Commercial And Free Encrypted Tunnel Proxy... SSL And SSH

When using a commercial or free encrypted tunnel proxy anonymizer, either SSL or SSH is used for encryption.

We'll discuss each in turn and then look at the differences between these two security protocols...

1. Commercial And Free Encrypted Tunnel Proxy... SSL

SSL is short for 'Secure Sockets Layer'. It's a protocol designed and implemented by Netscape. To explain this term further, let's break it down into its components...

  • Secure means encrypted, so content can't be deciphered between server or proxy and the receiving computer.
  • A socket is an attachment to a port on a computer and there can be a number of sockets to a port.
  • A Socket Layer is a number of sockets within the Windows Socket system, known as Winsock.

So, a Secure Socket Layer means that particular sockets within the Winsock system are encrypted and secure for sending and receiving traffic from a computer.

In other words, SSL is a protocol to guard privacy by encrypting and decrypting data sent across direct Internet connections.

When your computer makes an SSL connection with a server, all data sent to and from that server is encoded with an algorithm so that any intercepted data cannot be decoded.

Combining SSL with an anonymous proxy server provides you with a commercial or free encrypted tunnel proxy -- an encrypted connection that hides your identity because your IP address is shown as that of the proxy.

There are two options in the way that you can use SSL...

I. Commercial And Free Encrypted Tunnel Proxy...
Connecting To SSL Web Sites

You may only want a secure connection (encrypted) for website transactions to ensure your credit card details, identity and address, or other personal information, cannot be hijacked by identity thieves or other cybercriminals.

Most retail sites will offer SSL security. Because all modern browsers are equipped to enable SSL, your connection between the Website and your computer will be automatically encrypted.

You can tell if the connection to a Website is SSL encrypted because the URL starts with "https://" (HTTP + SSL) in your browser address bar. A standard and non-secure connection will be seen as "http://".

Remember that, although your connection between an SSL website and your computer is secure, your computer identity isn't.

If you want to hide your IP address, you also need to connect via an encrypted (https) proxy anonymizer. If you use a a standard unencrypted, or http, proxy anonymizer, to connect to a SSL website, your real IP address will appear in the site's server logs.

II. Commercial And Free Encrypted Tunnel Proxy...
Setting Up Your Own SSL Connection

You can set up your own SSL connection by using a commercial or free encrypted tunnel proxy, otherwise known as an encrypted proxy anonymizer or https anonymizer, etc.

The secure proxy server sets up the SSL connection between itself and the web site you're visiting and then back to your computer. With some encrypted proxies, you can choose to use SSL for all connections you make, or just for those sites you want hidden from prying eyes.

SSL, combined with an anonymous proxy, forms what is often called a secure tunnel -- hence the term 'commercial or free encrypted tunnel proxy'. The tunnel is the encrypted passage between our computer and the website we are connected to and which cannot be broken into for the purpose of reading or stealing our data.

The limitation with an SSL encrypted tunnel proxy is that it will encrypt connections to websites but not necessarily other web-based applications. This depends on the type of proxy used. For more information on this, take a look at The Types Of Anonymous Surfing.

2. Commercial And Free Encrypted Tunnel Proxy... SSH

SSH stands for "Secure SHell" -- a security protocol that allows you to make a secure connection to a server that has SSH and SFTP (Secure File Transfer Protocol) installed.

SFTP is the mechanism used by SSH for uploading or downloading files between your computer and the destination server, such as a website or your corporate network.

Most importantly, SSH is encrypted, and besides incorporating SFTP, it also supports public-key authentication for encrypting/decrypting, and port forwarding.

What Is An SSH Tunnel?

Where SSL attempts to make a connection with unencrypted channels, SSH encrypts all communications to and from the client and server. When an SSH connection is made, SFTP is the protocol that is used to perform all tasks on that single secure connection.

The SSH protocol allows 'port forwarding' -- more commonly called 'SSH Tunneling'.

Port forwarding redirects all traffic through one port on your computer, which makes it difficult for an attacker to monitor your computer activity.

Additionally, the SSH server ensures all data that travels between the computer and final destination is encrypted in an impenetrable secure shell. In other words, your data cannot be intercepted and read.

This tunneling capability of Secure Shell can be used for commercial or free encrypted tunnel proxy programs. Ideal for protecting confidential communication, such as...

  • When you're in an Internet cafe, hotel room or at any other insecure connection, you can be assured that any Internet application cannot be intercepted and read.
  • Want to keep your chat room, IRC or ICQ absolutely private? SSH tunneling ensures no-one can listen in to or read the conversation.
  • If you want to communicate with, say, clients or customers, and transfer files confidentially, SSH ensures this information cannot get into other hands.

3. Commercial And Free Encrypted Tunnel Proxy...

Having got some idea about what SSL and SSH do and how they work, there are two main differences between these protocols...

  1. Encryption
    SSL attempts to make a connection with unencrypted channels, whereas SSH encrypts all communications to and from your computer and your destination server.

    With SSL, there may be limitations on what web-based applications can be encrypted, depending on the proxy type being used.

    With SSH, all Web-based applications are encrypted and anonymized, including email, Internet Relay Chat (IRC), ICQ (I Seek You)and P2P (Peer to Peer) file sharing.

  2. Speed Of Connection
    With SSH, speed loss is minimal and probably not noticeable.

    The main cause of slow-downs are limitations on the Internet connection's upload speed. For instance, broadband connections usually have a faster download and slower upload speed.

    There is a more noticeable loss of speed with SSL, particularly when used with an anonymous proxy. The proxy, or in some cases, proxies, means another connection(s), which slows things down. The SSL encryption/decryption process also takes time to process.

4. Commercial And Free Encrypted Tunnel Proxy... Supporting Articles

  1. What Are Commercial And Free Proxy Anonymizers?
    How proxy anonymizers work and protect us.
  2. Commercial And Free Anonymous Web Surfing Stops This Monitoring When We're Online
    As soon as we connect to the Internet, organizations, authorities and individuals are after our identity and other personal information.
  3. Commercial And Free Anonymous Web Surfing Stops Our Personal Information Being Recorded
    Unless we use commercial or free anonymous web surfing, this identifying information is easily collected.
  4. The Pros and Cons Of Commercial And Free Proxy Anonymizers
    Get to know the distinctive differences between commercial and free anonymizers before choosing your anonymizer.
  5. The Different Types Of Anonymous Surfing Tools
    There are a number of different tools for anonymous surfing, each having different capabilities for anonymity and data security. Here's what to look for in making your choice.
  6. Free Proxy Anonymizers Reviewed
    If you have decided to try out a free anonymizer, here are some of the better products to choose from.
  7. A Review Of The Best Commercial International Anonymizers
    Commercial anonymizers have a number of advantages over their free counterparts. Here's a review of the most effective.
  8. Anonymizer Versus GhostSurf Review
    Two of the best anonymous surfing tools... but how do they stack up against each other?

  9. A Review Of Commercial And Free Encrypted Tunnel Proxy And VPN Programs
    How a tunnel proxy and VPN provides more security than a standard proxy anonymizer.
  10. Anonymous Email Service Free And Commercial
    How to anonymize and encrypt your confidential emails.


New! Comments

Have your say about what you just read! Leave me a comment in the box below.