Installation Guide Private Android Internet

3:46:00 PM
Installation Guide Private Android Internet -

Download the Android app private Internet access directly from Google Play or PIA. If you are already on the site PIA, just click on "Support" at the top, then "Download Client and Support". The Client Configuration page also guide manual configuration to set Android devices to use their service with OpenVPN Connect, L2TP / IPsec + PSK, and PPTP. Once you get to this page, click on the "Download" button in the Android App area (shown left). This will take you to the Google Play Store where you can download and install the application on your Android device. You must allow in-app purchases for the installation to complete. The application requires Android 2.2 or higher. The images below illustrate this facility.

Once the application is finished installing, press the button "OPEN" (above right) to launch. This will bring up the login screen is shown in the image at left below. On this screen, you must enter the "Username" and "Password" of the welcome e-mail sent by private Internet access. Then enter "your email address" in the appropriate field and press the big green button "LOG IN". Notice that the pricing on the picture is $ 6.95 per month or $ 39.95 per year. Remember to use our discount VPNFan to save up even more.

This will bring up a screen like the one shown in the above medium. This is the main login screen for Android app private Internet access. From this screen, you can drag the link to the right of the cursor to connect to the selected location. If you tap the circled upper right sign of the current region (automatic), it will bring up the selection screen of the location that is the last picture above. As you can see, automatic and has a check comes in a green box. This means that your connection location. The locations are in alphabetical order and you can slide up and down the list to find your location. Also note that the ping times are listed below each location to help you find the fastest from your current location.

Now, say you want to connect to Melbourne, Australia, simply tap the location of the AU Melbourne last screen above. This will define the current location of the AU, Melbourne and you return to the main screen connection as shown in the first image below. To complete your connection to Melbourne, drag the slider to the right status. Since this is your first connection, you will see a display of attention as that shown in the second image below. You must trust the PIA VPN application and then press "OK" to the login process to continue.

You will then see an image as the third highest indicating that the application authenticates the server certificate before completing the connection. The last screen above shows that you are logged in Melbourne. IP addresses are also displayed on these screens, but were redacted for this review. Once you are logged in, you have a new virtual IP address as yours has been hidden. Also all your Internet traffic is now securely encrypted. We have seen how to connect to a new location when you are not already connected to a VPN server. Now let us take a look at how you change your location using private enforcement Android Internet access. This process is illustrated in the pictures below.

The first picture above shows that you are currently connected to the AU Melbourne. Taping on your current location area will show the locations to choose as you have already seen. Tapping on the New York location is all that is required to change from Melbourne to New York City. Just one tap disconnect from Melbourne and then sign in New York City as shown in the second and third images above. The last image shows our new connection is indeed New York as it is surrounded by a green box with a big green check.

The icon "?" In the upper right of the sceen bring copywright of information on the application and the components it uses. You can see if your fault. The last thing we want to look to the Android application is the parameters that can be accessed by pressing on the "gear" at the top right of the screen under the "?". The first of the parameters that are not represented account information and disconnection that disconnect from your VPN session. Note that if you disconnect you will have to re-enter your login information.

Sliding the screen up will reveal the connection settings that are represented in the images below.

setting the connection PIA Android app are:

  • Block LAN - This will keep other machinery to be able to communicate with your device if you're on a LAN (local Area network)
  • Use TCP -. Their are two protocols that can be used with OpenVPN connection.
    • UDP - This is the User Datagram Protocol is used with connections, low latency and can tolerate some packet loss. This is the default OpenVPN protocol for the application of Android private Internet access and the best for most users. It does not have to check the order of packages or loss, but can do a checksum if desired
    • TCP -. This is the transfer control protocol and is good for high latency connections and those who can not tolerate any loss. It provides the packet order error control and loss and retransmits packets when necessary. This makes it slower due to the extra burden involved in the error checking and retransmission packets in the correct order
  • Remote Port -. This allows you to choose the port for remote data tunnel through as shown in the middle image above.
    • Auto -. It will choose the best shipping for you
    • Port 1194 -. This is the standard OpenVPN Port
    • Port 8080 - This is the alternative port on port 80 for HTTP Web services. It is commonly used for the proxy port
    • Port 9201 -. This is the port used for WAP (Wireless Application Protocol) services on mobile devices
    • Port 53 -. This is the port used by DNS requests
  • local port - .. This allows you to define a local port to send data through which is then redirected to the remote port
  • Internet kill switch - once set, which will kill all Internet traffic to the device if the VPN connection is dropped.
    • There will restore Internet traffic once the connection starts again.
    • Disabling the switch to kill or leave the VPN client will also restore the normal functioning of the Internet.
  • port forwarding request - Enable this option to configure an application and allow remote users to connect to it. The remote uses must know the name of the device and the port number to connect to it successfully.
    • Port forwarding is only through the following gateways :. CA Toronto, CA North York, Netherlands, Sweden, Switzerland, France, Germany, Russia, Romania and Israel
    • Only do this if you are running for a service that you want others to connect from the outside because it will kill your privacy
  • Use small packages -. It transfers the data into smaller packets that solves some problems with some network or firewall configurations.

