That's kind of hard to avoid if you are doing much traveling. -- Allen Brown abrown at peak.org http://brown.armoredpenguin.com/~abrown/ If your knees aren't green by the end of the day, you ought to seriously re-examine your life. --- Bill Watterson
----- Original Message ----- From: "Mr O" <[email protected]> To: "Eugene Unix and Gnu/Linux User Group" <[email protected]> Sent: Wednesday, November 3, 2010 6:40:10 PM Subject: Re: [Eug-lug] Gizmag: Firesheep session hijacking tool Even better, if you're worried about visiting sites while in public maybe you shouldn't be in public!! --- On Wed, 11/3/10, [email protected] <[email protected]> wrote: > From: [email protected] <[email protected]> > Subject: Re: [Eug-lug] Gizmag: Firesheep session hijacking tool > To: "Eugene Unix and Gnu/Linux User Group" <[email protected]> > Date: Wednesday, November 3, 2010, 11:35 AM > The block? If I understand the > description correctly there > are only a few ways to avoid the exploit. > - Don't use WiFi where a hostile entity can listen. > - Block all cookies, preventing you from using the sites > which use cookies to identify you and which don't > use SSL. > - Don't visit those same sites. > - Force those sites to use SSL. Of course if they > don't > support it, this fails. > > None of these solutions reliably give you the capability > to > visit social media sites from public WiFi. What block > do > you refer to? > > Oh, wait. There is another way. You could VNC > back to > your home network and visit the social media site > indirectly > from there. This way you have encryption at the > vulnerable > part of the connection. Downsides: more complex and > slower. > -- _______________________________________________ EUGLUG mailing list [email protected] http://www.euglug.org/mailman/listinfo/euglug _______________________________________________ EUGLUG mailing list [email protected] http://www.euglug.org/mailman/listinfo/euglug
