New VPN Server in Coventry, England

VPN Server Coventry England

Our latest VPN server is in Coventry. This is an additional VPN gateway in England! We now have several servers in the UK giving you plenty of connection options in that area.

Ghost Path VPN Servers

Ghost Path operates over 147 VPN gateways in 46+ different countries providing over 229 IP addresses. We are always expanding and improving our VPN infrastructure so that our Ghost Path customers have the best and most reliable VPN connections possible.

How to Use the Coventry, England VPN Server

Open up the Ghost Path VPN client. If you’re in England then the new Coventry VPN gateway will automatically show up in your Closest Locations connection folder. If you are outside of England and want to connect to this server then you should create a custom location folder and drag the Coventry server into that folder.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer the best privacy and security around and never log your data. We offer a 7-day free trial on select VPN accounts, so give us a try today!

How To Tell If Your ISP Is Throttling Facebook Video

ISP Throttling Facebook

By now everyone is familiar with Facebook video, the videos that play automatically as you scroll over them in your Facebook feed. Facebook video is rapidly growing in popularity right now. It’s even starting to rattle the popularity of Youtube in terms of number of videos uploaded daily.

The meteoric rise in popularity over the past year has gotten everyone’s attention, including your ISP. Recently I’ve discovered that Facebook videos stutter, buffer, and load much more slowly than they have in the past, particularly in the evenings. Generally, slowly loading video is caused by one of two things: either the video itself is not being delivered quickly enough from the provider (Facebook in this case) or your internet connection isn’t fast enough to handle the video without issues. I certainly believe that Facebook and a likely myriad of CDN’s can handle the delivery side, so that leaves the ISP as the most likely culprit. I haven’t seen any slowdowns with any other general downloading or browsing, so maybe the problem is related strictly to video. Could my ISP, Uverse, be throttling Facebook video?

This article is going to teach you exactly how to run your own tests to see if your ISP is throttling Facebook video. The easiest device to test with is actually your phone. I have an iPhone and it’s super-easy to change your network settings, which is handy here because you want to be able to change your settings quickly.

You’ll probably want to wait until evening to run your test. I usually notice the slowdowns after 7 PM.

Step 1: Find some video in the Facebook App

Open the Facebook app and scroll through your newsfeed looking for videos. Videos in ads should be ignored… ads always have a knack for not being throttled.

Facebook Video on iPhone

If the video plays smoothly then you may be OK. If you see any signs of buffering or stalling then you should keep testing.

Step 2: Turn Off Your Wi-Fi

Next, turn off your Wi-Fi connection so that you’re using your mobile data provider’s connection. I use Verizon and haven’t ever noticed slow video when I’ve had at least a decent signal, so I trust them for this test. Plus, it’s in Verizon’s best interest for you to use as much data as possible so they can charge you more $$$.

Turn off WiFi on iphone

Once Wi-Fi is disabled scroll through your timeline again looking for videos. All Facebook videos are coming from the same place, so theoretically if one is being throttled then all of them are being throttled. You shouldn’t watch the same video as before because it may be pre-buffered or loaded from your previous viewing.

This is where you would most likely be able to see if your ISP was throttling your connection. If you had poor video playback in step 1 and don’t in step 2 then you’ve found your bottleneck.

Step 3: Testing With A VPN

If you don’t want to use your mobile data to test in Step 2 then you can use a VPN to accomplish the same thing. When you’re connected to a VPN your ISP can’t see what kind of data you’re receiving or where it’s coming from, making it impossible for them to throttle.

Turn on VPN iPhone

The idea here is the same as in Step 2. Once you’re connected to VPN you should look for more videos in the Facebook app and see how they perform.

Testing On Other Devices

You can use the same general procedure to test Facebook video on your desktop, laptop, tablet, etc. You won’t be able to test with your mobile data provider using other devices so you’ll need to rely on a VPN.

Conclusion

As Facebook video grows it wouldn’t be surprising to see more ISP’s try throttling it. Netflix, Hulu, Youtube, HBO Go / HBO Now, and other video sites are easy targets for throttling because they cost ISP’s quite a bit more than general web traffic. You can test to see if your ISP is throttling other services in the same way you test Facebook video.

