Product Details VPN


7.5€ for 31 days - 0.24 € per Day

A virtual private network forms an encrypted connection to one of our VPN Servers.
All your internet traffic will be redirected through this tunnel. Military grade ciphers secure your traffic. This also allows you to determine which country you are in.

Service Duration
Payment Gateway

Enter your Username

Version 1.7.1 VPN Documentation

A virtual private network forms an encrypted connection to one of our VPN Servers.
All your internet traffic will be redirected through this tunnel. Military grade ciphers secure your traffic. This also allows you to determine which country you are in.

Operating System: Windows


  1. What is a VPN?
  2. How does that secure me?
  3. How does the encryption work?
  4. What is included in`s VPN
    1. OpenVPN
    2. Proxy
    3. Socks
    4. Email
  5. How can I install the services?
  6. How can I trouble-shoot?
  7. How can I see the service status?

1.) How do VPNs work?

Common Home Network

To be able to understand what a VPN is and what its used for we have to understand the basics of networking first. In this image you can see the example of a LAN ( local area network = your network at home ) Whenever you use the internet on your mobile phone, your computer or your laptop, you send out data through your ISP ( your internet service provider )- Your traffic usually exits your home network through your modem ( or modem/router combination ). By default this traffic is not encrypted and can be seen by anybody

Example of unencrypted connection

To give you an example anybody can understand. Lets take a look at the scenario of watching your favourite tv show on netflix. In this scenario you are watchiing the last episode of game of thrones from your laptop. The laptop has the local ip The packets then travel to the router, that hosts the network. The router then forwards the traffic to the internet.
To make it easier to understand we drew a cloud for the internet. Due to the way the internet is build - it is not a central net. Your packages can use a lot of different routes to reach their destination. you can test this by opening up a terminal or a cmd.exe and tracing the connection by issuing the command:
  • traceroute ( on linux/mac )
  • tracert ( on windows )

The Route

In this example you can see the route from a german isp to google. You can see a total of 9 hops. So in order for the packet to reach google, it has to travel through at least 9 devices. The first two hops are local network addresses. The IPs starting with 217. are owned by the ISP. All the remaining steps are owned by google.

The Problem

The most commonly used protocols are TCP und UDP. In this image you can see the fields of a TCP packet. Neither UDP nor TCP have a built in encryption
This means that everbody who owns a hop from the last example, can view inside your data-packets, and read your data.

2.) How does that secure me?

The Solution offers a variety of tools to improve your anonymity online. OpenVPN being the core of the portfolio. With OpenVPN you install a software on your device ( OpenVPN Client ). This client will then create a connection to one of`s VPN Servers. The traffic between your device and our OpenVPN Server is being encrypted.
When you browse online you have your own WAN IP, this allows authorities, companies and others to uniquely identify you. Governments, ISPs and the Military can use this ip to identify you as a person. When using the ip you are using to browse online is owned by so nobody can figure out who you actually are.
And thanks to the strong encryption nobody along the route can read your traffic. Even your ISP can only see an encrypted datachannel, not knowing what it is that is being transmitted online.

3.) How does the encryption work?

Key Cryptography

This video explains it better then any text could. In this video you can learn how Key Cryptography works. The same pricinple is used by OpenVPN to encrypt the data.

4.) What is included in`s VPN?

4.1 OpenVPN

You can read all about what a vpn is here

4.2 Proxy

Proxies are ideal to access legal content. Many programs support proxies. In contrast to a VPN a proxy does not have a strong encryption. Just the encryption that is provided by the protocol. Such as https. A VPN usually forwards all your traffic through the tunnel - a proxy can often be used to only proxy a single application. You can either set your system to use a proxy for all connections, or use tools such as Foxy Proxy to only proxy certain applications.

4.3 Socks

Socks are used to initiate file transfer between 2 servers. One often used application is to use socks during fxp. You can use tools such as proxifier to use socks for your computer

4.4 Emails

Unlimited Mailboxes included.

Often individuals use 1 email for everything, or even worse, they use the same password with associated services. Link all activity to one individual If that email/password is compromised all services are potentially affected. This is why we setup a Mail server running imap(s)/pop(s)/smtp(s) and a client that can be used on the go. We also got the domain Each user can create as many email boxes as (s)he wants to. Any can be used, unless another user already got it.

5.) How can I install the services?