This page on Engadget has a great description on setting up and using ssh tunnels for securing network traffic. This can also be used for getting by networks that block certain protocols.
Technorati Tags: security, ssh, system admin
This page on Engadget has a great description on setting up and using ssh tunnels for securing network traffic. This can also be used for getting by networks that block certain protocols.
Technorati Tags: security, ssh, system admin
In my previous configuration, I used a CUPS server with multiple network interfaces to enable printing from computers on restricted networks...
Here is a geeky thing to do with ssh tunnels... dialup wireless network?
ReplyDelete