{"id":11,"date":"2006-05-23T13:50:38","date_gmt":"2006-05-23T18:50:38","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/?p=11"},"modified":"2007-01-11T15:22:07","modified_gmt":"2007-01-11T20:22:07","slug":"hamachi","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2006\/05\/23\/hamachi\/","title":{"rendered":"Hamachi"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.hamachi.cc\/img\/logo.png\" \/><\/p>\n<p>I\u2019m away at a retreat and need to get back to my home computer. I\u2019m sitting in a resort where the only Internet connection is wireless. From a security standpoint, this is as bad as it gets. By its very nature, wireless is insecure. I am about to type usernames and passwords that will get me into my email, my content system, my blog\u2026 a lot of things that I don\u2019t want other people to ever get into.<\/p>\n<p>Before I left my house, I installed a free VPN\/P2P solution that let\u2019s me do this in a secure manner. It\u2019s called Hamachi.<\/p>\n<p><a href=\"http:\/\/www.hamachi.cc\/\">http:\/\/www.hamachi.cc\/<\/a><\/p>\n<p>After downloading the program and installing it, the software goes out to a server where a permanent IP address is assigned to my computer. The number is a five dot number (the IP address begins with five). Five dot addresses are real IP addresses, but have never been used by anyone. Having a real IP address means that I can access that address over the Internet. After I have an IP address, Hamachi asks me to name my computer. I called it TrustyHome. Then it asked for a network name. I created a \u201cTrusty\u201d network. Then (and this is the most important) it askes for a strong password. This is what keeps other people out. I give it a good password. I\u2019m done.<\/p>\n<p>Now I repeat the process on my laptop. I do everything the same except I name my laptop TrustyTablet.<\/p>\n<p>Now I\u2019m a couple of hours from my house, connected to a wireless network. I use Hamachi to get back to my home network. Hamachi creates a Virtual Private Network (VPN) between my home computer and my laptop. To connect the two computers, Hamachi uses peer-to-peer technology (P2P). Everything between the two computers is encrypted. Even though I\u2019m on a wireless connection, no one can sniff my information.<\/p>\n<p>Now I can browse the Internet via my home Internet connection\u2026 which is secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I\u2019m away at a retreat and need to get back to my home computer. I\u2019m sitting in a resort where the only Internet connection is wireless. From a security standpoint, this is as bad as it gets. By its very &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2006\/05\/23\/hamachi\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[336],"class_list":["post-11","post","type-post","status-publish","format-standard","hentry","category-edtech","tag-edtech"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":0,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/11\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=11"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=11"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}