Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Cover of the book Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476387499
Publisher: Slava Gomzin Publication: April 24, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476387499
Publisher: Slava Gomzin
Publication: April 24, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

More books from Operating Systems

Cover of the book Peter Norton's Complete Guide to Windows XP by Slava Gomzin
Cover of the book macOS Mojave in easy steps by Slava Gomzin
Cover of the book VMware Performance and Capacity Management - Second Edition by Slava Gomzin
Cover of the book Security Standardisation Research by Slava Gomzin
Cover of the book Windows 2000 Pro: The Missing Manual by Slava Gomzin
Cover of the book Rollen und Berechtigungskonzepte by Slava Gomzin
Cover of the book Instant Debian Build a Web Server by Slava Gomzin
Cover of the book Mastering Python Scripting for System Administrators by Slava Gomzin
Cover of the book Learning Veeam® Backup & Replication for VMware vSphere by Slava Gomzin
Cover of the book Windows XP Annoyances for Geeks by Slava Gomzin
Cover of the book How to Attack and Defend Your Website by Slava Gomzin
Cover of the book Cyber Threat Intelligence by Slava Gomzin
Cover of the book Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command by Slava Gomzin
Cover of the book Building Clouds with Windows Azure Pack by Slava Gomzin
Cover of the book Take Control of Easy Mac Backups by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy