Posts

Showing posts from November, 2014

Anonymized using a proxy vpn

Image
This blog let's look at an expansion of the concepts associated with staying anonymous on the internet. So let's look at how we can stay invisible from your ISP providers snooping. This can be done using a proxy vpn. There are quite a few providers in this market, a pretty complete list can be explored on http://vpnreviewz.com/ . How it works   I found this simple graphical explanation on www.hidemyass.com site showing how it works. How to choose your vpn proxy Make sure the price is right. Odds that you will find a service but throughput tends to be less than ideal. In my opinion paying a small fee for the service is a sound decision, and you get performance. Does the provider have gateways in the countries or locals that you care about. For instance I'm particularly interested in streaming from the UK. Turns out due to complex legal reasons streaming video is blocked. Latency can be a big issue. Since prox

Anonymized

Image
Overall I don't consider myself an ultra-paranoid computer user, however there are times I like to consider my actions a bit more private and discreet. In the next few blogs I'll look at tools, and features that can help you accomplish private computing. Using in browser privacy In all modern browsers privacy can be managed a bit using the built in privacy features. These features are limited, as they only provide browser based anonymity, but they are quick and simple to use. The thing about these features is that they only provide privacy from snooping by the web host (server) at best. Here are IE (inprivacy), and chrome (incognito) features. Once the browser session is open browsing is private also, cookies and browser history will  be wiped once the session is closed. However its essential to know your browsing may be private, but if you dig deep there are footprints of the browsing session persevered on the computer. These artifacts can be di

8 ways cloud providers save you money

After completing my blog on how you would move to the cloud I started thinking about some compelling reasons to adopt cloud computing. Here are 8 immediate cost benefits moving to the cloud for a start-ups or small or mid-sized company.  1. Established ISMS Information Security Management System:   Many companies talk about setting up an ISO27002 based ISMS but struggle. That’s because it take lots of people resources, and money. The major cloud providers have this already built out, and tested.  2. Gates, fortified walls, guards, fences Facility Security:   Cloud providers help restrict access by role, and by granting access to small sets of trusted staff members. Most cloud providers have well established facility security including gates, fences, guards, lighting, and many other security measures. 3. Tested backup and recovery solutions Data Retention Policy:   Cloud providers should have a plan for data retention and storage that includes redundancy can

Deperimiterized with Security in mind - Part 3

In part 3 of my moving to the cloud recommendation, I address a new taxonomy of securing your cloud based network or - service oriented architecture (SOA). As companies embraces the cloud and BYOD they are also embarking on a journey where traditional IT security, and compliance measure will not work as effectively. Security and compliance require enabling effective people, process and technology solutions. Cloud based architecture requires new set of security processes and technologies. The new strategy starts by addressing your network design architecture that outline how you Identify your hosts, and perimeter points. Network and port scanners are not enough to outline your network devices anymore. Traditional network diagrams, do not provide enough detail to outline the boundaries of your network. More complex data flow diagrams (DFD) that focus on application layer design are needed in a cloud only service model.  The design can be complex but worth the effort.  I'd re