Security

Aug 272010
 

This VeriSign guide will demystify the technology involved and give you all the information you need to make the best decision when considering your online security options.

Whether you're an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer, but it also protects people who visit your home, place of business or website.

It is important to understand the potential risks and then to make sure you are fully protected against them. With security technologies and online risks changing everyday, it is not always easy to stay abreast of the latest advancements.

 Posted by at 7:24 am
Jul 182009
 

OpenSSH is a great means to protect your connection from being sniffed by others. However, this isn't always enough. Simply proving that you connected to a server is enough to get incriminated. Unfortunately, SSH doesn't provide a native way to obfuscate to whom it connects. Instead, a proxy server can be set up. And this is where TOR comes to play. This howto covers installing TOR on a Debian based system and setting up SSH to use TOR.
Continue reading »

 Posted by at 12:54 am