Bu nedir?
Giriş Tarihi : 08-08-2024 15:41

IT expert warns: VPN and DNS changes lead to security risks

IT Expert Ferhat Seven warned about the threats that will arise from changing VPN (Virtual Private Network) and DNS (Domain Name System) settings. Emphasizing

IT expert warns: VPN and DNS changes lead to security risks

that internet users all over the world use VPN or change DNS to bypass access restrictions, Ferhat Seven stated that these methods carry risks in many ways. Stating that some data can be stored or used against third parties, Seven said, “ VPN means virtual private network in Turkish. The point where it means virtual private network is that your data is encrypted on the internet and sent anonymously to another server and this data allows you to connect to the internet mutually. What kind of environment do you enter when you connect? You provide internet to your applications anonymously without any geographical restrictions. Is VPN secure? The question immediately comes to mind. You can receive and use internet data in another country, but how is this secured or is this secure? Can the VPN setting I get for free provide security for me? At this point, you can provide internet through applications installed by many VPN companies. But this internet provision can store some data with third parties or be used against you. With this information, it can be said that. VPN settings here bring many factors with them. There is a possibility that your data will be stolen, there is a possibility that your data will be processed, it can provide a redirection reputation to third parties or cookies. We can think about this issue as follows. Some complaints about VPN security provide its security. It can provide two-factor or clouding, which we call Open Cloud. But this does not mean that your data will not be stored or used against you, he said.

Following the restriction of social media platform Instagram in Turkey, users have recently increased the use of social network provider VPN , but Seven stated that not all VPNs are secure and personal information can be copied.If a different application area is desired to be developed for, there is THOR, there are proxy network providers, there is security shell, there are private network systems. So what types are used today? We play with VPN and DNS settings. After playing with VPN and DNS settings, we somehow present our data to the other party. But there are THOR networks. This is also a hidden factor. It progresses anonymously. When we provide these, that is, when we use these applications, the following may come to mind. Do these provide security? Can they protect my data? Questions may come to mind. These questions can be both advantageous points. You can process your data, your work, and when it comes to the security of your data, it may create some disadvantages. For example, you downloaded a software from a third party in VPN settings or THOR settings, you normally download a VPN application, but an application that comes with it comes in the background. And it can copy your data, store it within itself and present it to you or sell it to another person. This poses a great danger,” he said.

Your bank information can be stolen
In the event that unsecured network providers are used, personal information and bank information can be stolen and used against people through different applications running in the background and third-party applications, Seven concluded his words as follows:

“As is known in the 21st century, we shop online. After shopping online, we enter our credit card information. Is there a possibility that this credit card information can be copied via VPN ? If a third-party software is running in the background, this definitely means that third-party cookies have seen this or that it has been copied. Of course, you can understand the possibility that your information has been stolen by contacting your bank management. Or you can understand it thanks to a notification you receive. This can affect many results. For example, considering that you are using a postpaid phone, some payments can be reflected on your bill, and in terms of pricing, some VPNs can spread your daily cost over a month, and you can encounter high bills. In other words, as you know, we use many social networks. We enter some of our passwords in these social networks. After entering these passwords, the third-party software running through VPN can copy and run them. After running it within itself, it can log in wherever it wants and however it wants. The following question may come to mind. We have used VPN now , can they get our information? My own cellular VPNCan it copy my settings or DNS settings? If you use a free or unsecured VPN , a situation like this may occur. When the copying is done, it can connect to your computer from another country at any time and use it as its own internet server. This poses a great danger.”

Baş editörBaş editör

hfehmidemir