Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Cover of the book Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476387499
Publisher: Slava Gomzin Publication: April 24, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476387499
Publisher: Slava Gomzin
Publication: April 24, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

More books from Operating Systems

Cover of the book Gestión de incidentes de seguridad informática by Slava Gomzin
Cover of the book Public-Key Cryptography – PKC 2018 by Slava Gomzin
Cover of the book How to Stop E-Mail Spam, Spyware, Malware, Computer Viruses, and Hackers from Ruining Your Computer or Network: The Complete Guide for Your Home and Work by Slava Gomzin
Cover of the book Getting Started with Kubernetes - Second Edition by Slava Gomzin
Cover of the book Advanced Persistent Security by Slava Gomzin
Cover of the book The Art of Linux Kernel Design by Slava Gomzin
Cover of the book Crime Prevention Technologies and Applications for Advancing Criminal Investigation by Slava Gomzin
Cover of the book Protect Your Wordpress Websites and Beat the Hackers by Slava Gomzin
Cover of the book Exam Ref AZ-103 Microsoft Azure Administrator by Slava Gomzin
Cover of the book Host Your Web Site In The Cloud: Amazon Web Services Made Easy by Slava Gomzin
Cover of the book La sicurezza dei dati e delle reti aziendali by Slava Gomzin
Cover of the book Fedora 17 Linux系統建置與實務(第四版) by Slava Gomzin
Cover of the book Windows 7 100 % Visuel by Slava Gomzin
Cover of the book Oracle Solaris Cluster Essentials, Portable Docs by Slava Gomzin
Cover of the book Embedded and Real-Time Operating Systems by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy