Skip to main content
All CollectionsGeneral information | MysteriumVPN Help Center
The Comprehensive Glossary of Conventional VPN Terminology
The Comprehensive Glossary of Conventional VPN Terminology

Unlocking the World of VPNs: A Detailed Glossary for Better Understanding Mysterium VPN applications

Updated over a year ago

Welcome to our comprehensive glossary of conventional VPN terminology. In this article, we aim to demystify the complex world of virtual private networks (VPNs) by providing clear and concise definitions of key terms and concepts. Whether you're new to VPNs or looking to deepen your understanding, this glossary will serve as a valuable resource.


Certainly! Here's an extended glossary of terms related to conventional VPNs:

VPN (Virtual Private Network): A technology that allows users to create a secure and private connection over a public network. It encrypts internet traffic and routes it through a remote server, masking the user's IP address and providing anonymity and privacy.

Server: A computer or network device that hosts a VPN service. VPN servers handle the encryption and routing of internet traffic, allowing users to establish secure connections.

Client: The software application or program installed on a user's device that connects to a VPN server. The client encrypts internet traffic and sends it to the VPN server for routing.

Encryption: The process of converting data into a secure and unreadable format using cryptographic algorithms. VPNs use encryption to protect user data from unauthorised access.

Tunneling: The process by which a VPN encapsulates and encrypts internet traffic within a secure "tunnel" between the client and the server. This ensures that data transmitted over the internet remains private and secure.

WireGuard: A modern and efficient VPN protocol known for its simplicity and high-performance. Mysterium VPN uses WireGuard because it provides better speed and security compared to traditional protocols.

IP Address: A unique numerical identifier assigned to each device connected to a network. VPNs mask the user's IP address by assigning a different IP address associated with the VPN server, enhancing anonymity and privacy.

Protocols: The set of rules and procedures used by VPNs to establish and maintain secure connections. Common VPN protocols include OpenVPN, L2TP/IPsec, and IKEv2.

Bandwidth: The maximum data transfer rate of an internet connection. VPNs may affect bandwidth, as the encryption and routing processes introduce some overhead. Higher bandwidth ensures faster VPN performance.

Logging: The process of recording and storing user activity on a network or VPN server. VPNs can keep logs of user connections, including IP addresses and timestamps. It's important to choose VPN providers with strict no-logs policies to protect user privacy.
​
​No Logs Policy: Policy adopted by VPN providers ensures they do not collect or store any user activity logs or personally identifiable information (PII). Mysterium VPN has a strict no logs policy offering enhanced privacy and security, as there is no stored data that can be potentially accessed or shared with third parties. This policy assures users that their online activities remain private and anonymous.

Split-Tunneling: A feature offered by some VPNs that allows users to selectively route specific internet traffic through the VPN while keeping other traffic directly connected to the internet. This can optimize bandwidth and improve performance.
​
​VPN Kill Switch: A feature that automatically terminates internet connections if the VPN connection drops. It prevents any data from being transmitted outside the VPN tunnel, maintaining privacy.

DNS (Domain Name System) Leak: A security vulnerability where DNS requests made by the user's device bypass the VPN connection, potentially revealing browsing activity. Good VPNs prevent DNS leaks by handling DNS requests within the secure tunnel.

Kill Switch: A feature provided by VPN clients that automatically disconnects the internet connection if the VPN connection drops. This prevents traffic from being sent over an unsecured network, maintaining user privacy.

Cross-Platform Support: The ability of a VPN service to be used on different operating systems and devices such as Windows, macOS, Linux, iOS, Android, and routers. Wide platform support allows users to secure their connections across various devices.

NAT (Network Address Translation) Firewall: A security feature integrated into some VPNs that acts as a firewall, blocking incoming connections while allowing outgoing ones. This provides an additional layer of protection against unauthorised access.

Server Locations: The physical locations of VPN servers around the world. VPN providers with a wide range of server locations allow users to connect to different regions, enabling access to geo-restricted content.

Bandwidth Throttling: The intentional slowing down of internet connection speeds by internet service providers (ISPs). VPNs can help bypass bandwidth throttling by encrypting traffic and preventing ISPs from identifying and limiting specific types of data.

Compatibility: The ability of a VPN client to work seamlessly with other software, applications, or network configurations. VPNs

Did this answer your question?