Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Cover of the book Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless by Slava Gomzin, Slava Gomzin
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Slava Gomzin ISBN: 9781476387499
Publisher: Slava Gomzin Publication: April 24, 2012
Imprint: Smashwords Edition Language: English
Author: Slava Gomzin
ISBN: 9781476387499
Publisher: Slava Gomzin
Publication: April 24, 2012
Imprint: Smashwords Edition
Language: English

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.

Topics include: using SSH for implementing encrypted tunnel, how to install OpenSSH server and client on different versions of Windows, establishing connectivity through Microsoft proxy using PuTTY and cntlm utilities, configuring Firefox to work through secure SSH tunnel, and more (Article: ~2,700 words).

Table of Contents includes:

  1. Introduction
  2. Solution
  3. Home Computer as a Server
    OpenSSH Server Installation
    OpenSSH Server Configuration
    Windows Firewall
    Internet Router Firewall
  4. Work Computer as a Client
    Installing and Configuring cntlm
    Installing and Configuring PuTTY
    Installing and Configuring Mozilla Firefox
    Securing Wireless Connection
  5. Testing Secure Connection
  6. What’s Next?
    Batch File
    Certificate Authentication
  7. Resources
    Tools
    Articles
    Books
    About the Author

Slava Gomzin, CISSP, PCI ISA, PCIP, ECSP, Security+ has more than 15 years of professional experience in software development and security including
12 years in application development for retail industry and electronic payments,
10 years in .NET and SQL Server development,
6 years in application security and PCI compliance.
Slava Gomzin is Security Architect at Retalix USA. He lives in Dallas, Texas.

More books from Operating Systems

Cover of the book OS X Yosemite installieren by Slava Gomzin
Cover of the book Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM) by Slava Gomzin
Cover of the book NUnit Pocket Reference by Slava Gomzin
Cover of the book Cyberspace and Cybersecurity by Slava Gomzin
Cover of the book The IT / Digital Legal Companion by Slava Gomzin
Cover of the book CompTIA Security+ Certification Study Guide by Slava Gomzin
Cover of the book Android for Beginners by Slava Gomzin
Cover of the book Docker: Up & Running by Slava Gomzin
Cover of the book The Digital Battle: Cyber Security by Slava Gomzin
Cover of the book Apple Pro Training Series by Slava Gomzin
Cover of the book Research Methods for Cyber Security by Slava Gomzin
Cover of the book Cyber Safety For Your Kids by Slava Gomzin
Cover of the book Windows Server 2008 R2 Essentials by Slava Gomzin
Cover of the book ISSE 2013 Securing Electronic Business Processes by Slava Gomzin
Cover of the book Let's Use BASH on Windows 10! by Slava Gomzin
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy