Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Cover of the book Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476387499
Publisher: Slava Gomzin Publication: April 24, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476387499
Publisher: Slava Gomzin
Publication: April 24, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

More books from Operating Systems

Cover of the book Cyber Security and Threats by Slava Gomzin
Cover of the book Cryptographic Solutions for Secure Online Banking and Commerce by Slava Gomzin
Cover of the book Principles of Security and Trust by Slava Gomzin
Cover of the book Transactions on Modularity and Composition I by Slava Gomzin
Cover of the book Street Cryptography by Slava Gomzin
Cover of the book Hands-On Web Penetration Testing with Metasploit by Slava Gomzin
Cover of the book Unauthorised Access by Slava Gomzin
Cover of the book Attacken und Gegenmaßnahmen by Slava Gomzin
Cover of the book Creating your own UserControls with C#: Yes you can!!! by Slava Gomzin
Cover of the book iOS Application Security by Slava Gomzin
Cover of the book Windows 8.1 Administration Pocket Consultant Storage, Security, & Networking by Slava Gomzin
Cover of the book CentOS 7 Server Deployment Cookbook by Slava Gomzin
Cover of the book Cyber Security Culture by Slava Gomzin
Cover of the book Black Hat by Slava Gomzin
Cover of the book vSphere High Performance Cookbook by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy