome!
No one explains better than you. I really appreciate your work and time.
Thank you Eli! 2011 and still helpful.
So well explained and interesting. Really enjoy the real work application.
Eli you re so good at teaching new things to me, I use your channel as google for everything I want to know more on, like "vpn eli the computer guy". Thanks man!
21:15
"a long time ago, 12 years"
now it's been 20 years...
Please come back next year to change it to 21. Thanks ❤❤❤
Excellent explanation. I don't know if is only my computer, but I can hear the audio just the letf-side, on the right-side the sound is mute.
I like your videos a lot! You are a great teacher man, great work!
Eli, when are we gonna see you shaved? :)
On Mac Os High Sierra:
System Preferences --> Accessibility --> Audio --> Play stereo audio as mono
came here for VPN but I am hearing talks of nuclear bombs ...
Eli talks about all types of things, worth the listen if you have patience.
warrengonline first time listening to him, man, he's the best!
yeah, the problem with you're comment is that those things actually correlate. Virtual Private Networking was built for safely communicating during a time of crisis. You should give this guy a listen, he speaks in terms an elementary student would understand but the subjects are definitely college-grade.
As old as this vid is, it's still a comprehensive VPN for dummies that's well explained. Thanks
Nice one Eli, that was very informative. Should solve my problems
May I assume to be more precise, this means the VPN server is responsible in creating/shutting down the tunnel? It creates the tunnel by establishing a fixed data path through specific routers between the server and the client? To detect packet loss, the first packet in each batch from the client will include the number of packets that the server should expect?
can i use VPN to anonymously serf the internet
Indeed you can my good man.
VPN is for privacy, not anonymity.
Brainbuster what is for anonymity then ?
Tor
Brainbuster vertabreakerrrrr
Thanks! I use this to explain VPN's to my friends. This is the best, most simple explanation, that's easy for beginners to understand I have ever seen. :)
Eli the computer guy you are awesome! Keep going
I've been watching these videos for quite some time and the content is very good, Eli's knowledgeable about everything he talks about but you would expect "Eli the COMPUTER Guy" to have his audio working properly haha! keep uploading man!
The internet was created by a British Computer Scientist (Sir Tim Berners-Lee). Typical American arrogance...
You call yourself a computer guy yet you fall for the myth/urban legend that it was created by the US military to combat nuclear war. A quote for you:
"The widespread urban legend that the Internet was designed to resist a nuclear attack likely arose as a result of Baran's earlier work on packet switching, which did focus on redundancy in the face of a nuclear "holocaust"
Read up on it...
A lot of shit was made in america by non-american, mostly by guy from europe
LOL why do Americans control the internet though dumbass LOL yeah he created it but he didn't know what to do LOL
Common misconception. Tim Berners Lee invented the World Wide Web, not the internet. They are different things. The internet stems from ARPAnet which is indeed American military based. Berners Lee invented the Language we now use on the internet, web browsers, hyperlinks etc. The infrastructure was the internet, the way we communicate over it is the World Wide Web...
Eli, you are awesome, man! I love how you explain these networking concepts. It is easy to understand even for people like me, with no technical studies. Keep up the good work! Cheers
Excellent teaching.
What exactly is the "tunnel" in a physical sense. It was described around 7:40 in the video.
Wow, been watching through the whole Networking playlist, and you've lost a lot of weight... looking good! Dat neck hair doe... :-P
you teachings are soo good and you keep the audience engaged throughout the course.. Great teaching skills.. awesome.. Thank You so much!
Rest in peace left ear
HMA is priced pretty reasonably. In fact, last year they had massive discounts in the summer ( I think August) and for the Holidays (December). I think I got the whole year for $60. It's in their blog.
Just got a suscriber!
Awesome vids keep them up Eli you are one of my favourite sources of self taught info.
Thanks for info... ps: Don't walk near prison with this shirt :) #truth
This is not entirely correct? Initially he talks about not using a VPN, and a man in the middle being able to spy on our data if he gets access to one of the routers.
If we are using HTTPS as the application protocol to communicate, the data will be encrypted anyways between the computer in Seattle and the destination computer in DC? The data will still be encrypted when it reaches the routers on the way? Correct me if I'm wrong.
yes HTTPS is encrypted but there are ways that you can bypass https using attacks like ssl tripping. Also, in https the payload is encrypted and the header is not, the header is the reason the routers are able to route the packet on the internet and we know the header can have a ton of information that a hacker can use.
In tunneling/vpn the concept of encapsulation comes into play, where the packets are encapsulated within the packets. The packet which is encapsulated and it is the main ip packet that is going to let us inside of our private network is totally encrypted including the header and the payload so, all of the packet is not readable, which means if we only use this packet to reach the network, we will get nowhere because the header is encrypted and the router can't read it and therefore won't route it. We then take another ip packet and encapsulate our encrypted packet inside of this packet. Now we have packet in a packet.
