Let’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in general, blocking myfavoritesite.net or any other domain/service… Here’s a really cool antidote: SSH proxy. I think it’s a really nice gesture to give someone the access on something that’s been blocked without his permission. To use ssh […]
Category: Data Protection
Linux user account with ssh-only permissions
SSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a service remotely which is blocked by a firewall. In case we want someone else to have that access or securely proxying his traffic etc etc, we need to provide a user account with ssh-only access to our ssh […]
Linux home directory encryption
Encrypting the $HOME directory under ubuntu/debian and other dists. In my case my $USER is “ubuntu” so be careful to replace that with your own user. Be sure to have more than the double free space in your $HOME than the size of the files to complete the migration, else copy your files temporarily in […]