• 734-454-9117
  • Send us eMail
One Avenue LLC

24/7 Support

Available since 1996

Easy payments

PayPal, VISA/MC, Crypto

99.9% Uptime

Online since 1996

Internet Service Provider since 1996
  • 0 Shopping Cart
  • Home
  • Store
    • Browse All
    • Standard Website Hosting
    • Performance Wordpress Hosting
    • Pro SSL Certificates
    • SiteLock Security
    • Sitelock VPN Service
    • Nord VPN Service
    • Website development
    • Website XOVI now SEO
    • Website SEO Monitoring
    • Website Security Services
    • Website Monitoring w/response
    • Offsite Backup w/WP monitoring
    • eMail Archiving Service
    • Optional Easy Site Builder
    • DNS Name Servers
    • eMail Server Services
    • eMail Relay (MX) Servers
    • Enhanced Web Service
    • Enhanced VPN Service
    • Enhanced VPN/Co-location
    • Dedicated Server Colocation
    • Full Tech Support Guy Services
    • Register a New Domain
    • Transfer Domains to Us
  • Knowledgebase
  • WordPress
  • Contact Us
  • More
  • Account
    • Login
    • Register
    • Forgot Password?
  1. Portal Home
  2. Knowledgebase
  3. VPN
  4. Logging

  Categories

Legal Documents
13
Test Tools
4
VPN
6
Website builders
2

  Categories

  Tag Cloud

aup cookies domain name domains ethics history IDN opensrs privacy policy punycode security sitepad telemarketing calls terms terms of service traffic VPN website builder wild west wordpress

  Support

My Support Tickets
Announcements
Knowledgebase
Downloads
Network Status
Open Ticket

Logging Print

  • 0

About Logging and data collection

VPN companies like to say they don't log anything. My favorite is the one that displays their configuration file logging section as set to none.

Logging is something programs do for various reasons including logins, warnings, errors, and debugging. In general, these are single lines of text that include various pieces of information depending on the event that generated the log entry. Log files can grow to huge sizes and usually require the need to be rotated as they grow larger than they can be reasonably managed. This presents a problem in that the program often needs to be restarted or reloaded in order to empty the log file and start fresh. Most programs do this once a day. In the case of a running VPN for literally thousands of connections and users, this could result in dropped connections and angry customers and so it becomes important to shut logging off and skip the log rotation altogether.

The problem then becomes how to monitor the server for attacks and other abuse that could cause degraded services for the customers. There are several ways to monitor this mostly including login log's but without those logs, the administrator is left looking at the network traffic using traffic monitoring programs. These programs TAP the only network interface and listen for "failure" messages followed by a response to block the offender(s).

At this point logging of traffic has almost not been mentioned. That is because a log entry only supplies a tiny bit of information. basically, time, IP, and maybe destination and not things like the username and password you used to login to a website with. They might have a record of what URLs you visited but not the details you want to protect. The good news is there are a couple of ways around this and since we now have a TAP on the network connection we can record everything passing through.

Data logging.

There are a variety of ways to do this and most of them are as old as the Internet itself. Without going into all the different programs that network and system administrators, cybersecurity threat hunters, and the kid's in-school use, there is a complete distribution that showcases all the programs we use to investigate network traffic. This distribution is called the Security Onion and it has nothing to do with the Tor network. The Security Onion can be found <a href="https://securityonion.net/" target="_blank" rel="noopener noreferrer">here</a>. The programs contained in this system allow for the recording of all traffic passing by its sensor exactly as it happened such that a person can recreate and examine exactly what happened and so on. These types of programs don't make log's they make records in databases. Little fun with words huh?

Data collection.

Now that we have a way to monitor the network there are a couple of ways to add records to the database. Because this is every bit and byte that you sent, things like usernames and passwords can be scraped from the data as well as everything you did online.

"But I use SSL"

SSL certainly does make things more difficult but not impossible, Suffice it to say that if you installed a VPN package there is a chance that your private key was taken, an additional one installed, and every bit and byte of your data can be decrypted not just thereafter, but before. This can be a standard practice to improve network quality for a group of users or done maliciously.

What we do.

We monitor our networks and collect data as needed towards the goal of network and customer protection. We do not maintain any form of records long-term, nor do we sell any customer data. In general, our monitoring is 24x7 with a retention time of 24 hours and only if you have that class of service.


Was this answer helpful?

Related Articles

Business VPN State of the art VPN and service for business. Protecting your personal devices from threats is... VPN Installation (Business Version) Android DevicesWireGuard is used to provide VPN services on Android.1. Install the WireGuard VPN... Personal VPN State of the art VPN service for personal use. Protecting your personal devices from threats is... VPN History In the beginning Originally there was no need for security because only a bunch of computer... VPN Securty Threat In the early days of computers, one of the very first things we were all supposed to of learned...
« Back

  Tag Cloud

aup cookies domain name domains ethics history IDN opensrs privacy policy punycode security sitepad telemarketing calls terms terms of service traffic VPN website builder wild west wordpress

  Support

My Support Tickets
Announcements
Knowledgebase
Downloads
Network Status
Open Ticket

About Us

We provide you with ongoing assistance registering, transferring, Custom DNS, initial website setup, and development support. With over 25 years of experience managing the Internet of things, you can find answers here.

All our servers are firewall protected with additional intrusion detection and realtime blocking of bad traffic. With todays cyber security threats we keep our systems updated to current PCI security standards, but also use additional systems to maintain the security of your website and protect your privacy.

We've supported the multiple industries, the website hosting industry and linux operating system since the late 1990's. Managed services are available with every plan and it's high speed to the net from a fully certified datacenter.

Basic support is included with every plan - Contact us Today!

One Avenue llc. P.O. Box 531746 Livonia, Michigan 48153

Our Services

  • Shared website hosting
  • Dedicated website hosting
  • Fully Managed website hosting
  • Website Development
  • Dedicated webservers
  • Server coLoction w/private drops
  • Shared VPN service
  • Dedicated Gigabit VPN servers
  • VPN coLocation w/private drops

Legal and Policy

  • Cookie Policy
  • Privacy Policy
  • Terms & Conditions
  • Acceptable Usage Policy
  • DMCA Policy
  • ICANN Policy
  • HIPAA Compliance
  • Marketing Restrictions
  • Prohibited Activities
24/7 Technical Support
Use our Contact Form
734-454-9117

Copyright © 2025 One Avenue llc. All Rights Reserved.         Office hours are 9am to 9pm EST daily

We Accept:


Loading...
Loading...
Choose language
العربية
Azerbaijani
Català
中文
Hrvatski
Čeština
Dansk
Nederlands
English
Estonian
Persian
Français
Deutsch
עברית
Magyar
Italiano
Macedonian
Norwegian
Português
Português
Română
Русский
Español
Svenska
Türkçe
Українська

Generate Password

Please enter a number between 8 and 64 for the password length