If you have any questions or comments then leave them below. Let us know if you find any evidence of throttling from your ISP.

New Version of the Ghost Path VPN Client Available

New Version of Ghost Path VPN Client Released

A brand new update to the Ghost Path VPN client is now available! We recommend all Ghosts download and install the new version as soon as possible.

Lots of changes and improvements this time. Here are some of them:

  • Leak protection featured now on by default for new installs.
  • Enhanced leak protection for IPv6.
  • Added ability to add gateway servers, cities, and countries to groups via right click.
  • Allow application to start minimized.
  • Several bug fixes
  • Mac OS X client: added ability to close client with CMD+Q
  • Several other minor changes and fixes.

As always, contact support if you run into any problems at all.

How to Hide an IP Address

How to hide your IP address

Many of us who use the Internet every day have never heard of an IP address., but this simple collection of numbers is a major part of security on the web, and determines how we use parts of a network to access the global Internet.

An IP address is a binary number, made into a set of numbers, that shows where a specific message is coming from on the web. Each device or part of a network has its own IP address according to the Internet Protocol that’s been set up to make Internet use universal. But there are some ways to complicate matters by hiding an IP address and shielding Internet messages from revealing the location and identity of the sender.

IP Addresses and Hacking

In some cases, obscuring the IP address of an Internet signal request has to do with some types of hacking.

One common example is called “IP address spoofing.” This involves forging parts of a data packet to hide the identity of the person who’s sending the message and the network components that he or she is using.

In IP address spoofing, the header of an Internet data packet is changed. Hackers may forge a different address, to make it look like a packet was sent by a different device or network.

IP spoofing is sometimes used in type of cyberattacks called ‘denial of service’ attacks. These attacks can flood victim networks with a lot of traffic and overload a system, and they’re something that today’s businesses and government offices are taking seriously. DoS attacks, as they’re called, can disrupt business and sink revenue, even if the site is only down for a short time.

However, not all IP spoofing is hacking, and this method does have some legitimate uses, for instance, in testing networks or parts of network systems.

Why Would You Hide an IP Address?

Tools for hiding IP addresses aren’t just for hackers.

There are some legitimate reasons why someone might want to shield an IP address.

In some cases, users may simply want to hide their geographical locations. We’ve all heard about Facebook scares, where some users worry that predators or others will get their geographical location from the signals they send over the Internet, to find them and harm them. Although that’s unlikely, hiding an IP address can make a user feel safer.

Also, many networks and services will lock out users from certain geographical locations, a process called geoblocking or geolocation. In any case, it’s not illegal to get around geoblocking, to hide a user’s real location and where he or she is sending from.

In other cases, you may be doing mystery shopping, researching a competitor’s products and services, or doing other kinds of research where revealing the IP address could be damaging to your results.

But one of the most common reasons for hiding IP addresses comes down to something simple — digital marketing. Company web sites and web pages often track all Internet requests, using cookies and other tools. Some of these are pretty sophisticated, and many of us don’t even know they are in place. In some cases, governments have taken a hard look at how data is collected about users online, in order to try to protect consumers, but there’s still an awful lot of tracking out there.

Lots of savvy Internet users want a little protection against this kind of intrusive marketing. They don’t want every web step they take to be endlessly analyzed and responded to, with hyper-aggressive emailing or marketing campaigns. They just want to remain a little bit anonymous over the web. And that’s another reason why users might take steps to hide their IP address from anyone who gets their hands on the data packets, or receives a network request.

How to Hide an IP Address

Generally, those who want to hide an IP address will use some type of VPN, proxy, or smart DNS service.

A proxy is simply a device or component that puts itself in the place of the original device or component to substitute an IP address.

One way to think about this is that in local networks, networks that are not necessarily analyzed by Internet protocol, it’s possible to ‘bounce’ signals around within those networks in ways that don’t get advertised over Internet channels. So, with a proxy, network users put these intermediary servers and other machines in place so that, when they send a message from a private machine, it looks like it’s coming from the public proxy instead.