Here the connection settings are the encryption settings that are represented in the images below. The first of these is the encryption of data presented in the first frame. Tapping the Data encryption box to display a screen like that shown in the second image where you can select the level of encryption you want

Data Encryption . - This is the encryption used to encrypt and decrypt all of your Internet traffic once the initial secure tunnel has been established between your computer and an Internet server private VPN. The four choices you can choose from are:

  • AES-128 - Advanced Encryption Standard (AES) is the National Standards Institute (NIST) Technology protocol chosen and used by States US government for some secret documents. This uses an AES-128 CBC (Cipher Block Chaining) with a 128-bit key and provide the best performance for most uses
  • AES-256 -. This uses the same encryption algorithm as above. AES-256 CBC uses a 256-bit key is safer and slower. This is used to buy the US government for certain documents top secret
  • Blowfish -. It uses Blowfish CBC-128 with a 128-bit key as an alternative to AES. This is a secure algorithm and was one of the vice-champions of the competition NIST standards
  • No -. This does not encrypt your data and not recommended as it will you hide IP and VPN means is used as well as the proxy username. You will be sensitive to passive attacks where your data is stored by a third party without your knowledge. This can help overcome geographical restrictions and censorship.

The second is data authentication is shown in the first image below. Tapping the Data encryption box to display a screen like that shown in the second image below where you can select the level of security for data authentication.

  • Data Authentication - This refers to the algorithm that authenticates all your data to protect against active attacks (attacks in which an entity or added removing packages of your message).
    • SHA1 - It uses HMAC (Key-Hash Message Authentication Code) with a 0-bit key
    • SHA256 - .. This uses HMAC with 256-bit key and is therefore slower
    • No - it opens to active attacks and man-in-the-Middle (MitM) from outside sources where the attacker intercepts and alters your message before sending it on the VPN server without your knowledge
    • [

latest encryption settings is called the handshake that is shown in the first image below. Tapping into the handshaking area to display a screen such as that shown in the second image below where you can select the type and level of security for the handshake.

  • handshake - This is the algorithm that establishes the initial secure connection and verify that you talk to a VPN server PIA and not an imposter. Hence the name handful of hand. Private Internet Access v1.2 uses Secure Transport Layer (TSL 1.2) for this connection and all certificates are signed using SHA512.
    • RSA-2048 - It uses a 2048 bit Ephemeral Diffie-Hellman (DH) key exchange and 2048bit RSA certificate for verification
    • RSA-3072 -. This uses the same algorithm as above with 3072 bit both key exchange and RSA certificate
    • RSA-4096 -. This uses the same algorithm as above with 4096-bit key exchange and certificate RSA
    • ECC-256k1 -. Ephemeral Elliptic Curve DH key exchange and Elliptic Curve Digital Signature Algorithm (ECDSA) certificate for verification. secp256k1 Curve (256bit) is the curve that Bitcoin uses for its transactions is used both for key exchange and certificate
    • ECC-256r1 -. As above, but prime256v1 curve (256 bits, also known as secp256r1) is used both for the exchange of keys and certificate
    • ECC-521 - .. As above, but secp521r1 curve (521 bits) is used both for the exchange of keys and certificate

some terminals encryption settings and useful suggestions their use or non-use

  • maximum protection -. AES-256 / SHA256 / RSA-. 4096: This is for those who want maximum security for their data and Don not mind the loss of extra speed
  • recommended default protection - AES-128 / SHA1 / RSA-2048: This provides the best balance between speed and protection and is the best setting for most users
  • Risky - AES-128 / None / RSA-2048: . This configuration is susceptible to attacks MitM assets where a hacker intercepts the message and changes before sending it to the recipient
  • All Speed ​​No Security - None / None / ECC-256k1: . This is susceptible to both active and passive attacks from outside third parties (hackers). You might as well not have a VPN just like your IP is hidden. making the connection act as a proxy.

The private free Android application has a clean user interface and easy to use. Simply select a location and press the status slider to the right to connect. Regions Change is even easier as all you have to do is open the screen locations and tap a new location. The application automatically disconnects you from your old location, and then connect to your new one. The default settings used by Private Internet acsess are ideal for most users, so no technical knowledge is required to use their VPN. However, they offer manual settings for the connection and encryption for those who are more technical and want control over their VPN connection. Their application supports some advanced VPN capabilities for those who understand how to use them. This includes a variety of remote ports, local ports, port forwarding, small packets and even a kill switch to kill your Internet access if the VPN connection drops. Add to that, it includes the best encryption in the industry so you can be assured that you are safe in your local Wi-Fi hotspot.

Previous
Next Post »
0 Komentar