RE: Secure Surfing

From: sherwyn williams (s-williams@nyc.rr.com)
Date: Wed May 10 2006 - 14:22:04 EDT


There is always Tor, and privoxy

-----Original Message-----
From: Jason Baeder [mailto:jason_baeder@yahoo.com]
Sent: Tuesday, May 09, 2006 9:08 AM
To: Anonymous@Anonymous.com; pen-test@securityfocus.com
Subject: Re: Secure Surfing

If you're talking about secure, anonymous Internet access, you might
consider this. It's a combination of hardware (firewall/vpn) and
subscription proxy service:

http://www.iphantom.com/iPhantomProduct.html

The service is described in brief here:

http://www.iphantom.com/faq.html#q15

As for pen-testing, the hardware device is a firewall that drops all
incoming traffic. Testing against it would be like testing against any
other firewall device.

Jason Baeder
CISSP GCIA GCIH

Note: I have no relationship with Phantom Technologies. I just happen
to have heard about this product from a colleague.

--- Anonymous@Anonymous.com wrote:

>
> I have a client who is looking for a that would encrypt all there
> data, through 1024bit ssh, much like securenntp do.
>
> So i just wanted to ask, how would one go about securing the
> communications, ie:
>
> client pc> (secure tunnels) > net
>
> they are also looking IP masking and port shielding, so all the IP
> address are bounced and by the time they get to the location they
> have a different IP address and there.
>
> Also from a pen testing view point, how hard would it be to test a
> such a network?
>
> Thanks in advance!
>

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

----------------------------------------------------------------------------

--
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to
rise, 
you need to proactively protect your applications from hackers. Cenzic has
the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
----------------------------------------------------------------------------
--
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:55 EDT