Security Audit of Safeplug Tor in a Box
|
|
|
- Nickolas Flowers
- 10 years ago
- Views:
Transcription
1 Security Audit of Safeplug Tor in a Box Anne Edmundson Princeton University [email protected] Anna Kornfeld Simpson Princeton University [email protected] Edward W. Felten Princeton University [email protected] Joshua A. Kroll Princeton University [email protected] Abstract We present the first public third-party security audit of Pogoplug s Safeplug device, which markets complete security and anonymity online by using Tor technology to protect users IP addresses. We examine the hardware, software, and network behavior of the Safeplug device, as well as the user experience in comparison to other forms of web browsing. Although the Safeplug appears to use Tor as advertised, users may still be identified in ways they may not expect. Furthermore, an engineering vulnerability in how the Safeplug accepts settings changes would allow an adversary internal or external to a user s home network to silently disable Tor or modify other Safeplug settings, which completely invalidates the security claims of the device. Beyond this problem, the user experience challenges of this type of device make it inferior to the existing gold standard for anonymous browsing: the Tor Browser Bundle. 1 Introduction Privacy on the Internet is becoming increasingly important as users realize how vulnerable they are to tracking, surveillance, and theft of their data. A recent Pew study listed compromised s/accounts, harassment, stolen Social Security Numbers, bank information, and credit card numbers as some of the results of online visibility; according to the study, 86% of Internet users have tried to become more anonymous online [26]. Despite this, users do not believe that they have the tools to solve this problem. In December 2013, the cloud storage company Pogoplug released the Safeplug, a small box that plugs into a user s home router. It claims to: conceal your identity, hide where you live, shield your surfing habits, and make you anonymous online by routing all traffic through Tor [25]. We conducted the first public thirdparty security audit of the Safeplug by analyzing the hardware, software, network behavior, and usability of the device. The following are some of our findings: The Safeplug functions as a HTTP proxy for the browser, which then uses Tor for outgoing traffic. Despite the use of Privoxy as an ad-blocker, the Safeplug does nothing to prevent users browsers from collecting both first- and third-party tracking cookies, allowing users to be de-anonymized across websites despite the presence of Tor [27]. Safeplug users are vulnerable to a Cross-Site Request Forgery (CSRF) attack that allows an attacker external to their home network to modify the Safeplug settings (including silently turning off the use of Tor). A malicious user within the network can modify the Safeplug settings without notifying any other devices on the network. The Safeplug has a higher web request latency than that of the Tor Browser Bundle. The use of the Safeplug provides less protection than the use of the Tor Browser Bundle. Pogoplug made use of good security principles by using auditable open source software on their device, and has the laudable goal of making online security the standard for more users. However, there are other technologies available that aim to provide the same functionality, such as the Tor Browser Bundle, which can be used free of charge. In order to determine if the Safeplug provides value to users, we measure the privacy implications between the different technologies. We show that there is little reason to use the Safeplug over the Tor Browser Bundle; in addition to the Tor network technology used in the Safeplug, the Tor Browser Bundle contains protections against tracking cookies and fingerprinting, making it an improvement over the privacy offerings of the Safeplug. 1
2 Table 1: Software and the corresponding version numbers on the Safeplug as of May Safeplug Software Version Date Up To Date Linux Kernel No Lighttpd Web Server No Privoxy Proxy Yes Tor No Dropbear sshd v No 2 Design and Operation of Safeplug Safeplug [25] offers any user the option of using Tor [12] without having to know about it or how it works. It allows users to browse the web from their own standard web browser with complete security and anonymity, and it costs $49. Safeplug offers Tor out of the box, with no additional software installation, by sitting between a user s router and the Internet [28]. Pogoplug s marketing pitch centers around the protection of users IP addresses by using Tor [16]. 2.1 Software on the Safeplug Table 1 shows the software used by the device, the corresponding version of the software, the date of that version s release, and if it is up to date as of May There are many known vulnerabilities in the pieces of software that are not up to date [5, 3, 4]. This software executes the proxying through Tor and ad-blocking functions via Tor and Privoxy, while the Lighttpd server allows users to modify settings via a JavaScript-generated POST request to a shell script, xspctrl, running via CGI. The CGI handler copies a number of environment variables, and then forks and runs xspctrl via execve (in the constructed environment). xspctrl contains a method for each settings change; these methods execute any necessary Safeplug binary files (go update, go upgrade, go sshd, or go updateexceptions) and then return a HTTP response. 