That's kind of hard to avoid if you are doing much traveling.
-- 
Allen Brown  abrown at peak.org  http://brown.armoredpenguin.com/~abrown/
  If your knees aren't green by the end of the day,
  you ought to seriously re-examine your life. --- Bill Watterson


----- Original Message -----
From: "Mr O" <[email protected]>
To: "Eugene Unix and Gnu/Linux User Group" <[email protected]>
Sent: Wednesday, November 3, 2010 6:40:10 PM
Subject: Re: [Eug-lug] Gizmag: Firesheep session hijacking tool

Even better, if you're worried about visiting sites while in public maybe you 
shouldn't be in public!!

--- On Wed, 11/3/10, [email protected] <[email protected]> wrote:

> From: [email protected] <[email protected]>
> Subject: Re: [Eug-lug] Gizmag: Firesheep session hijacking tool
> To: "Eugene Unix and Gnu/Linux User Group" <[email protected]>
> Date: Wednesday, November 3, 2010, 11:35 AM
> The block?  If I understand the
> description correctly there
> are only a few ways to avoid the exploit.
> - Don't use WiFi where a hostile entity can listen.
> - Block all cookies, preventing you from using the sites
>   which use cookies to identify you and which don't
> use SSL.
> - Don't visit those same sites.
> - Force those sites to use SSL.  Of course if they
> don't
>   support it, this fails.
> 
> None of these solutions reliably give you the capability
> to
> visit social media sites from public WiFi.  What block
> do
> you refer to?
> 
> Oh, wait.  There is another way.  You could VNC
> back to
> your home network and visit the social media site
> indirectly
> from there.  This way you have encryption at the
> vulnerable
> part of the connection.  Downsides: more complex and
> slower.
> -- 




_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug


_______________________________________________
EUGLUG mailing list
[email protected]
http://www.euglug.org/mailman/listinfo/euglug

Reply via email to