CryptoLab VPN Installation Instructions and Documentation

C

Below you will find the CryptoLab VPN installation instructions and some additional documentation.

Once you’ve purchased your CryptoLab VPN Service you will be able to visit the downloads page to retrieve your VPN configuration files. Use these files to set up each individual VPN connection. You will be issued 5 VPN* connections for each VPN connection city. You can mix and match which files you install on which computers or mobile devices.

* If you selected to purchase the Optional VPN Service For “Option To Earn Money” Course, you will receive 1 connection file for each country the course.

VPN Installation/Configuration

CryptoLab VPN Connection Files & WireGuard

First, download and un-zip your VPN configuration files

Download VPN Configuration Files

Second, install WireGuard on the computer or mobile device you want to configure for a VPN connection.

Download WireGuard Software

Below you will find documentation on how to install your VPN on your computer or mobile device. Make sure to read through each device type you want to add. 

  • Each configuration file allows one connection and one static IP address.
  • Once you use the configuration file on one computer, you cannot use it on another.
  • The configuration files are custom to you and to the VPN it will be connecting to. These connection files do not require you to know a user name or password. The files, themselves, are the user name and password. Keep these files in a safe place after they’ve been issued to you. You can always find these files in your download area if you misplace them. 

CryptoLab VPN Connection Files

The emailed folder will contain 5 connection files for each VPN connection city. You can use all 5 connections yourself or split it with your friends and family. The .conf files & .png files contain your user names and passwords. You never need to use your email address or an account name to log into a VPN. Below is an example of the files you’ll be receiving.

Using the example folder above:

  • atlantanoads11.conf – A Text file used to create a connection on your desktop computer. This file contains all of the connection information needed to make a VPN connection to Atlanta, GA.
  • atlantanoads11.png – An Image file used to create a connection on a device with a camera (iPad, smart phone, etc). This file contains all of the connection information needed to make a VPN connection to Atlanta, GA.

Once you have used the atlantanoads11.conf OR atlantanoads.11.png file, do not use them again on any other computer. I recommend that you delete them or move them to a folder labeled “Used”. Do not use either of these files on another device until you remove them from the original device. Once installed, a VPN connection will not need to be re-installed unless you delete the connection on WireGuard.

Naming Convention

In the example above, I have named the files to associate with the VPN connection location. Let’s break down the file name:

atlantanoads11.conf

atlanta = city you are connecting into
noads = ads are blocked 
11 = file number you are issued
.conf = a text file to up load to a wireguard connection
.png = a QR picture to make your wireguard connection

Locations

Below are the locations of each VPN. You will see that all but the Dallas location have ad and malware blocking. 

LocationAd BlockingEncrypted DNS
AtlantaYesYes
DallasNoYes
Fremont (California)YesYes
LondonYesYes
NewarkYesYes
Singapore *YesYes
SydneyYesYes
Toronto *YesYes

* Singapore and Toronto were added in November 2020.

Why Would I Want To See Ads?

No one really wants to see ads. But sometimes you have to, to play the game, see the news or just visit a site. VPN connections are not perfect and they can be identified. There are times when websites show you content that might be blocked by ad-blocking technologies. To get around this, you can simply change your VPN connection to the Dallas location. The technology that we use to block ads is not like the ad blockers in your browser. The technology that we use is more in line with how a Pi-Hole works.

Recent Posts

Recent Comments