2.2 Configuration on the Safeplug The Safeplug configuration files can be found in /opt/xce/etc and include sp.conf, sp_version, and sp_torexceptions. The first contains all of the configuration details: whether to use Tor, whether to block ads, and whether to act as a Tor relay or exit relay. The version file is used during the call to check for updates in the xspctrl script, and the exceptions file is used by the Privoxy configuation to control the whitelist of sites not to connect to via Tor. These configuration files are read by the scripts in /opt/xce/etc/init.d which enable Lighttpd, Privoxy, and Tor. As expected, Privoxy looks at the tor, ad-block and exceptions configurations, and Tor reads the sp.conf file to determine the correct Tor configuration file (regular, relay, or exit relay). 3 Usability Several aspects of the user experience of the Safeplug also affect the security of the device. 3.1 Information Prior to Using the Device: Terms of Service The Terms of Service (TOS) are never presented to the user: they aren t presented in the Safeplug package or shown during the activation process, and are only available through a small link at the bottom of the Safeplug website [25]. One of the topics the TOS discusses is the use of open source software. A standard term of many open source licenses states that a company that uses the open source software must list the software used and its license, as well as the open source code of their own software that uses the license. The TOS contains a link to a page that would supposedly comply with this requirement: home-en-developers-open-source.html, but the link is dead; instead, the reader sees a 404 error [25]. There is an open source page at com/opensource, which describes several pieces of software used by the Safeplug; however, there is no way to find this page from the Terms of Service or the Safeplug website. 3.2 Activation and Setup First, we activated the device by following simple instructions. Next, we followed the configuration instructions based on our specific platform and browser (the options are shown in Table 2) to set up the Safeplug as our browser s HTTP proxy. The last step was to modify the settings; this page is shown in Figure 1. We can turn Tor on/off, turn ad-blocking on/off, and turn Tor relay node ability on/off (and if on, an additional option appeared to allow the device to be an exit relay). Additionally, we can specify white-listed domains that will be connected to directly even if Tor is turned on, without going through the Tor network. It is important to note that there is no explanation of relay or exit nodes. Using Safeplug as an exit node has possible legal repercussions. As an exit relay, all traffic that exits the node can be traced back to the Safeplug s 2
3 Platform Windows OSX ios Android Browsers Internet Explorer, Chrome, Firefox Safari, Chrome, Firefox Safari Chrome Table 2: The platforms and browsers that the Safeplug settings page provides instructions for. While browsing the Internet in a fresh browser session, we used FourthParty, a plugin developed by Jonathan Mayer to collect information about cookies and other browsing data, to confirm the presence of first-party cookies [19, 20]. More interesting and damaging to the user s control over their anonymity would be third-party cookies because the user cannot remove those just by logging out. Most browsers require a trip to the browser settings to clear cookies (or not have them set in the first place). When collecting data on the existence of thirdparty cookies, we analyzed two separate browsing sessions; they were both new sessions with no cookies. One of the sessions used the ad-block feature of the Safeplug and the other did not. We found many third-party cookies in both sessions; these included cookies from: abmr.net, bizographics.com, krxd.net, and bluekai.com among many others. The ad-block functionality on the Safeplug reduced, but did not eliminate, these third-party cookies. Although Safeplug has a warning about clearing cookies on their FAQ page, it only mentions clearing cookies after a browser session. This does not prevent the tracking of a user during their browser session from website to website; preventing this requires knowledge and vigilance from the user, or a browser that does not accept third-party cookies, such as the one provided in the Tor Browser Bundle. 3.4 Browser Fingerprinting Figure 1: Safeplug settings page. The last button Allow Exits only appears if the relay option above has been turned on. IP address; it is likely that some of this traffic contains illegal information or is part of illicit activities. The Tor Project recommends not running an exit relay from a user s home. Considering that the Safeplug is intended for home use, it is a poor design choice to allow the user to use it as an exit relay without providing the user with any contextual information. 