Security Basics mailing list archives
RE: Home wireless free hotspot
From: "Craig S. Wright" <craig.wright () Information-Defense com>
Date: Sat, 17 Apr 2010 17:06:58 +1000
First, listen to what Dave just said. Next, I am not your lawyer and nor do I want to act in this capacity. Next, phone companies have a set of legislation that protects them. TOS agreements are contractual. They often do little to stop tortuous damage and do not hold against a third party not subject to the contract. Next, a TOS is worthless without consideration or if executed as a deed. The foremost dilemma with the study of electronic law is the complexity and difficulty in confining its study within simple parameters. Internet and e-commerce do not define a distinct area of law as with contract and tort law. Electronic law crosses many legal disciplines, each of which can be studied individually. In many cases, liability will depend upon how a court faced with a case of first impression analogises a particular Internet service provider to more conventional categories of information providers. For example, should the service provider be viewed as the equivalent of the telephone company, purely a conduit for information? This might be the right analogy for the telecommunications link provider, but clearly does not fit the publisher. On the other hand, if the provider is viewed as analogous to a publisher of a printed publication, there is a much greater exposure to liability. Of particular confusion to the internet intermediary is the distinction between what is illegal and what is criminal. This, however, is not a distinction solely confined to electronic law. It is important to note that although many actions are illegal, they may not be criminal in nature. This is important as the evidentiary requirements in criminal cases are far stricter than in civil litigation. This is also reflected in the actions that the intermediary will be required to take, both to stop another party who is involved in a criminal activity, and also counter to minimise the tortuous actions that they may be exposed to. The US has introduced a detailed set of immunities is a part of the online copyright infringement liability limitation act [1] (contained within the Digital millennium Copyright act) in order to ratify the provisions of the WIPO Copyright Treaty [2]. These provisions provide immunity from prosecution to Internet intermediaries involved in the mere transmission of packets [3], who maintain automated cache Systems, who host third-party resources and those who provide search tools. There are conditions associated with these immunities. It is required that the Internet intermediary has a lack of knowledge of the transgression, but they do not receive direct financial benefit from it, and that they respect and do not try to bypass copyright protection technologies. General immunity provisions have also been introduced within the US through the Communications Decency Act (1996) [4]. This act introduced new criminal offences of knowingly creating, sending, transmitting or displaying of obscene or indecent materials to minors. This act introduced a number of “Good Samaritan” provisions permitting ISPs to introduce blocking or filtering technology while not becoming classified by the courts to be a publisher or editor. This allows an ISP to filter this material without assuming any responsibility for third-party content. In the US, Congress has endorsed legislative protections for intermediaries from liability through defamation with the introduction of the Communications Decency Act . In 47 U.S.C. §230, it is unambiguously positioned as regarding internet regulation that the act introduced a series of “Good Samaritan provisions” as a part of the Telecommunications Act of 1996. This was tested in DiMeo v Max (2007), in which the court found the defendant not liable for comments left by third parties on a blog. The plaintiff alleged that the defendant was a publisher of the comments hosted on the website but did not allege that the defendant authored the comments on the website or that the defendant was an information content provider. Under 47 U.S.C. § 230 (f)(3), the court determined “the website posts alleged in the complaint must constitute information furnished by third party information content providers" and as a consequence immunity applied to the forum board operator. The Court upheld the dismissal of the suit. The act, first passed in 1996 and subsequently amended in 1998, has the apparent rationale of minimising Internet regulations in order to promote the development of the Internet and safeguard the market for Internet service. The internet has consequently become so essential to daily life that it is improbable that the addition of extra legislation would intimidate service providers away from the provision of services at a competitive rate. In the US, 47 U.S.C. § 230(c)(1) provides a defence for ISPs stating that, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” This statute would seem to afford absolute immunity from any responsibility. Contrasting the DMCA, the ISP or ICP could chose not to do away with material in the event that the ISP or ICP has tangible awareness of the