Category: "Day-to-Day Security Advice"

  2019-09-07

On protecting yourself against MITM in SSH

  21:40, by Hagai Bar-El   , 1081 words
Categories: IT Security, Day-to-Day Security Advice
SSH is one of the best security protocols out there. It is used by anyone remotely logging into servers, as well as for secure connection to Git servers, and for secure file transfers via SFTP. One of the key promises of SSH is protection against active… more »

  2019-08-31

Using Tor to protect against certificate injection by Hotspots

  15:21, by Hagai Bar-El   , 667 words
Categories: IT Security, Day-to-Day Security Advice
Tor is typically used to attain anonymity and preserve privacy online. This is by far the most common and appealing use for it. Most people without such concerns are not likely to ever install a Tor browser on their workstations, and it's a pity; Tor… more »

  2015-11-27

Valuable pieces of personal information and how to protect them

  17:37, by , 1268 words
Categories: Day-to-Day Security Advice
Hackers and legitimate companies share one thing in common: both want your personal information. Though the exact method of collection and type of information will vary, the results can often be the same. Loss of privacy and the compromise of your personal safety can all ensue when your data falls into the wrong hands. But what information are they after? From your hair color to your bank account number, there‚Äôs a lot of stuff to learn about you. By knowing exactly what data to protect, you can better prevent breaches of your personal security. In addition, having the right tools on hand to protect your information will make your life a lot simpler. more »