There are many different types of proxy tools available, as well. For instance, there are web-based proxies that provide these services wirelessly. Then there are hard-wired proxy servers that, as mentioned above, act as go-betweens for a user and a recipient.

Another type of proxy is an anonymity network, where a third party may set up network structures to help others mask an IP address.

All of these are effective for hiding IP addresses and making sure that individual web user behavior isn’t broadcasted to the world. But especially for companies and enterprises, there’s another more common way to put IP address shielding in place.

The Virtual Public Network

A Virtual Public Network or VPN is a valuable security tool. Ghost Path offers state of the art VPN services to help individuals make their web use safer and more effective.

These kinds of setups essentially provide “secure tunnels” for Internet messaging. They connect the public global Internet to private networks and encrypt data securely at the point of exit, so that it travels the Internet in an entirely secure way.

In many VPNs, engineers often put a firewall between the client and host servers, so that remote users have to authenticate themselves and establish their identities. That prevents different types of unauthorized access. Encryption often utilizes certain keys that are held by stakeholders, so that hackers or any other outside parties do not have access to usable data. Instead, they get an encrypted result that is useless in terms of poking and prying for information.

VPN’s also help to deal with dangers related to wi-fi hotspots and all other kinds of situations where sensitive data can get jeopardized as individuals browse the web and transmit data using mobile apps. A real danger is logging into mobile banking over a public wi-fi connection. Hackers can ‘snoop’ data being transmitted on an open wi-fi network and potentially gain access to any data transmitted, including usernames and passwords. Ghost Path can help set up effective VPN structures where every remote user at every level of a business is taken care of, so that no matter if people are using the network in a company office, or out in the field, everything stays safe.

VPN’s and IP Addresses

Not only does connecting to a VPN hide your true IP address, you have the option of choosing the IP address that you want to use. Each of our Ghost Path VPN servers has one or more IP addresses associated with it at any given time. When you connect to that server you are assuming that IP address. For example, if you want to appear to be coming from Las Vegas then choosing the Las Vegas VPN server will accomplish that.

In short, VPN does much more than hiding IP address. It cloaks the remote user from having their identity broadcasted, but it also protects all sorts of sensitive data that you might transmit online, including:

  • usernames and passwords
  • your browsing activity
  • any other data that you transmit

IP Exhaustion & the IPv6 Transition

It’s important to note that the particular technologies in place now to handle IP address documentation may not be around forever. One reason is because the actual agencies in charge of the Internet are starting to change how IP addresses are written, and how they’re used.

In the U.S., agencies like ICANN register Internet domains and addresses. At this time, regulatory agencies around the world are moving from an IPv4 to an IPv6 format. The IPv4 format, which included 32-bit numbers, has become impacted by what professionals call ‘exhaustion,’ and IPv6 is a way to extend the these addresses to fit a much larger global user base than existed when the Internet was originally built.

Looking Toward the Future of Privacy

To continue to keep on top of new technologies, check out what Ghost Path is doing around the world. Our servers are popping up in many different countries worldwide, as we anticipate the biggest security and privacy changes that our customers will see in the coming years.

New VPN Server in Auckland

Auckland VPN server

Our latest VPN server is in Auckland. This is our first ever VPN gateway in New Zealand! We now have several servers in southeast Asia and Australia / New Zealand, giving you plenty of connection options in that area.

Ghost Path VPN Servers

Ghost Path operates over 131 VPN gateways in 41+ different countries providing over 200 IP addresses. We are always expanding and improving our VPN infrastructure so that our Ghost Path customers have the best and most reliable VPN connections possible.

How to Use the Auckland, New Zealand VPN Server

Open up the Ghost Path VPN client. If you’re in New Zealand then the new Auckland VPN gateway will automatically show up in your Closest Locations connection folder. If you are outside of New Zealand and want to connect to this server then you should create a custom location folder and drag the Auckland server into that folder.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer the best privacy and security around and never log your data. We offer a 7-day free trial on select VPN accounts, so give us a try today!