defamatory nature of material it is in fact hosting. Notwithstanding the focal point of this legislation having been towards liability for defamation, it has pertained to seemingly unrelated auction intermediaries, including eBay. Inside the European Union, judgments obtained in the courts of one state are enforceable in any other state included within the Brussels Convention. If not, a judgment in one state will be enforceable in another only where there is a bilateral treaty creating the provision for such reciprocal enforcement between them. Frequently, these treaties add formalities surrounding the enforcement process that offer the courts of the jurisdiction in which the defendant is situated prudence both as to a decision to enforce, or to what degree. It is consequently vital when deciding on a jurisdiction to bring suit to decide if any judgment obtained is enforceable against a defendant who may in effect be judgement proof. NOW the Problems.... Not acting to correct a vulnerability in a computer system may give rise to an action in negligence if another party suffers loss or damage as the result of a cyber-attack or employee fraud. Given proximity [5], a conception first established in Caparo Industries Plc. v. Dickman, [1990] [6] and reasonable foreseeability as established in Anns v. Merton London Borough Council, [1978] [7] A.C. 728, the question of whether there exists a positive duty on a party to act so as to prevent criminals causing harm or economic loss to others will be likely found to exist in the cyber world. The test of reasonable foreseeability has however been rendered to a preliminary factual enquiry not to be incorporated into the legal test. The Australian High Court regarded a parallel scenario, whether a party has a duty to take reasonable steps to prevent criminals causing injury to others in Triangle Shopping Centre Pty Ltd v Anzil [8]. The judgment restated the principle established by Brennan CJ in Sutherland Shire Council v Heyman [9]. The capacity of a plaintiff to recover hinges on the plaintiff’s ability to demonstrate a satisfactory nexus (e.g. a dependence or assumption of responsibility) between the plaintiff and the defendant such that it gives rise to a duty on the defendant to take reasonable steps to prevent third parties causing loss to the plaintiff . Consequently, if a plaintiff in a case involving a breach of computer security could both demonstrate that the defendant did not in fact take reasonable measures to ensure the security of their computer systems (as against both internal and external assault), and they show the act of the third person (e.g. an attacker/hacker or even a fraudulent employee) occurred as a direct consequence of the defendant's own fault or breach of duty, then an action in negligence is likely to succeed [10]. Liability against an Intermediary, whether in the traditional view of ISP and ICP as well as that of employers and other parties remains a risk. Civil Liability The conduct of both agents and employees can result in situations where liability is imposed vicariously on an organisation through both the common law and by statute. The benchmark used to test for vicarious liability requires that the deed of the actor must have been committed during the course and capacity of their agency under the doctrine respondeat superior. Principals’ liability will transpire when a `principal-agent' relationship exists. Dal Pont recognises three possible categories of agents: (a) those that can create legal relations on behalf of a principal with a third party; (b) those that can affect legal relations on behalf of a principal with a third party; and (c) a person who has authority to act on behalf of a principal. Despite the fact that a party is in an agency relationship, the principal is liable directly as principal as contrasting to vicariously, “this distinction has been treated as of little practical significance by the case law, being evident from judges' reference to principals as vicariously liable for their agents' acts” . The consequence being that an agency arrangement will leave the principle directly liable rather than vicariously liable. Where the TOS is non-contractual. It can be argued that an agency exists. In the scenario supplied, the TOS is non-contractually based. Direct liability for organisations or companies refers to the class of liability that occurs when it permits the actor's action. Lord Reid in Tesco Supermarkets Limited v Nattrass [11] formulated that this transpires when someone is "not acting as a servant, representative, agent or delegate" of the company, but as "an embodiment of the company" . When a company is involved in an action, this principle usually relates to the conduct of directors and company officers when those individuals are acting for or "as the company". Being that directors can assign their responsibilities, direct liability may encompass those employees who act under that delegated authority. The employer may be directly liable for the crime in cases where it may be demonstrated that a direct act or oversight of the company caused or accepted the employee’s perpetration of the crime. The US case of Williams v America Online Inc [12], some of