3.3 Cookies We used Panopticlick [15] to examine the fingerprint of a freshly installed Firefox browser running through the Safeplug proxy. Panopticlick found the browser to be unique, which means that websites that did fingerprinting could very accurately track, correlate, and de-anonymize user traffic without knowing the IP address or even storing a cookie. The presence of the Safeplug, as an HTTP proxy, should be completely undetectable by the fingerprinting service because HTTP is designed to make proxies transparent. Unlike the Tor Browser, Safeplug users do not have the fingerprints of other users of the service to help hide their fingerprints. Allowing the user to use their own browsers significantly increases the amount of variation and customization between users and therefore the likelihood of having a unique fingerprint. 3.5 Latency If the latency of web requests using the Safeplug is noticeably longer than that of normal Internet use, users may be deterred from using the device. Similarly, if turning Tor on adds a significant time delay, the user may only turn on the ad-blocking feature (without Tor). We recorded the time for a web request on the following settings: Plain Firefox (no use of the Safeplug device) Firefox, no Tor, no ad-blocking (traffic running through the Safeplug device) Firefox, Tor, no ad-blocking (using the Safeplug device) Firefox, Tor, ad-blocking (using the Safeplug device) 3
4 Figure 2: Latency of web requests. Firefox, no Tor, ad-blocking (using the Safeplug device) Tor Browser Bundle with Safeplug (all settings off) Tor Browser Bundle (no use of the Safeplug device) For each of the settings, we took 20 measurements because we were confident this would give us enough data points that would span multiple Tor circuits; Figure 2 shows the average time of a web request on each of the specified settings for three different web pages. When taking these measurements, we loaded the page, but did not scroll; in many cases more objects are loaded when scrolling down a page. The differences between web pages can most likely be attributed to the amount of advertisements and content running in plugins (such as video) on the web page. The average web request time for accessing www. washingtonpost.com is greatest on the same settings that the average web request time for is the least. This setting did not include ad-blocking, and therefore had to render each ad (which it requested through Tor); com does not have any ads. Figure 3 displays the variation among fetch requests for each setting when fetching Despite performing these fetches close in time, the greater variation for settings using Tor shows that more than one Tor circuit was used, and therefore, we were not simply measuring the variation in Tor circuit performance. The latency of using the Safeplug with Firefox, Tor, and ad-blocking is comparable to that of using the Tor Browser Bundle. For all three web pages, the Tor Browser Bundle had slightly lower latency; the Tor Browser Bundle blocks scripts, and for web pages such Figure 3: Web request time variation for as this provides a significant latency decrease and better protects privacy. This, in conjunction with the fact that the Tor Browser Bundle is free and is issued directly from The Tor Project, shows a convincing argument to use the Tor Browser Bundle in place of the Safeplug. 4 Privoxy vs. Tor Browser Bundle The Safeplug uses two primary technologies: Tor and Privoxy. The Tor Project has developed the Tor Browser Bundle (TBB), which is a free custom browser that uses Tor as well as other protection mechanisms to help preserve a user s privacy. A differentiating factor between the Safeplug and the TBB is the use of Privoxy; in order to determine the effectiveness of the Safeplug in comparison to that of the TBB, we must measure the value of Privoxy against the other features of the TBB. We ran a privacy study on the use of Firefox, Firefox with Privoxy, and the TBB; our data was collected by running crawls on the Alexa Top 100 sites in each of the specified browsers [1]. All browser configurations were modified with Pagestats [7] and Cookie Manager+ [2] to aggregate information about third party requests, JavaScript objects, flash objects, and third party cookies. Because measuring privacy is a difficult task, we measured potential ways for a user s privacy to be compromised. First, we recorded how many third party domains were accessed total (throughout the crawl); in addition, we recorded the total number of JavaScript and Flash objects received from third parties, as well as the total number of third party cookies received. We then found 4
