O'Reilly logo

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition by Marcus J. Carey, Brian Baskin, Kent Nabors, Jayson E Street

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3

Explore

Authentication Security

The Hack Dissected

Stepan pulled out his access token and typed in the six-digit random number from the token and the four-digit PIN he had memorized. Soon he had established an encrypted connection to the office back in Zurich, Switzerland. He opened his e-mail software and found the message waiting for him. (p. 4)

In the prologue, Stepan used an RSA token to authenticate himself into his office network over a virtual private network (VPN) connection. A VPN allows for someone to connect into their home or office network from afar through a very strongly encrypted connection. A VPN allows people to check e-mails and view network files without third parties being able to view the network traffic.

Because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required