New VPN Server in Morganton, NC

Morganton, NC VPN Server

Our latest VPN server is in Morganton, NC. With the addition of Morganton we now have several VPN gateways in the Southeast and Mid-Atlantic states, giving US users a variety of connection options.

Ghost Path VPN Servers

Ghost Path is now operating over 132 VPN gateways in 41+ different countries providing over 200 IP addresses. We will always be expanding our VPN infrastructure to insure that Ghost Path customers have the best and most reliable VPN service anywhere.

How to Connect to the Morganton VPN Server

Open up the Ghost Path VPN client. If you’re in the Southeast US then the new Morganton VPN gateway will automatically show up in your Closest Locations connection folder. If you are outside of the Southeast or Mid-Atlantic and want to connect to Morganton then you should create a custom location folder and drag the Morganton, NC server into that folder.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer a 7-day free trial on select VPN accounts, so give us a try today!

New VPN Server in Macau

Macau VPN Server

Our latest VPN server is in Macau. We now have serves in Macau, Hong Kong, and Taiwan. That means we have Asia covered.

Ghost Path VPN Servers

Ghost Path is now operating over 131 VPN gateways in 41+ different countries providing over 200 IP addresses. We are always expanding and improving our VPN infrastructure so that our Ghost Path customers have the best and most reliable VPN connections possible.

How to Use the Macau VPN Server

Open up the Ghost Path VPN client. If you’re in Macau then the new Macau VPN gateway will automatically show up in your Closest Locations connection folder. If you are outside of Macau and want to connect to this server then you should create a custom location folder and drag the Macau server into that folder.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer a 7-day free trial on select VPN accounts, so give us a try today!

Everything You Wanted to Know About IPv4 VS IPv6

IPv4 vs IPv6 The Complete Guide

The internet is a complex beast. While it appears to run seamlessly and autonomously, there are protocols, associations and governing factors that need to work in harmony so you can see the latest Facebook update from the girl you hated in High School. One such protocol is IPv4 or Internet Protocol Version 4.

IPv4 is the fourth version of the internet protocol and has been sending your data from point A to B since the early 80s. In a nutshell, IPv4 tells your data packets where to go and how to get there in the most efficient way possible. Some people have used the example of the post office and how it routes letters from  sender  to destination on the most efficient path.

What is IPv4?

Part of the problem with IPv4, like most things from the Reagan administration, is it’s not quite working like it used to. While the internet isn’t going to fall apart tomorrow, it is, however, in need of updating. That’s where IPv6 comes into the picture.

The IPv4 backbone was allotted a few billion IP addresses when it was created. At the time, the personal computer was still a pipe dream for most people and having a few billion addresses seemed sufficient. Well, after several decades of technological advancements, we have more computers than there are IP addresses.

For quite a while, there have been workarounds to help stretch IPv4 to the max. NAT (Network Address Translators) have been essential for this. More on them in a bit. Nevertheless, the time is fast approaching where we will not be able to wring  anymore  juice from this orange and need better options. IPv6 is set to eliminate many of those problems plaguing us.

What Is IPv6 And Why is It Better Than IPv4?

IPv6 will firstly offer many more addresses. How many you ask? Well, here is the number of available addresses (via  IT Knowledge Exchange ) 340,282,366,920,938,463,463,374,607,431,768,211,456.

The way the additional addresses are achieved is using a different format. I am sure you’ve seen an IPv4 IP address something like 192.90.32.197. As you can see, the address is broken into 4 sections or bytes. The sections are broken down this way:

  • Sections 1 and 2 are the network.
  • Sections 3 and 4 are the host.

The IPv6 addresses look like this 2001:cdba:0000:0000:0000:0000:3257:9652 and have 8 sections. The sections of the IPv6 address are broken down like this:

  • Sections 1-3 are the site prefix.
  • Section 4 is the subnet ID.
  • Section 5-8 are the Token or interface ID.

What’s the Reason for All the Additional Addresses?

Good question, I’m glad you asked.

Well, during the era of neon colors, spandex pants and cocaine rehab we call the 80’s, hardly anyone had a computer at home. The lack of computers meant there was fewer people were connected to the internet.

