Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

    • ‏3٫99 US$
    • ‏3٫99 US$

وصف الناشر

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:
1. Introduction
2. Solution
3. Home Computer as a Server
OpenSSH Server Installation
OpenSSH Server Configuration
Windows Firewall
Internet Router Firewall
4. Work Computer as a Client
Installing and Configuring cntlm
Installing and Configuring PuTTY
Installing and Configuring Mozilla Firefox
Securing Wireless Connection
5. Testing Secure Connection
6. What's Next?
Batch File
Certificate Authentication
7. Resources
Tools
Articles
Books
About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٢
٢٥ أبريل
اللغة
EN
الإنجليزية
عدد الصفحات
١٢
الناشر
Slava Gomzin
البائع
Draft2Digital, LLC
الحجم
٨٧٢٫٢
ك.ب.
Cybersecurity for Small Networks Cybersecurity for Small Networks
٢٠٢٢
Implementing a Secure Home Intranet and VPN Solution Using Linux Implementing a Secure Home Intranet and VPN Solution Using Linux
٢٠١١
Network Security Hacks Network Security Hacks
٢٠٠٦
SSH Mastery SSH Mastery
٢٠١٨
TCP / IP For Dummies TCP / IP For Dummies
٢٠٠٩
Day One: Juniper Ambassadors’ Cookbook for Enterprise Day One: Juniper Ambassadors’ Cookbook for Enterprise
٢٠١٣
Hacking Point of Sale Hacking Point of Sale
٢٠١٤
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
٢٠١٢
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
٢٠١٢
Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
٢٠١٦
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
٢٠١٢
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
٢٠١٢