Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

SSH Tunnels How-to? 98

The_Spider asks: "I periodically browse the net and check web-mail at work, when I have the opportunity. I was wondering if anyone had a nice walkthrough on how to set-up an SSH tunnel. I'm not 100% newbish to Linux but I don't know where to start. (I have a Fedora Core box at home for NAT & DHCP) I'm hoping to combine this for use with portable Firefox. I'm not to worried about security, but I love the notion of taking a portable and encrypted browser with me from place to place. Can Slashdot help?" While this might be a bit FAQ, I figure Slashdot anecdotes on the use of SSH tunnels might be a bit more user-friendly than say, the several task-specific HOWTOs one can find via a Google search. ALso, I'm sure that there are a few of you out there who have discovered interesting ways of using SSH tunnels, not covered by said HOWTOs. So, how are you using SSH tunnels, and can you explain them to those who have not yet discovered the value of their use?
This discussion has been archived. No new comments can be posted.

SSH Tunnels How-to?

Comments Filter:
  • by Gothmolly ( 148874 ) on Saturday January 21, 2006 @02:17AM (#14524902)
    I know you shouldn't feed AC trolls, but I'll bite. First, we identify the troll:
    1) pedantic reliance on security policy
    2) Euro spelling of 'unauthorized'
    3) excluded middle fallacy invoked to formally document and submit your request
    4) ITIL-like flamage about change control procedures
    5) assertion that its wrong de jure, instead of right, de facto

    Ok, so now we know it's a troll. What to do?
    1) hopefully metamod the positive mods that he received to correct the error
    2) offer brief counterargument, demolishing the troll, thus:

    You're job is to get work done, and act in the best interests of your employer. If you are doing both, no good manager will complain.


Radioactive cats have 18 half-lives.