5 Configuration Third Party Domains Third Party JavaScript Third Party Flash Third Party Cookies Plain Firefox Privoxy Tor Browser Table 3: Measurements of using Firefox, Privoxy, or the Tor Browser Bundle; the numbers represent the average number of Third Party Domains accessed per page, the average number of Javascript objects received from third parties per page, the average number of Flash objects received from third parties per page, and the average number of third party cookies received per page. Figure 4: Disabling Tor as an RPC attack. the on-average, per-page numbers corresponding to these measurements by dividing the totals by 100. These fractions are shown in Table 3. It is clear that the Tor Browser Bundle performed the best in most categories. The one category where Privoxy performed better than the Tor Browser Bundle is in the number of JavaScript objects received from third parties; this can be attributed to the fact that our measurements were taken using the default settings for the Tor Browser Bundle, which allows JavaScript [9]. This is explained on the Tor Project s website; they explain that disabling JavaScript causes some web pages to break, making the browser less user-friendly. The user has the option to disable JavaScript by simply clicking a button. This shows that the Tor Browser is a less expensive alternative to the Safeplug, and provides more privacy protections. 5 Vulnerabilities As we discovered during our software analysis, the Safeplug has a remote procedure call (RPC) capability. This is a script called xspctrl found in /opt/xce/html/svc. Functional calls to this script include the ability to enable and disable all of the Safeplug settings, including Tor, ad block, and Tor relay. None of them require any authentication. 5.1 Insider Attack The Safeplug has no validation or authentication on the settings page for these RPC calls, so any malicious party inside the home network can easily modify the settings. Unlike many home routers that use a similar system for settings modification, there is no username/password combination necessary to access the settings page. A more technically advanced user could send the call directly to the RPC server. Figure 4 shows an example of the RPC version of this attack. If the adversary can get into the network they can perform these attacks. For example, if the user has an open WiFi network, then anyone nearby can launch this attack - potentially peforming a sort of drive-by deanonymization. Since the RPC version of the attack just involves basic Internet tools (the ability to send a POST request), the attacker could also be any kind of device on the local network, or the local gateway itself, if it is compromised. 5.2 CSRF Attack Any external website can also perform the above attack by returning a correctly formatted POST string via an internal user s browser. This executes the same functionality as the Insider Attack, but the attacker does not need to be on the local network. This Cross Site Request Forgery (CSRF) attack requires a nonmalicious insider user to visit a web page controlled by the attacker, allowing the attacker to send the POST to the Safeplug. If the attacker does not know the IP address of the Safeplug, he can perform an exhaustive search on the address space. We implemented this attack with less than 20 lines of JavaScript code. The following steps are necessary for the attack: 1. Set up a web page with the JavaScript code, which will send the POST request of the following format to all addresses in the common ranges: <IPaddress>/svc/xspctrl/disableTor. 2. Send the malicious link to a user in the targeted private network. 3. Once the user clicks the link and loads the malicious site, the correctly formatted POST request will be sent to every IP address in the ranges. 4. Tor is disabled silently. The user must check or refresh her Safeplug settings page to learn that Tor is off. While this attack requires a greater amount of time because the local IP address of the Safeplug must be guessed via search, the number of private address spaces is small, and the space likely to be occupied by a Safeplug on a home network is even smaller. 5
6 The largest observed time to send requests to the /24 space was approximately 400 milliseconds; the entire attack costs approximately 800 milliseconds for sending requests to both /24 and /24 ranges - even when the website was being loaded over Tor. In the case of a private network in the range of /16, the attack took less than 12 minutes (this generates script timeout warnings in most major browsers, which affects the timing of this attack). This means that it would take a few hours to send requests to the full /12 range, which is commonly used in business networks. The final private network space is /8 which is too large for an exhaustive search, but some simple optimization might make it feasible as well. For example, using a GET request to get and parse the Safeplug settings page would allow the script to positively identify the Safeplug and stop the search. However, the /24 and /24 ranges are much more common in home networks; because Safeplug is geared towards home network use, in most cases the script will take less than a second. In addition to disabling Tor, the attacker can modify any other settings on the device. This includes: enabling/disabling Tor, enabling/disabling ad-blocking, enabling/disabling the use of the device as a Tor relay node [note: enabling requires the user to do additional setup], enabling/disabling the use of the device as an exit node (if it is already a relay). Lastly, the attacker can also modify the user s whitelist of sites