Skip to content

Commit

Permalink
Merge pull request #133 from PeterTonoli/Chapter_02_tonoli_0
Browse files Browse the repository at this point in the history
Fix typo's & case for chapter 02 #1
  • Loading branch information
yuvadm committed Apr 8, 2016
2 parents 49ae670 + 253bb19 commit 4a46dbb
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
Expand Up @@ -50,8 +50,8 @@ Even in between your computer and the router, your packages can easily be interc



1. If you are a Unix user, you can use the tcpdump command in the bash and view real time dns traffic. It's loads of fun! (and disturbing) ^
1. If you are a Unix user, you can use the tcpdump command in the bash and view real time DNS traffic. It's loads of fun! (and disturbing) ^
2. See list of TCP and UDP port numbers ([http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers](http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers))
3. If this exchange is happening under an HTTPS connection, the process is much more complicated and also much safer, but you will find out more about that in a most fascinating chapter called Encryption. ^
4. This Tech Bubble Is Different ([http://www.businessweek.com/magazine/content/11_17/b4225060960537.htm](http://www.businessweek.com/magazine/content/11_17/b4225060960537.htm)), Ashlee Vance (Businessweek magazine) ^


Expand Up @@ -9,7 +9,7 @@ As smart phones have become more popular there has been a dramatic rise in accou

* Use a screen lock. If you have a phone and prefer an unlock pattern system get in the habit of wiping the screen so an attacker can not guess the pattern from finger smears. On a Laptop, you should set your screensaver to require a password as well as a password on start-up.
* Encrypt your hard disk. TrueCrypt is an open and secure disk encryption system for Windows 7/Vista/XP, Mac OS X and Linux. OSX and most Linux distributions provide the option for disk encryption on install.
* Android Developers: do not enable USB debugging on your phone by default. This allows an attacker using the Android *adb shell* on a computer to access your phone's hard disk without unlocking the phone.
* Android Developers: do not enable USB debugging on your phone by default. This allows an attacker using the Android *ADB Shell* on a computer to access your phone's hard disk without unlocking the phone.

Can malicious web sites take over my accounts?
----------------------------------------------
Expand Down
2 changes: 1 addition & 1 deletion src/chapter_02_understanding_browsing/04_tracking.md
Expand Up @@ -111,7 +111,7 @@ How can I see who is tracking me?

The easiest way to see who is tracking you is to use the Ghostery plugin. There is a small icon on the upper right or lower right corner of your browser window that will tell you which services are tracking you on particular web sites.

{Suggestion: Add Abine.com's Do Not Track add-on. I suggest using both Ghosterly and DNT, as occasionally they block a different cookie. Abine also has Privacy Suite, recently developed which can give a proxy telephone and proxy email, similar to 10 Minute Mail or Guerrilla Mail for fill- in emails for forms.}
{Suggestion: Add Abine.com's Do Not Track add-on. I suggest using both Ghostery and DNT, as occasionally they block a different cookie. Abine also has Privacy Suite, recently developed which can give a proxy telephone and proxy email, similar to 10 Minute Mail or Guerrilla Mail for fill- in emails for forms.}

A word of warning
-----------------
Expand Down
2 changes: 1 addition & 1 deletion src/chapter_02_understanding_browsing/05_anonymity.md
Expand Up @@ -28,7 +28,7 @@ The main purpose behind using a proxy is to hide or to change Internet address (
* To access websites and/or materials available only for IP addresses belonging to a specific country. For example, a user wants to watch a BBC video stream (UK-only) while not residing in the UK.
* To access the Internet from a partially banned/blocked IP address. Public IP addresses can often have "bad reputation" (bandwidth abuse, scam or unsolicited email distribution) and be blocked by some web-sites and servers.

While a usual scenario would be to use proxy for accessing the Web (HTTP), practically Internet protocol can be proxied - i.e. sent via a remote server. Unlike a router, proxy server is not directly forwarding remote user requests but rather mediates those requests and echos responses back to remote user's computer.
While a usual scenario would be to use proxy for accessing the Web (HTTP), practically Internet protocol can be proxied - i.e. sent via a remote server. Unlike a router, proxy server is not directly forwarding remote user requests but rather mediates those requests and echoes responses back to remote user's computer.

Proxy (unless setup as "transparent") does not allow direct communication to the Internet thus applications such as browsers, chat-clients or download applications need to be made aware of the proxy server (see **Safer Browsing/Proxy settings** chapter)

Expand Down

0 comments on commit 4a46dbb

Please sign in to comment.