the difficulties that that may occur where demonstrated. In this case, Mr Williams started proceedings in Massachusetts stemming from a class action over the installation of AOL software. AOL asserted that the proceedings must commence in Virginia as the terms state Virginia was the exclusive jurisdiction or any claim. Mr Williams however argued that alterations to his computer came about before he agreed to the conditions. Mr Williams described the complicated process by which he had to "agree" to the conditions after the configuration of his computer had already occurred. Further, Mr Williams demonstrated he was able to click, "I agree" without seeing the terms of service. This meant that the actual language of AOL's terms of service failed to display on the computer screen unless the customer specifically requested it, overriding the default settings. The court rejected AOL's assertions [13]. Although this was a contract case, the difficulties posed through the media add additional burdens to an already burdened system. So in this case, the license associated with the disseminated content was subverted by the ineffectiveness of the means of distributing it. The 'karmic' nature of the wireless link precludes it's being covered under contractual provisions. At best, you would require a monitoring system and a means of responding to copyright violations, attacks etc. You are not a common carrier and just as with AOL [12], you cannot guarantee acceptance in any case. If yo are looking for an opportunity to be liable for the actions of another, by all means go for it. Regards, ... Dr. Craig S Wright GSE-Malware, GSE-Compliance, LLM, & ... Information Defense Pty Ltd PS, My LLM (Masters in Law) was on the topic of "The Impact of Internet Intermediary Liability" so I have some idea of the topic. [1] The Online Copyright Infringement Liability Limitation Act (OCILLA) is a portion of the Digital Millennium Copyright Act known as DMCA 512 or the DMCA takedown provisions. It is a 1998 United States federal law that provided a safe harbour to online service providers (OSPs, including ISPs, internet service providers) that promptly take down content if someone alleges it infringes their copyrights. Section 512 was added to the Copyright law in Title 17 of the United States Code (Public Law No. 105-304, 112 Stat. 2860, 2877). [2] The European Union's Electronic Commerce directive contains similar notice and takedown provisions in its Article 14. In France, the Digital Economy Law ("Loi relative à l'économie numérique") implements this directive. In Finland "Laki tietoyhteiskunnan palvelujen tarjoamisesta" implements the directive. [3] The UK legislation, Statutory Instrument 2002 No. 2013, The Electronic Commerce (EC Directive) Regulations 2002 states in section, “Mere conduit” is functionally equivalent to this provision.. [4] Communications Decency Act (1996) [5] Proximity, a notion first established in Caparo Industries Plc. v. Dickman, [1990] 2 A.C. 605, is the initial phase of the assessment. The subsequent phase enquires as to whether there are policy considerations which would reduce or counteract the duty created under the initial stage. Mutually, the phases are to be met with reference to the facts of cases previously determined. The dearth of such cases would not however avert the courts from finding a duty of care. [6] [1990] 2 A.C. 605 [7] [1978] A.C. 728 [8] Modbury Triangle Shopping Centre Pty Ltd v Anzil [2000] HCA 61. (1985) 157 CLR 424. [9] Dixon J elucidated how a “special relationship” of this variety may occur in Smith v Leurs (1945) 70 CLR 256. This case was derived from an indication of occurrences that entail a special danger and the control or of actions or conduct of the third person; See also [2000] HCA 61, para 140. [10] See: Clerk and Lindsell on Torts, 19th Edition (2006), Chapter 28, paragraph 28-05 [11] [1972] AC 153 [12] MARK WILLIAMS and another(1) vs. AMERICA ONLINE, INC. 2001 WL 135825 (Mass. Super., February 8, 2001) [13] "the fact the plaintiff may have agreed to an earlier terms of service for the fact that every AOL member enters into a form of terms of service agreement does not persuade me that plaintiff's ... have notice of the forum selection cause in the new terms of service before reconfiguration of their computers." -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Dave Kleiman Sent: Saturday, 17 April 2010 6:28 AM To: security-basics () securityfocus com Subject: RE: Home wireless free hotspot **** Disclaimer: nothing I am stating here should be taken as legal advice, always consult with a licensed attorney in your jurisdiction!