Monthly Archives: December 2010

HTTPS User Guide

In light of my previous post where I talk about how it’s relatively easy to commit a man-in-the-middle attack, I feel like I should explain how people can protect themselves. If you’re typing information that you consider private (typing your … Continue reading

Posted in All, Computers | Leave a comment

Man-in-the-Middle Attacking

Fair warning: This is somewhat technical. Introduction I recently wondered how hard it is to perform a man-in-the-middle attack. The login forms for Facebook, Twitter, Pandora and countless others submit login credentials using HTTPS, however, the forms themselves are served … Continue reading

Posted in All, Computers | Leave a comment