that should not be routed through Tor. This whitelist attack is particularly dangerous because the change is silent and much harder for the user to notice the addition of a single website to the whitelist than a global loss of Tor. 5.3 Gaining Access through SSH 5.4 Spoofing the Installation Server An additional dangerous class of vulnerabilities comes from the lack of HTTPS during the initial installation process. We discovered that the script that performs this installation is downloaded via TCP from an IP address provided by the Pogoplug servers. This script (run as root) then downloads the Safeplug s software (Tor, Privoxy, Lighttpd, and wget) and checks it against MD5 hashes provided in the script, but we could not find any signs of verification of the script itself. An adversary could use DNS spoofing or compromise the Pogoplug server and force users to download a malicious script - for example, something that turns the Safeplug into a surveillance box while appearing to provide the correct functionality. Because the activation occurs over TCP in the clear, an adversary who can spoof DNS replies to the user can install arbitrary software onto the Safeplug box. This turns a device that does not live up to expectations, but is otherwise harmless, into something that actively harms security on the network. We were unable to observe a post-installation update from Pogoplug due to none being provided to users in the 6+ months since the Safeplug was released, but examining the update scripts on the Safeplug indicates that this update process occurs over HTTPS, so that only the initial download during device activation is vulnerable. However, DNS spoofing would still defeat the authentication of update binaries provided by HTTPS. In short, Pogoplug should be signing both the code used in updates and the code downloaded during the initial installation with a key whose corresponding verification key is part of the device s factory image. Pogoplug already provides several certificates in the factory image to establish roots of trust, so it would be a minimal engineering effort to include their own update-signing certificate. 1 Another command available to the RPC server is enabling SSH to the device. SSH instructions for Pogoplug s other device (called Pogoplug) are widely available online and an in the Tor-talk mailing list confirmed the instructions are the same for the Safeplug [11]: curl --data ssh root@<ip-of-safeplug> password: ceadmin Having a publicly available root password means that SSH is done effectively without authentication. Once the box was activated and had Lighttpd installed, the SSH procedure was available and any adversary on the home network could log into the box and install malware, surveillance software, or virtually anything they desired. 6 Related Work To our knowledge, there has been no other study analyzing the security of Pogoplug s Safeplug device. However, there has been much prior research on Tor [12] and fingerprinting. Tor. Prior security evaluations of the Tor network reveal a myriad of potential vulnerabilities. A significant area of research on Tor relates to diversity of autonomous systems (ASes). Researchers argue that a user s anonymity may be compromised by using geographically diverse ASes [14, 22]. There has also been 1 N.B. There could be such a certificate already on the device that we haven t found. Because there have been no updates, we cannot determine whether signatures are present on the update code. We hypothesize that they would not be present, based on the fact that they were not present in the downloads for device initiation. 6
7 proven traffic correlation attacks that are efficient on the Tor network [21, 23]. Johnson, Wacek, Jansen, Sherr, and Syverson found that in a period of six months, 80% of all users may be deanonymized by a reasonably realistic Tor-relay adversary [18]. While Safeplug does not introduce or modify how Tor is used, it routes all traffic through the Tor network; Safeplug is also vulnerable to the attacks found in prior research on Tor. Fingerprinting. Website fingerprinting attacks as well as remote physical device fingerprinting attacks have shown they can identify users, even when specific defenses have been used in order to prevent them. Previous research has shown that web page fingerprinting attacks are possible [13, 17, 24]. Cai, Zhang, Joshi, and Johnson found that their fingerprinting attack is successful 83.7% of the time when the defense is the use of Tor [10]. These results can be extended to the security of Safeplug. Because Safeplug uses Tor to anonymize users, it may be susceptible to fingerprinting attacks. 