socks proxy

SSH as SOCKs 5 proxy

This entry is part 2 of 3 in the series SSH Best Practices

Let’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in general, blocking myfavoritesite.net or any other domain/service… Here’s a really cool antidote:…Let’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in general, blocking myfavoritesite.net or any other domain/service… Here’s […]

socks proxy

Linux user account with ssh-only permissions

This entry is part 3 of 3 in the series SSH Best Practices

SSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a  service remotely  which is blocked by a firewall. In case we want someone…SSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a  service remotely  which is blocked by a firewall. In […]

exif data

Delete your personal info from your photos with Exif tool

When you create an image, take a screenshot, take a picture with your smartphone or your computer etc, that picture is tagged with some metadata which can be used to…When you create an image, take a screenshot, take a picture with your smartphone or your computer etc, that picture is tagged with some metadata which […]

Linux home directory encryption

Encrypting the $HOME directory under ubuntu/debian and other dists. In my case my $USER is “ubuntu” so be careful to replace that with your own user. Be sure to have…Encrypting the $HOME directory under ubuntu/debian and other dists. In my case my $USER is “ubuntu” so be careful to replace that with your own user. […]