Once the internet became more populated and a bit more mainstream along with the price of computers was affordable to families, everyone started jumping on the digital bandwagon. Schools, businesses, and many homes started having a computer and  dialling  up the internet on their 56k modem.

Now, the majority of the people have a computer at home and work, a smartphone, a tablet, a smart TV hanging on their wall and many new vehicles have Wi-Fi or need to be connected to something somewhere.

All of these devices need some way to route information to and from the internet. This is where the additional addresses will come onto the scene.

Currently, the addresses are like apartment buildings. You have a single IP address with multiple sub-addresses for the individual devices on your network. Right now in my house, for example, there are 3 computers, 3 tablets, a Roku and 2 smartphones all connected to a single router using a modem as the conduit to the internet.

All of these are using the same main IP address thanks to NAT (Network Address Translators). NAT allows for just this scenario. Instead of each device needing its own unique IP address, any connected device shares the same main IP address.

With the complete adoption of IPv6, Each of these devices will have their own address making the transfer of data smoother and more exact. Also, the ability to multicast information from one device to many is greatly improved.

How Accessible is IPv6 Right Now?

Most current operating systems, including mobile OS have been set up and/or ready to transition to IPv6 for a while now. If there was a proverbial switch flipped and every internet connected device and entity could only use IPv6, from a device standpoint we’d be okay.

A major hurdle will be the everyman’s home networks. I talked earlier about having several connected devices running  through  my home router. Well, many consumer-level routers providing Network Address Translation (NAT) to funnel many devices to a single broadband or DSL connection are not compatible with IPv6.

This will pose a bit of a problem for the all out implementation of IPv6. Remember a few years back when analog TV went away? Even though it was a couple year process, there were still people out there refusing to upgrade their television or get a converter box. They were dead-set on trying to get the analog channels and watch TV the same way they always have.

The change to IPv6 will be similar in that regard. People resist change being forced upon them, especially the less tech savvy.

Are There Any Websites Using IPv6 Now?

Many of the major sites are either set up and available for anyone running IPV6 or have at least tested it. Sites like Facebook, Google, YouTube, Yahoo and others are all set and ready to go. A while back, Netflix was beta testing their streaming service over IPv6 pathways.

While having sites onboard is really important, so is having an ISP able to connect you to the network. Comcast, love ‘em or hate ‘em, has done testing with IPv6.

What Does IPv6 Do for Security?

Security with IPv6 is a different monster than we are used to. While the basic premise is the same, the additional features add both good and bad things when it comes to security. Let’s look at some examples of the security pros and cons of IPv6.

IPv6 Security Pros:

  • Network layer encryption and authentication for IP-based networks.
    • The encryption and authentication for all of your data is done at the IP level.
  • Huge, scarcely populated address spaces enable it to be highly resistant to malicious scans and not easily used by automated, scanning and self-propagating worms and hybrid threats.
    • This means it is much more difficult to “guess” an address or have a worm get into the device and do what it’s intended to do with no outside help.
    • It’s the difference between having your email password being your pet’s name and your anniversary (spot61087) to something that is a level of actual security ( 5Yg@l^pWgl682![=TnA8* ).
    • Auto-configuration of addresses makes probing for a weakness more difficult.

IPv6 Cons:

  • Most attacks are from the application level and data is not usually intercepted en-route.
  • Still open to many of the same attacks as IPv4.
    • Sniffing attacks – Data captured en-route to hopefully find useful information in a non-encrypted form.
    • Application layer attacks – These can range from viruses and worms to web application attacks, as well as others.
  • Still too new for most administrators so it’s easier for hackers to exploit the lack of knowledge to gain access  in  many of the same ways they can currently access networks on IPv6.
    • Networks will be easily hackable if the network is poorly designed.
  • The viruses will need to be much more complicated to do damage, also making them more difficult to battle.

Always Connected

An area where the additional features of IPv6 will benefit us is the ability to expand. Right now we are on the verge of having everything that runs on electricity connected to the internet for some reason or another.