7 Discussion 7.1 Necessary Fixes The most critical engineering fix is authentication in the POST calls to prevent the CSRF attack. A typical approach to preventing CSRF attacks is using a cookie and a hidden form field set in the settings page of the Safeplug hosts; the cookie must be returned by the browser when making the POST request to the RPC server [29]. Although someone doing a CSRF attack such as the one described above could get the cookie sent, because of the same-origin policy, the adversary would not be able to examine the contents of the cookie to determine what to put in the form field. Pogoplug should also take steps to secure 7.2 Structural Problems However, there are much more significant structural problems with implementing a Tor connection via an HTTP proxy. Several of the usability problems involve user awareness and vigilance. For example, cookies and fingerprinting problems mean that users could still be tracked across websites, regardless of whether the adblock functionality on the Safeplug is enabled. One type of client that deserves special attention is a mobile phone user. Although the Tor Project publishes an Android app called Orbot on the Android Market, which is supported for Android versions 2.3 and later, there are no official Tor apps for iphones or other non- Android devices [8, 6]. Safeplug provides proxy functionality and instructions for Safari on the iphone and Chrome on Android. However, while this does supposedly give the option for more mobile users to make use of Tor, proxy configuation on mobile devices comes with significant usability issues. For example, proxying would only work while the user is on the same wifi network as the Safeplug. If any data is sent over the cellular network or another wifi network, then the security of Tor is lost. Additionally, the user may have to disable the proxy whenever they move to a different network, and remember to re-enable it when they want to use Tor. This is certainly not transparent usability. Users who are truly concerned about anonymity online should eschew the Safeplug and purchase a device that supports the Tor Browser Bundle or other Tor Project software. 7.3 Opportunities Despite all the structural problems, is there a market for a Torifying piece of hardware? Given the security and privacy pitfalls in comparison to a piece of software such as the Tor Browser Bundle, there seems to be no reason for a user who can run the Tor Browser Bundle to purchase the Safeplug or any other device. For mobile phones, the proxy problems with mobility contribute to an already high usability cost. However, there are an emerging class of smart home devices which may connect to the Internet. It is possible that some of these devices can be configured to use an HTTP proxy or some other middle box to Torify their traffic to an external service provider. For them, is the benefit of some anonymity via a Safeplug-like device worthwhile? Since the data sent by these devices to the service provider likely contains identifying information, the use of Tor would only protect the user s location at the expense of connection time and load on the Tor network. Since proxy configuration on such devices is likely to be difficult and the amount of information hidden is unlikely to be worth the effort, a Torifying box that functions as a proxy is of questionable value in this space as well. 8 Future Work A more in-depth analysis of the performance of the Safeplug would be useful in the future. The performance of the Safeplug reflects its usability, and would be helpful in determining the trade-offs of using the device. Additionally, clearer privacy metrics are needed to help evaluate privacy-enhancing technologies, such as the Safeplug. 9 Conclusion Ultimately, the structural concerns of the Safeplug Torifying proxy-in-a-box strategy indicate that this is prob- 7
8 lematic as a method for security and anonymity online. It is critical for Safeplug to correct their security errors, particularly the vulnerability to silently disable Tor, in order to protect customers who have already made use of the device, but users who are truly concerned about safety and anonymity online would be better served by the Tor Browser Bundle. References [1] Alexa. [2] Cookie manager+. firefox/addon/cookies-manager-plus/. [3] Cve details for tor. vulnerability-list/vendor_id-12287/product_ id-23219/year-2012/torproject-tor.html. [4] National vulnerability database. results for dropbear http: //web.nvd.nist.gov/view/vuln/search-results?adv_ search=true&cpe=cpe\%3a\%2fa\%3amatt_johnston\ %3adropbear_ssh_server\%3a0.52. [5] National vulnerability database. results for lighttpd search-results?adv_search=true&cpe=cpe\%3a\%2fa\ %3alighttpd\%3alighttpd\%3a [6] Orbot: Proxy with tor. apps/details?id=org.torproject.android. [7] Pagestats. [8] Tor on android. html.en. [9] The tor project. [10] CAI, X., ZHANG, X. C., JOSHI, B., AND JOHNSON, R. Touching from a distance: Website fingerprinting attacks and defenses. In Proceedings of the 2012 ACM conference on Computer and Communications Security (2012), ACM, pp [11] COLLETON, L. Fwd: Ssh on safeplug. seul.org/or/talk/jan-2014/msg00003.html. [12] DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The second-generation onion router. Tech. rep., DTIC Document, [13] DYER, K. P., COULL, S. E., RISTENPART, T., AND SHRIMP- TON, T. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Security and Privacy (SP), 2012 IEEE Symposium on (2012), IEEE, pp [14] FEAMSTER, N., AND DINGLEDINE, R. Location diversity in anonymity networks. In Proceedings of the 2004 ACM workshop on Privacy in the electronic society (2004), ACM, pp [15] FOUNDATION, E. F. Panopticlick. eff.org. [16] HALFACREE, G. Pogoplug launches tor-powered safeplug. 