*** Reginald, Really? Maybe you should stop with the LOLs and do a little background on your topic. Maybe you should not be giving legal advice, especially if you are not licensed attorney. My guess is you have never been involved in a litigation matter and think it is very cut and dry? Although the end results of all these cases are not decided for years, it seems it could tie you up in costly litigation for quite some time. So although you may have a written agreement or even a protective law like the "The 2005 Protection of Lawful Commerce", it *may* not excuse your liability, you *may* end up in court with the judicial system deciding the outcome. Just to show how your exampling is erroneous, for businesses (your example was gun manufactures/dealers) may feel they are protected by the 2005 Protection of Lawful Commerce. """Judge Weinstein lets suit against gun mfr proceed: A federal judge in Brooklyn ruled yesterday that New York City's lawsuit against gun manufacturers and distributors can go forward, despite new federal legislation devised to protect gun makers from such lawsuits. The ruling, by Judge Jack B. Weinstein of United States District Court, was a significant victory for the city, which has argued that some gun makers and sellers know about the flood of handguns into the underground market, and have the power to minimize it by relatively simple means, but refuse to do so. In his ruling, Judge Weinstein postponed a trial so the gun manufacturers could appeal. Gun makers named in the suit include Beretta U.S.A., Browning Arms, Colt Manufacturing, Glock and Smith & Wesson. The judge ruled that the new law, the Protection of Lawful Commerce in Arms Act, does not apply to the city's lawsuit because it falls under a narrow exception that allows lawsuits against the gun makers if their sales or marketing practices violate state or federal statutes.""" """9 Gun Makers Called Liable For Shootings: For the first time, a jury has found that gun manufacturers are liable for shootings with illegally obtained handguns because their marketing practices fostered illegal gun trafficking. In a lawsuit filed in Federal District Court in Brooklyn, which legal experts called a test case for a wave of suits that have recently been filed against the gun industry, the jury found yesterday that 15 of 25 firearms makers named in the suit had been negligent. The suit was brought on behalf of victims in seven shootings. Of the 15 manufacturers found negligent, 9 were liable in at least one of three of the shootings -- two of them fatal -- in the New York City region in recent years. The jury found that those nine manufacturers were collectively liable for the shootings -- even though it was not proved what brand of gun had been used in any of the cases -- because they oversupplied states with weak gun laws, which led to illegal sales in those with strict regulations, like New York. The jurors found liability where it had determined that the companies' practices had been a ''proximate cause,'' or a substantial factor, in the shootings.""" - http://www.nytimes.com/1999/02/12/nyregion/9-gun-makers-called-liable-for-shootings.html """Bloomberg signs 4 gun-control bills - One measure would hold arms makers and dealers liable for deaths and injuries caused by illegal use of weapons: A measure allowing the country's gun dealers and manufacturers to be held liable for deaths and injuries caused by the illegal use of their weapons in New York City was one of four gun-control bills signed into law yesterday by Mayor Michael Bloomberg. "There's just no argument here, guns kills people," said Bloomberg during a signing ceremony in the Blue Room in City Hall. "It's time to get them off the streets." One bill the mayor signed allows gun dealers and manufacturers to be sued if they fail to follow a "code of conduct" aimed at preventing guns from getting into the hands of criminals. The code will require these firms to abide by responsible sales practices, such as selling no more than one gun to a customer in any 30-day period.""" - http://infowars.com/articles/2nd_amendment/bloomberg_signs_4_gun_bills.htm ""In 1989, the Legal Action Project was created to change all that. Since then, LAP attorneys have represented gun violence victims pro bono in courts throughout the country, establishing a body of law holding that those who manufacture, distribute and sell guns owe a duty to engage in their business responsibly, and they may be liable for contributing to criminal or unintentional shootings when they fail to do so."" - http://www.bradycenter.org/legalaction/aboutlap ""Jurors trying to decide whether handgun manufacturers should be held liable for gun violence began their fifth day of deliberations Wednesday despite twice telling the judge they were deadlocked."" - http://www.cnn.com/US/9902/09/gun.lawsuit/index.html http://articles.latimes.com/2002/sep/30/opinion/le-winterroth30 Respectfully, Dave Kleiman - http://www.ComputerForensicExaminer.com - http://www.DigitalForensicExpert.com 4371 Northlake Blvd #314 Palm Beach Gardens, FL 33410 561.310.8801 -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Reginald Wheeler Sent: Friday, April 16, 2010 12:12 To: JayZee Cc: martinez85 () att blackberry net; jlightfoot () gmail com; listbounce () securityfocus com; security-basics () securityfocus com Subject: RE: Home wireless free hotspot Lol... and SMH... It would turn out the same way it would if your were in a Barnes and Noble in GA and did the same damn thing. I wouldn't be held responsible. How do you think your phone service provider avoids prosecution when some one gets caught doing something stupid while using the service. Terms of Use agreements save a lot of service providers from very painful and expensive legal and/or civil actions against them. This is per