Everything from your refrigerator to your car or your lamps at your house to your coffee pot at work. Everything is on the way to being a button press away. While this is mostly a strive toward convenience, having a totally connected lifestyle will open us up for total vulnerability too.

The P in IPv6 Doesn’t Stand for Privacy

The more connected you are, the easier you are to spy on in any number of ways. The watchful eye of big brother or other data mining individuals will have greater potential access to you. The complete roll-out of IPv6 is not going to eliminate the need for privacy saving techniques. Being able to encrypt your information will be more important than ever the more you ways you are connected.

An increasingly popular way is using a VPN service. A VPN ensures your data is secure  leaving and being received by your device by herding it all through VPN servers before it hits the public internet. Using a VPN will help you get around geo-restrictions as well as keep your data safer.

As more devices are connected to the internet and to each other, having a truly secure and encrypted connection will be the last bastion of privacy.

Right now there are “hacks” to upgrade security of home routers. DD-WRT firmware works with many manufacturers of routers to essentially unlock the router and remove restrictions. These firmware hacks will make sure all of your devices are running through the VPN not matter if there is special software on the device using the Wi-Fi or not.

Mobility & IPv6

IPv6 is mainly coming about to accommodate the number of devices being connected to the web, especially the mobile devices. Right now mobile devices present difficulties when for the IPv4 setups we’re currently using.

As we migrate into using IPv6, mobile connections to the web will become easier to accomplish and potentially faster due to the lack of the data configurations needing to be stored on the server like they are now using IPv4. Each of the devices will have their own address and the hop from tower to tower or server to server will be faster and smoother.

Whenever a new version of anything rolls out, there are always hiccups. I’m sure IPv6 will be no different. The unsung heros who maintain and improve the internet are working hard to make sure as many of the problems can be solved as possible. While IPv4 was good in it’s hayday, we have different needs now and need the ability to expand as needed. Right now we can’t do that because of the antiquated IPv4 system.

What are your concerns when it comes to upgrading the routing system for the internet?

Do you see a shift in cyber attacks, viruses?

Do you see governments implementing so-called security policies “for our own good”?

Leave your thoughts on IPv4 vs IPv6 in the comments below.

New VPN Server in Taichung, Taiwan

Taiwan VPN Server in Taichung

Our latest VPN server is in Taichung, Taiwan. This newest VPN gateway is our 2nd in Taiwan and should be ultra-fast and reliable for users in and around Taiwan and the rest of Asia.

Ghost Path VPN Servers

Ghost Path is now operating over 130 servers in 40+ different countries providing over 200 IP addresses. We are always expanding and improving our VPN infrastructure so that our customers havethe best and most reliable VPN connections anywhere around the world.

How to Use the Taiwan VPN Server

First, make you sure you have an active Ghost Path account. Then fire up our Ghost Path VPN client. If you’re in Taiwan then the Taichung VPN gateway will automatically show up in your Closest Locations connection folder. If you are outside of Taiwan and want to connect to Taichung then you should create a custom location folder and drag the Taichung server into that folder.

About Ghost Path VPN

Ghost Path is a leading VPN provider in the United States. We offer a 7-day free trial on select VPN accounts, so give us a try today!

Now Accepting Paypal Payments

We’re excited to announce that we are now accepting Paypal payments for our VPN service. Paypal is a simple, safe & secure way to pay.

Pay for VPN with Paypal

Payments Accepted

Ghost Path accepts the following methods of payment now:

  • Credit Cards (Visa, Mastercard, American Express, and Discover)
  • Paypal
  • Bitcoin
  • Cash or Money Order

How to Pay With Paypal

If you are new to Ghost Path then simply visit our pricing page to choose your VPN plan. When you click the Buy Now button you will see the option to pay with Paypal.

We don’t have a way for current customers to migrated payments from credit cards or Bitcoin to Paypal. We’re working on that for a future release. If you need to do this immediately then just email us and we’ll take care of it.

More Payment Options in the Future

We’re committed to making Ghost Path as accessible as possible, and that means accepting as many types of payments as possible. We’re working to bring more payment options online in the near future. If you have any suggestions then feel free to contact us.