11/25/pogoplug-safeplug/1. [17] HERRMANN, D., WENDOLSKY, R., AND FEDERRATH, H. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security (2009), ACM, pp [18] JOHNSON, A., WACEK, C., JANSEN, R., SHERR, M., AND SYVERSON, P. Users get routed: Traffic correlation on tor by realistic adversaries. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp [19] MAYER, J. Fourthparty. [20] MAYER, J. R., AND MITCHELL, J. C. Third-party web tracking: Policy and technology. In Security and Privacy (SP), 2012 IEEE Symposium on (2012), IEEE, pp [21] MURDOCH, S. J., AND DANEZIS, G. Low-cost traffic analysis of tor. In Security and Privacy, 2005 IEEE Symposium on (2005), IEEE, pp [22] MURDOCH, S. J., AND ZIELIŃSKI, P. Sampled traffic analysis by internet-exchange-level adversaries. In Privacy Enhancing Technologies (2007), Springer, pp [23] OVERLIER, L., AND SYVERSON, P. Locating hidden servers. In Security and Privacy, 2006 IEEE Symposium on (2006), IEEE, pp. 15 pp. [24] PANCHENKO, A., NIESSEN, L., ZINNEN, A., AND ENGEL, T. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society (2011), ACM, pp [25] POGOPLUG. Safeplug. [26] RAINIE, L., KIESLER, S., KANG, R., MADDEN, M., DUGGAN, M., BROWN, S., AND DABBISH, L. Anonymity, privacy, and security online. Pew Research Center (2013). [27] REISMAN, D., ENGLEHARDT, S., EUBANK, C., ZIMMERMAN, P., AND NARAYANAN, A. Cookies that give you away: Evaluating the surveillance implications of web tracking (draft: April 2, 2014). [28] SOLON, O. Safeplug makes it super-easy to harness torś anonymity at home. archive/ /22/safeplug-tor. [29] ZELLER, W., AND FELTEN, E. W. Cross-site request forgeries: Exploitation and prevention. Bericht, Princeton University (2008). 8
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Running the Tor client on Mac OS X
Running the Tor client on Mac OS X Note that these are the installation instructions for running a Tor client on Mac OS X. If you want to relay traffic for others to help the network grow (please do),
Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
A Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Filter Avoidance and Anonymous Proxy Guard
March 21, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Filter Avoidance and Anonymous Proxy Guard Filter Avoidance The award winning XLi technology
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
VMware Software Manager - Download Service User's Guide
VMware Software Manager - Download Service User's Guide VMware Software Manager 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is
TOR (The Onion Router)
TOR (The Onion Router) TOR (The Onion Router) is a free software implementation of second generation onion routing a system enabling its users to communicate anonymously on the Internet. Originally sponsored
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
ez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
SmartGrant Web Browser Set-Up
SmartGrant Web Browser Set-Up TABLE OF CONTENTS SmartGrant Supported Web Browsers for Windows... 2 Configuring Your Web Browser for SmartGrant... 3 Internet Explorer... 3 Firefox... 10 Chrome... 15 Safari...
Secure Web Browsing in Public using Amazon
Technical White Paper jwgoerlich.us Secure Web Browsing in Public using Amazon J Wolfgang Goerlich Written July 2011 Updated August 2012 with instructions for Mac users by Scott Wrosch. Abstract The weary
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011
Quick Note 026 Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server Digi International Technical Support December 2011 Contents 1 Introduction... 3 1.1 Outline... 3 1.2 Assumptions...
Client Side Filter Enhancement using Web Proxy
Client Side Filter Enhancement using Web Proxy Santosh Kumar Singh 1, Rahul Shrivastava 2 1 M Tech Scholar, Computer Technology (CSE) RCET, Bhilai (CG) India, 2 Assistant Professor, CSE Department, RCET
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Web Tracking for You. Gregory Fleischer
Web Tracking for You Gregory Fleischer 1 INTRODUCTION 2 Me Gregory Fleischer Senior Security Consultant at FishNet Security 3 Disclaimer Why do you hate? 4 Reasons For Tracking TradiFonal reasons for tracking
Penetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0
User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 40 Firewalls and Intrusion
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
WompMobile Technical FAQ
WompMobile Technical FAQ What are the technical benefits of WompMobile? The mobile site has the same exact URL as the desktop website. The mobile site automatically and instantly syncs with the desktop
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1
MAXA-COOKIE-MANAGER - USER MANUAL - SW-Release V 5.0 / Document Rev. 1.1 Quick Start Once installed MAXA Cookie Manager goes to work immediately to gather information about the cookies on your system and
Sage HRMS 2014 Sage Employee Self Service
Sage HRMS 2014 Sage Employee Self Service Pre-Installation Guide October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright 2013. Sage Software, Inc. All rights
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
