Should You Setup Your Own VPN Server?

In this post, I am going to go through the different ways a VPN can be hosted.

I am just going to talk about VPNs in the context of people using them to secure their connection and/or hide their IP address (not about using a VPN for connecting two company networks together).

Should you setup your own VPN server? Only if you just require security not privacy. Otherwise I recommend going with a reputable VPN service.


Self-Hosted VPN

This is when you run your own VPN server from your home/office. The main advantage of going this route is that you control your network, and you completely control your computer that runs the VPN server.

The Good:  You get the advantage of extra security when connecting over a potentially hostile network (e.g., coffee shops, hotels, etc.).

The Bad:  You get no privacy what so ever, since your online activity is under the IP address you have been assigned by your ISP (Internet Service Provider).


VPN on a Virtual Private Server

Many online companies offer virtual server hosting solutions. Many of these companies allow their users to setup their own OpenVPN server. You technically are running your own VPN server, but the server itself is being hosted elsewhere.

The Good:  You get some privacy since the IP address of your server is owned by your web hosting company, not your ISP. In addition, you still get the extra security when connecting over a potentially hostile network.

The Bad:  Since you are the only one using the assigned IP address from the web hosting company, there is very little “wiggle room” in-case someone wanted to track you down for some reason (e.g., for posting “offensive” comments or something).

In addition, since you do not operate the network your server is on, you can never be sure if your web hosting company is spying on you (always assume that they are). They can even spy on your virtual server too.


VPN via a VPN Service

This is when you go to an actual VPN service and pay to make use of their vast array of servers that they have specifically setup for people to use for privacy.

I am not going to recommend any particular VPN service. You must make that decision for yourself.

The Good:  Going this route is usually quick and easy to get setup. Most VPN companies focus on your privacy (that is what they are supposed to be in business for anyway). This is the best way for someone to get started with using VPNs when they have never used one before.

In addition, since many other people are using the same VPN server you are on (hence, the same IP address), you “blend into the crowd”.

The Bad:  VPN servers can get overloaded, since VPN companies usually have thousands of customers using their services at any given time.  In addition, not all “no logging” VPNs are really doing what they say. I am not going to point any fingers, but just be careful when choosing a VPN service.


The following chart is my opinions for each type of VPN hosting.

Security Level – Determined by how much control you have over the VPN server and its network.

Privacy Level – Determined by how much the VPN hosting will protect your privacy.

Self-Hosted at Home/Office VPN on a Virtual Private Server VPN Service
Security Level High Low None
Privacy Level None Medium High

Things to Keep in Mind

  • VPNs cannot keep you completely anonymous. All you are doing by using a VPN is making the VPN your “new” ISP. They can potentially mess with your data that you are sending through their servers. In addition, someone could be tapping the Internet link that your VPN provider is using. This may compromise your privacy.
  • Doing something malicious. No VPN will completely protect you if your are doing something to attract the attention of a large, well-connected organization (e.g., a government agency).
  • Using a VPN because of “no logs” is not a good idea. I am sure there are some that really do not log, but even if they didn’t at some point, how do you know that they will not start logging without your knowledge?
  • A VPN will not protect you from viruses. A virus (e.g., from a file download) can still infect your computer even if your are using a VPN.
  • A VPN will not completely protect you from hackers either.

( Click here to read my “Popular Misconceptions About VPNs” article. )


Posted in Computers, Internet and Servers, Security, Software, VPN

When Should You Update Software?

Software updates are one of the things that can cause pain for server and network administrators.  They do not have the luxury to just click an “upgrade to next version” button like you would see on a WordPress website.  There is usually more involved when updating software.

When you have a new software (or operating system) you can upgrade to, there are a few things to check out first.

(Not an exhaustive list)

  1. Does it have any features that are beneficial to my daily work?
  2. Does it have any features that have been removed?
  3. Will the currently running software work with the new OS, or have people complained about the software not working correctly?
  4. Will your hardware work with the new software?
  5. How much downtime will an upgrade incur?
  6. If a lot of downtime will occur, is there a way to minimize the downtime?

Whenever you want to use a newer OS, you should always perform a fresh install on the computer. Never just do an in-place upgrade.  This is a very good way to mess things up on the computer.  Even if the in-place upgrade (not a fresh install) seems to work fine, there may be small issues that will pop-up later that you are not aware of.  Then you will wish you had done a fresh install in the first place. 🙂

Also, whenever you want to update a piece of software, always make sure you are using a “stable” release of the software.  Never run Beta, RC, Alpha, or any “not finished” software in production.  This can cause you grief that you could have avoided.


Posted in Computers, Internet and Servers, Operating Systems, Programming, Software

Always Check Your System for Memory Problems

Have you ever tested your computer’s memory (RAM) before for errors? If not, it would be a good idea to. Why? I’ll explain.

System memory stores temporary information for programs to quickly access. System memory is 100+ times faster than conventional hard drives, and thus minimizes delays in programs that you are running.

Programs depend upon the memory to be reliable, otherwise program malfunctions may occur (sometimes serious malfunctions).

For instance, say one of your memory sticks is bad, and this memory stick happens to be storing information containing an online order you are submitting to an online retailer. Now since this memory stick is bad, the debit card # you entered (e.g., 1111 2222 3333 4444) ends up being (e.g., 1111 2222 3333 4445)!

You see what happened? The last digit [ 4 ] became a [ 5 ]!  This would obviously cause a problem with your order. This is just one example of many potential problems you may have when dealing with bad system memory.

Other symptoms of bad memory are:  Blue Screen of Death (or Kernel Panic on Linux), outright programs crashes, and corrupt files.

So what can you use to test your system memory? Well a couple of programs I have used are MemTest86+  or  PassMark’s MemTest V7.1. These programs do not run in Windows. These programs require to be run by CD, USB drive, or any other bootable device.  You can Google these programs to find the downloads.

In my opinion, you need to run these tests for at least 3 complete passes* (with no errors) before considering your system memory to be reliable.

* A “pass”  =  a complete system memory test; so 3 “passes” means 3 complete tests


Posted in Computers, Internet and Servers, Operating Systems, Software

Gone Full-SSL Encryption on My Blog

I have finally gone full-SSL encryption on my blog. You should notice the lock symbol to the left (maybe right…depends upon the web browser you are using) of the URL in your browser.

What this means is that all your communication to my server is encrypted and the chance of someone decrypting your communication to my server is small.

More and more the World Wide Web is going SSL-only (encryption) for communications, regardless of the actual confidentiality of the information being transmitted.

Since there are people and organizations out there trying their hardest to invade people’s privacy, SSL encryption all the more has become necessary.


Posted in Computers, General, Internet and Servers, Operating Systems, Software