socks proxy

SSH as SOCKs 5 proxy

This entry is part 2 of 3 in the series SSH Best Practices

This entry is part 2 of 3 in the series SSH Best PracticesLet’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in…This entry is part 2 of 3 in the series SSH Best PracticesLet’s say, for example, that “someone” is traffic shaping our peer 2 peer connections […]

socks proxy

Linux user account with ssh-only permissions

This entry is part 3 of 3 in the series SSH Best Practices

This entry is part 3 of 3 in the series SSH Best PracticesSSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a  service…This entry is part 3 of 3 in the series SSH Best PracticesSSH (among other things) is a secure way of proxy-ing your traffic, web browsing […]

Linux home directory encryption

Encrypting the $HOME directory under ubuntu/debian and other dists. In my case my $USER is “ubuntu” so be careful to replace that with your own user. Be sure to have…Encrypting the $HOME directory under ubuntu/debian and other dists. In my case my $USER is “ubuntu” so be careful to replace that with your own user. […]

Disable Direct Root Logins

3. In nano type Ctrl+w to search for “protocol 2” and hit Enter 4. Uncomment and change it to look like Protocol 2 5.find the line PermitRootLogin yes 6….

[crayon-59950e327ff8c866552926/]

3. In nano type Ctrl+w to search for “protocol 2” and hit Enter 4. Uncomment and change it to look like Protocol 2 5.find the […]