The outer packet acts as a tunnel and has header not encrypted. This is tunnel, it allows us to make a connection to our router's public side and the payload part of this tunnel contains our totally encrypted packet. Now if the hacker tries to hack this, they will get the header of the tunnel which only tells about the public network and the routing path and nothing about the private path. If the hacker bypasses the https and is able to decrypt the payload of the tunnel he will only get the fully encrypted ip packet whose header is also encrypted. The hacker therefore, won't have any clue about which machine are we trying to access and the private addresses of our computers inside of our private network. so, we are adding a whole new layer of security using VPNs.
This totally encrypted packet is then decrypted by our VPN server and we can access the network.
i know i replied a little late, maybe you already got the answer and it might be a bit confusing but i hope it helps :)
@@hoomanhu Cool. Thanks for that. I understood how a VPN works by completely encrypting a packet and encapsulating this packet in a transport packet.
By only using just HTTPS, the packet headers are exposed.. Good point.
if your internet is slow, your gonna have a bad time
not of you write a script to auto activate load balancing.
You mention a tunnel through which encrypted data is then sent.
Isn't the encryption part of that tunnel, and in fact can be thought of as the tunnel itself?
Putting a wrapper around packets doesn't do anything to protect them. Encrypting those packets, and then putting a wrapper around them to allow routing, does protect them.
Or am I missing something?
bro, the audio is awful, just saying.
Can routers modems...whatever read the information being sent through the tunnel?
I can advise a good VeePN. Works on all platforms, also high speed and full privacy
why you don`t explaining CCIE?
anyone in 2019?
Thank you so much. To a beginner in this field of study you really broke it down nicely and gave great examples of real world scenarios. Thank again!
My left ear feels lonely.
Put the headphone jack partially into the 3.5mm tunnel and both your ear tunnels will be engaged.
+Prasanth Valsan - nice tip dude!
Good instructor. I'd have liked a little more depth, though I know it was more of an overview. A question I've had is about IP address, if you enter one like your example, isn't it going to find a ton of addresses? Are addresses really that unique? Is this safe for doing secure things from a cafe? Or should ytou still just stay away? I don't like to do anything with passwords in public wifi.
YAY Dubai people are cool :P
hi sir
hey Eli this was a great explanation of how VPN works for the beginner like me to understand. After watching this video i got a much better grasp of VPN. ive also learned lots from other networking videos you made.
21:20 LOL Eli is a legend lol...thanks....can you improve VPN connection speed by using certain tunneling protocols or methods?
*LMFAO* When I visualize a tech newbie stumbling onto this channel and this specific video and hearing 3:05 ...they'll be like
*"WTF?! I was just looking for a way to hide my creepy Japanese porn fetish from my ISP"!*
_"VPN clearly sounds like overkill for my needs.....what, with its nuclear armageddon redundancy protection functionality. I bet that would make VPNs very pricey. I wonder if you can get VPN without all the nuke related stuff?!......"_
_"VPN maybe for enterprise...I'm going to need to find something else for my personal needs. I'm even willing to pay a little extra for an alternate solution that just protects against...stuff like electric surges..._
_"but war related protection is beyond my budget..even if its just the run of the mill regular warhead protection but definitely won't have $$ for protection against even ONE nuke let alone enough to cause_ *Nuclear Armageddon*
_"hmmm...on second thoughts only God knows how long we'll be stuck in underground bunkers post the nukes...having access to super creepy Japanese porn..._ would be *HANDY* ....hmmm *HANDY* ... indeed"
>
>
-----
Sorry, lol...I was cleaning up YT channel subs...and remembered this...still subbed...although scanning through Eli's videos post this one... RE:content and Eli transformation makes one
1/ Hope Eli is in a good place....his content were perfectly crafted for tech hobbyist newbies to get a solid primer...without ever needing to scratch ones head half way through a video...when the level of complexity makes a sudden and abrupt parabolic uptick.
2/ The carrot of being able to make a good-living by targeting neglected and confused SME's...has helped me make a little cash from a hobby. I;m sure many other channel viewers have found Eli's content helpful during early stages of a networking/sys admin contracting career
3/ That said, hope he re-discovers that Eli.... a splits his channel into however many he needs...so that this channel stays a rich source for great networking technology tutorials for newbie's looking for a quick primer, that is well delivered from an actual expert. I'm staying subscribed in the hope of a course-correction....back to the channel that's the first stop ..when tech hits you with another *'What the f8k is this sh88 moment?!"
However, if the noise i saw scanning through new videos, keeps up will ensure...only an occasional check-back and only for the great archival footage.
I subscribed to IP Vanish VPN. When I connect to a server in any state listed in the server list, the IP address given for that server is different from the IP address given on "what is my IP address.com" in my browser. How can I confirm that I am actually connected to that server If the IP addresses given do not match. My browser give me a public IP address that do not have same format or number of a typical IP address. Do I need to change my VPN setting? Very confused.