Please help me to clear my ambiguity regarding VPNs
VPN will not make me fully anonymous on line, it does to some extent , reasons could be many, just for example log files by VPN service providers, or legal obligations etc. It's okay.
My question is how does VPN make my communication private/secure to "non-https" website?
If the VPN connect is to https website we can understand that SSL/TLS encrypted communication takes place between the VPN server and https website .
If the connection is to any Organization's private network , i assume the communication between the VPN server and the Organization's private network will be handles by some VPN server setup or by some VPN communication protocols(PPTP,L2TP/ IPSec etc) by the VPN provider on the premises of the org LAN.. ... (am not sure..is it the way?)
So, without a VPN, my connection is fully open, anyone with the right tools can look at my data. Using a VPN solves the problems by encrypting my transmission and making it appear as if it’s the VPN server itself that’s making the connection and not me. But how does it handle the other half of the transmission from VPN server to destination website?
Does it partially open? End to End encryption possible ?
Have you considered building an IPSec tunnel directly from A to C and managing the Security of RDP with the organization hosting the computer you want to access remotely?
@JoshuaGabrielGood points, from experience, by default RDP uses TLS V1.0 or V1.1, you have to do some re-configuration to ensure it conforms to TLS V1.2.