DSL Embedded :: saving settings dsl sessions/usb



It's not really that surprising. People don't change the Windows defaults so that media won't automatically mount/start and many virus scanners can't be set to automatically scan any new media upon insertion. What freaks me out is the number of people I see popping USB drives into library computers without a second thought, even right after a previous user removed a device. I always wonder how many of them go home or to other computers and pop them right in without any scan.
Quote (lucky13 @ Mar. 25 2008,17:12)
Quote
lucky13: I suppose the "safest" bet would be to save your login details in cookies

That's not very safe and still susceptible to man in the middle attacks, which one should expect in any insecure environment like an Internet cafe. What applies to wifi can be just as easy on any sniffed network. If you're unsure about how trustworthy any particular computer or network is, why should you assume or hope that your web traffic is unmonitored or not sniffed?
http://blogs.zdnet.com/Ou/?p=651
http://www.tgdaily.com/content/view/33207/108/

Hence the quotes. It can be considered somewhat safer to some trivial degree since, in most cases, I think the password would not be visible.

I would believe there is a way around sniffing: have your own server in a trusted environment, and whenever you go to a cafe, use your server as a proxy while encapsulating all traffic between your server and DSL with ssh.

Having fat32 can get your files infected with windows viruses. But, as with the md5 limited set of possibilities causing a clash, security comes through the levels of packaging. Your files can get infected. But having them get infected, while also keeping their signatures recognizable as the files they are, and also keeping their structure intact so they still are usable, is way more rare. As the main file is a cloop pack, altering something would trigger a warning either on load or when trying to read from the changed block.

Quote
I would believe there is a way around sniffing: have your own server in a trusted environment, and whenever you go to a cafe, use your server as a proxy while encapsulating all traffic between your server and DSL with ssh.

Or use VPN. There's a new OpenVPN extension in testing but I haven't tried it yet because my wireless card is too hamstrung in DSL for it to be of much use to me.

I want to look at that extension more closely because I don't recall TUN/TAP being in the config and I just extracted the extension and didn't see those modules in it. Hmmm...

Note of interest: after taking a glance at a few links that was posted here, I decided to see whether these forums had https support. Using the same address, but changing the protocol showed that this site does have support for it, but is not configured properly(?) to use it (expired cert, http links, Firefox says information is partially encrypted, etc.), which is a given since there are no links that point to it.
Next Page...
original here.