my lawyer. As told to me it's kinda like the gun industry. The manufacture makes the guns and they are bought by dealers. The dealers then sell them to the end user. None of them are responsible for what is done with the gun once the end user agrees that he will follow the letter of the law concerning the weapon that he/she just purchased. So if that end user shots someone the Dealer nor the manufacture are responsible. This same principle holds for service providers that provide a service. We are not responsible for the illegal actions of a third party. Hope this helps you to better understand why I advised in the direction that I did. Thank You, Reginald Wheeler, Owner A+, Networking+, MCSE 2003 1907 Hampton Dr. Sandy Springs, GA 30350 Ph:678.615.2997 wheeler90 () comcast net -----Original Message----- From: JayZee <octopush () gmail com> To: wheeler90 () comcast net Cc: martinez85 () att blackberry net, jlightfoot () gmail com, listbounce () securityfocus com, security-basics () securityfocus com Subject: RE: Home wireless free hotspot Date: Fri, 16 Apr 2010 08:18:35 -0700 Sounds like an easy escape clause in general - we all should probably have one of those regardless of having an open AP or not. Good for White/Black/Grey hats alike. Lets run an experiment!? You sign a "terms of use", open your AP and then we will get some local guys from 4Chan (those guys are up for anything!) down there in GA to run their script kiddy/pedobear/other "unmentionables" from your open AP for a while and lets see how that all turns out? An empirical test of this amazing loophole in paramilitary raids! -Jay ________________________________________ From: Reginald Wheeler [wheeler90 () comcast net] Sent: Friday, April 16, 2010 3:18 AM To: Jay Vlavianos Cc: martinez85 () att blackberry net; John Lightfoot; listbounce () securityfocus com; security-basics () securityfocus com Subject: RE: Home wireless free hotspot Now I spoke to a lawyer shortly after all this started to with this string. I was advised that all is needed is a terms of use. Thanks guys. Thank You, Reginald Wheeler, Owner A+, Networking+, MCSE 2003 1907 Hampton Dr. Sandy Springs, GA 30350 Ph:678.615.2997 wheeler90 () comcast net -----Original Message----- From: Jay Vlavianos <jvlavianos () ecastnetwork com> To: 'wheeler90 () comcast net' <wheeler90 () comcast net> Cc: martinez85 () att blackberry net <martinez85 () att blackberry net>, John Lightfoot <jlightfoot () gmail com>, listbounce () securityfocus com <listbounce () securityfocus com>, security-basics () securityfocus com <security-basics () securityfocus com> Subject: RE: Home wireless free hotspot Date: Tue, 16 Mar 2010 18:02:53 -0700 Um.... opening his wireless access point allows people to run a tor exit node on their own... does it not? As well as seeding torrents? As well as hosting warez? As well as running a dyndns'd porn server? As well as hacking NSA servers? As well as making all of your other neighbors zombie DDOS robots? He doesn't have to run the exit node himself, it only has to leave his pipe for him to get the finger... right? I think you are missing the _human_ aspect of this. You are basically saying "Yes, you might be arrested and charged with child pornography, humiliated in the local press and spend all of your life savings in a court battle... but you WILL ultimately prevail and get your gear back with an apology in the local news TV program so why not do it - THERE IS NO CASE LAW!!! WOO HOO!!!" Sounds a little stupid in that context doesn't it? Does to me at least. -----Original Message----- From: Reginald Wheeler [mailto:wheeler90 () comcast net] Sent: Tuesday, March 16, 2010 5:34 PM To: Jay Vlavianos Cc: martinez85 () att blackberry net; John Lightfoot; listbounce () securityfocus com; security-basics () securityfocus com Subject: Re: Home wireless free hotspot Dude the guy is not asking if it is safe to operate a freaking tor proxy server. He is asking if he set up something like what you would get if you were to go to a freaking coffee shop. Stop telling the guy he can't do it. Tell him the risk involved and tell him the best way to mitigate those risk. I know we have a bunch of IT professionals that are on this mailing list. The link that is provided talks of operating a proxy site that can and will violate your ISP terms of use. Now if you go through the proper channels you can offer a wifi hotspot as a service. You have to speak to your ISP for the details of what you need to do. So having said that and now getting pissed with the level of incompetence that many of my fellow IT professionals are showing I'm left wondering how in the hell you got your jobs. Now I am going to give Mr. Lightfoot this advise please consult an IT professional that is well versed in wireless networking and security. This person will also be able to help you with all of the legalities that you may run into with this project. Now for everyone else we all have to think before we comment, not misrepresent ourselves and do our best to leave our personal feelings about things in our pockets when consulting someone on anything unless they ask for it. Oh and P.S. a free to use wireless hotspot is not a Tor-Exit-Node. Tor meaning the The Onion Router