PARCC Technology Troubleshooting FAQs, Version 1.0
PARCC Technology Troubleshooting FAQs, Version 1.0 Released 3/6/14 This document contains Frequently Asked Questions to help districts and schools troubleshoot issues regarding technology set up for the
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski [email protected]
Using a Malicious Proxy to Pilfer Data & Wreak Havoc Edward J. Zaborowski [email protected] Abstract...3 Malicious Web Proxy...3 Becoming the Proxy...3 ARP Spoofing...3 Static Configuration...3 Web Proxy
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
How to Configure Dynamic DNS on a Virtual Access Router
How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Device Fingerprinting and Fraud Protection Whitepaper
Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Load Balancing. Outlook Web Access. Web Mail Using Equalizer
Load Balancing Outlook Web Access Web Mail Using Equalizer Copyright 2009 Coyote Point Systems, Inc. Printed in the USA. Publication Date: January 2009 Equalizer is a trademark of Coyote Point Systems
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
A Case Study on Measuring Statistical Data in the Tor Anonymity Network Karsten Loesing 1,StevenJ.Murdoch 1,2, and Roger Dingledine 1 1 The Tor Project 2 Computer Laboratory, University of Cambridge, UK
Parallels Plesk Panel 11 for your Linux server
Getting Started Guide Parallels Plesk Panel 11 for your Linux server Getting Started Guide Page 1 Getting Started Guide: Parallels Plesk Panel 11, Linux Server Version 1.1 (11.1.2012) Copyright 2012. All
7 6.2 Windows Vista / Windows 7. 10 8.2 IP Address Syntax. 12 9.2 Mobile Port. 13 10.2 Windows Vista / Windows 7. 17 13.2 Apply Rules To Your Device
TABLE OF CONTENTS ADDRESS CHECKLIST 3 INTRODUCTION 4 WHAT IS PORT FORWARDING? 4 PROCEDURE OVERVIEW 5 PHYSICAL CONNECTION 6 FIND YOUR ROUTER S LOCAL NETWORK IP ADDRESS 7 6.1 Windows XP 7 6.2 Windows Vista
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
C-more Remote HMI App
Topic: CM630 C-more Remote HMI App SAFETY NOTICE: The C-more Remote HMI App allows the user to connect to remote C-more panels from Ethernet, Wi-Fi, or cellular network connections. The Remote user can
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN User Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification
Secure Web Development Teaching Modules 1 Security Testing Contents 1 Concepts... 1 1.1 Security Practices for Software Verification... 1 1.2 Software Security Testing... 2 2 Labs Objectives... 2 3 Lab
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Getting Started Guide. Getting Started With Your Dedicated Server. Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0.
Getting Started Guide Getting Started With Your Dedicated Server Setting up and hosting a domain on your Linux Dedicated Server using Plesk 8.0. Getting Started with Your Dedicated Server Plesk 8.0 Version
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
MyReports Recommended Browser Settings MYR-200a
MyReports Recommended Browser Settings MYR-200a Note: If you have installed an additional Tool Bar on your browser, such as Yahoo Tool Bar or Google Tool Bar, be sure that it is also configured to allow
Performance Comparison of low-latency Anonymisation Services from a User Perspective
Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Technology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Alberni Valley IT Services http://www.avits.ca [email protected]. Virtual domain E-mail information.
Alberni Valley IT Services http://www.avits.ca [email protected] Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual
Lifesize Cloud Privacy Statement
Lifesize Cloud Privacy Statement When you use Lifesize Cloud, you provide certain information to Lifesize, Inc. and its affiliates, successors and assigns (collectively referred to as Lifesize ), including
Basic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Chapter 4 Security and Firewall Protection
Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be
MMLIST Listserv User's Guide for ICORS.ORG
MMLIST Listserv User's Guide for ICORS.ORG 12/12/06 Version 1.1 To Send Mail to the Listserv: [email protected] Only Subscribed Users can send mail to the Listserv. Anyone can have a Subscription.
How To Understand The History Of The Web (Web)
(World Wide) Web WWW A way to connect computers that provide information (servers) with computers that ask for it (clients like you and me) uses the Internet, but it's not the same as the Internet URL
WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services
WEB SITE SECURITY Jeff Aliber Verizon Digital Media Services 1 SECURITY & THE CLOUD The Cloud (Web) o The Cloud is becoming the de-facto way for enterprises to leverage common infrastructure while innovating
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Getting Started With Your Virtual Dedicated Server. Getting Started Guide
Getting Started Guide Getting Started With Your Virtual Dedicated Server Setting up and hosting a domain on your Linux Virtual Dedicated Server using Plesk 8.0. Getting Started with Your Virtual Dedicated
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
