Anonymous Secure Access to Every Device or System (PDF, ePub)

9,90 

The professional way to overcome NAT, IPv4 and Firewalls!

No Port Forwarding Needed!

Works also through Proxy Servers and Firewalls denying all incoming!

A must read for all people involved in IoT (Internet of things), MQTT, remote support, device management and network and security support. Works on top of my Mosquitto Secure MQTT Setup and optionally using My own Certificate Authority too. These are described in other books. For sure the solution works for home users accessing their self hosted services too.
This book shows a perfect setup using real life examples. Works with virtual machines, cheap hardware or raspberry systems running Windows, Linux, Mac or Android.

Description

The professional way to overcome NAT, IPv4 and Firewalls!

No Port Forwarding Needed!

Works also through Proxy Servers and Firewalls denying all incoming!

A must read for all people involved in IoT (Internet of things), MQTT, remote support, device management and network and security support. Works on top of my Mosquitto Secure MQTT Setup and optionally using My own Certificate Authority too. These are described in other books. For sure the solution works for home users accessing their self hosted services too.
This book shows a perfect setup using real life examples. Works with virtual machines, cheap hardware or raspberry systems running Windows, Linux, Mac or Android.

Serve with your systems and/or access your systems secure and anonymous from everywhere! Forget your problems of the past, they are gone!

All needed configuration files included!

100% free Open Source!

Table of Contents

Introduction
Table of Contents
Legal Notes
What is this book about
The problem with NAT and IPv4
Reach every system behind NAT or dynamic IP without Port Forwarding
Introduction to the Tor Network
What is the Tor Network
Bad boys net only?
Preparing our Tools
Preparing the Tor browser
Using Tails Linux
The Tor daemon
General security rules
Domains and .onion addresses
Domains and IPv4 addresses
.onion addresses
The project of this e-book
Secure Tor DMZ setup
Firewall Setup / Central Tor Router
Tor Hidden Service setup
The Management Network
Firewall Setup
Nginx Web Server System Setup
Real Life examples
Accessing every system or device behind NAT and/or dynamic IP from everywhere
Build the basic device
Login with pi and raspberry
Localize setup, e.g. to German
update base system
enable ssh on boot
Add Wifi Network (USB)
Install Firewall
Setup Tor Package
Setup Tor Hidden Service (ssh)
Adding more services to Raspberry Hidden services
Access a Web server running on the Raspberry
SSL Web server on Top of Tor
Mosquitto MQTT
Owncloud
Nextcloud
XMPP Server
Mastodon
Matrix
Remote Desktop (RDP) overTor
OpenVPN over Tor
Imagine the following situation
The OpenVPN server configuration
Edit /etc/tor/Torrc
Setup OpenVPN
Setup the first Client / user
Find and change the created .ovpn file
Test the client connection
Setup Stealth Authentication for Hidden Services
The final result
More Features
About The Author
Other Books By (Author)
Related ebooks
Link List for this e-book
Tor project page
Tails Linux project page
Windows tosocks replacement
DuckDuckGo Search Engine
The Hidden Wiki
Can I Ask A Favour?

About The Author

Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries.

Brand

Karl M. Joch

[DE] Karl M. Joch ist Gründer der CTS GMBH und hat mehr als 30 Jahre Erfahrung in nationalen und internationalen Projekten. Er arbeitete in über 15 Ländern. IT Skills, speziell mit Open Source Lösungen. [EN] Karl M. Joch is founder of CTS GMBH with more than 30 years experience in national and international projects. He worked in over 15 countries. Karl's Website: https://kmj.at/ CTS Website: https://cts.at/