is a piece of software that allows you to route internet traffic for programs that use the internet through layers of proxy servers in order to mask your IP address. This has absolutly nothing to do with a hotspot that will always carry the IP address that is issued him from his ISP. So again Jay I have asked you to site case law that will provide factual evidence that you can as a service provider be held accountable for the actions that another person has conducted on a network that has a Terms of use contract that has to be agreed upon in order to access the network. This does not include the fact that yes there is the inconvenience of having your equipment seized for the sake of investigation. You get it back. Plus if you have insurance and you do things the proper way. You will be able to get a replacement due to the fact that your now able to let your insurance company know that your equipment was damaged in a criminal act and your back in service. Thank You, Reginald Wheeler, Owner A+, Networking+, MCSE 2003 1907 Hampton Dr. Sandy Springs, GA 30350 Ph:678.615.2997 wheeler90 () comcast net\ Universal Systems Consulting LLC Simplifying IT -----Original Message----- From: Jay Vlavianos <jvlavianos () ecastnetwork com> To: martinez85 () att blackberry net <martinez85 () att blackberry net> Cc: John Lightfoot <jlightfoot () gmail com>, listbounce () securityfocus com <listbounce () securityfocus com>, security-basics () securityfocus com <security-basics () securityfocus com> Subject: Re: Home wireless free hotspot Date: Tue, 16 Mar 2010 08:30:34 -0700 One only needs to read stories like the one below of a poor Tor exit node operator to realize that you don't want -anyone- except yourself on your own net connection. That is, of course, if you need some excuse for your own activities ("I don't know man, I didn't download any softwarez- but maybe my neighbor did!). http://calumog.wordpress.com/2009/03/18/why-you-need-balls-of-steel-to-operate-a-tor-exit-node/ On Mar 16, 2010, at 7:32 AM, "Johnathan" <martinez85 () att blackberry net> wrote:
How sweet of you... Now matter how kind your intentions are, you may want to check the terms and conditions of the agreement of the contract you hold with your service provider. You legally may not be allowed to do such a thing you are proposing. You may be aware of this already, just wanted to put it out there for others who may have the same mind set as you. ---- Johnathan Sent via BlackBerry by AT&T -----Original Message----- From: "John Lightfoot" <jlightfoot () gmail com> Date: Fri, 12 Mar 2010 15:10:40 To: <security-basics () securityfocus com> Subject: Home wireless free hotspot Hello, I have a home wireless network that I'd like to make available to ne ighbors who need to borrow a connection from time to time. Consider it karmic repayment for the times I've had to borrow someone else's open connection. Of course, I'd like to do it securely, so I'm looking for some advice. My main network has a wireless router connected to the Internet, with a few wired connections to my home computers. The main router's wireless network is protected by WPA, access control via MAC address, etc. My thought is I would attach a second wireless router (Netgear) to a port off the main router and leave it unsecured, using a second subnet, and block any routing between the two subnets, other than straight out to the Internet, but I'm not sure the best way to do that. So, a few questions: If I set up a second router with a subnet "subservient" to my main router, presumably it has to get an IP address within the address space of the main network, but how can I limit access to that network to only my Internet interface? Would it make more sense for my secure network to be subservient to the main network, i.e. open up the main network and secure a secondary subnet off it? I also have a Secure Computing SG 300 Firewall/VPN appliance, could I configure that help keep the networks separate and my home network secure? It's got a lot of nice features, but I'm not sure it would help make my configuration more secure. This may be a very bad idea, so I'd also be happy to hear why that's so if it's true. Thanks for any advice. John Lightfoot --- --------------------------------------------------------------------- Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.
http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1
--- ---------------------------------------------------------------------
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------ ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- RE: Home wireless free hotspot Reginald Wheeler (Apr 16)
- Re: Home wireless free hotspot Adam Mooz (Apr 16)
- <Possible follow-ups>
- RE: Home wireless free hotspot Reginald Wheeler (Apr 16)
- Re: Home wireless free hotspot JayZee (Apr 16)
- Re: Home wireless free hotspot Reginald Wheeler (Apr 16)
- RE: Home wireless free hotspot Boyd, Chad (Apr 19)
- RE: Home wireless free hotspot David Gillett (Apr 20)
- Message not available
- RE: Home wireless free hotspot David Gillett (Apr 26)
- Re: Home wireless free hotspot JayZee (Apr 16)
- RE: Home wireless free hotspot Craig S. Wright (Apr 19)
- RE: Home wireless free hotspot Jay Kerby (Apr 19)