Linux is the safest OS you can use. Linux started as a free operating system for PCs and has since gone on to be a leading operating system on large servers and even supercomputers. Because of its excellent security, it is the number one choice of super servers and even government branches. Besides its PC offerings, Linux also offers its software to mobile phones, tablet PCs and video game consoles.
Linux is very secure in comparison to other operating systems. However, no network is completely secure unless the information is encrypted via superior VPN technology. Having a Virtual Private Network installed can help keep your information private. And it’s not as hard as you might think to install Linux VPN on a Linux system, though we’re not suggesting Linux itself is a walk in the park.
Here we go, in ten easy steps:
- Install the package, a DKMS package, which stands for Dynamic Kernel Module Control. This will simplify the rest of the installation.
- Install the PPP kernel module. This allows point-to-point protocol to work on your system. Test the PPP to ensure it is working properly. You may have to upgrade to the latest version.
- From here, you move on to the PPTP client. This is not the “VPN client”, but rather the system that allows you to access VPN configurations.
- Get additional GUI help programs: phppcntl, phpgtkmodule and pptpconfig. Loading pptpconfig will load a GUI program.
- Configure the VPN connection. This will involve finding all the company-sponsored information, like the username, server name, domain name, user name and password.
- Enter all of this information for the VPN connection or intranet.
- Make sure that the Routing Tab is set up properly. You will either select All to Tunnel or another radio button, depending on the requirements from your VPN host.
- Next, configure the DNS tab. You simply enter the provided DNS information, though it may automatically be added for you.
- For the Encryption Tab, you will have to enable and refuse some options. Enable Microsoft Point to Point Encryption, but Refuse 40bit Encryption, 128bit Encryption and Stateless Encryption. You must also Refuse Authenticate with EAP.
- The Miscellaneous Tab should be left alone, at default settings.
If you are still having trouble, contact your VPN provider’s customer support for more assistance.
- How to Setup DD-WRT VPN – 3 Jun
- How to Setup Blackberry VPN – 20 May
- How to Setup IOS VPN – 13 May
- How to Setup Mac VPN – 29 Apr
- How to Setup Nokia VPN – 8 Apr
- How to Setup Windows VPN – 1 Apr
- How to Setup Boxee VPN – 26 Mar
- How to Setup Xbox VPN – 12 Feb
- How to Setup PS3 VPN – 11 Feb
- How to Setup iPod VPN – 10 Feb
Add a comment
03 April 2013 | 0 Comments
The great people at IPVanish accepted to answer a few questions about their comp30 March 2013 | 0 Comments
Kazakhstan and Russia both have regimes in place that seek to control the Intern22 March 2013 | 3 Comments
Wouldn’t it be great if you could surf online without ever giving a thought to