socks proxy

SSH as SOCKs 5 proxy

This entry is part 2 of 3 in the series SSH Best Practices

Let’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in general, blocking myfavoritesite.net or any other domain/service… Here’s a really cool antidote:…Let’s say, for example, that “someone” is traffic shaping our peer 2 peer connections or eavesdropping traffic in general, blocking myfavoritesite.net or any other domain/service… Here’s […]

socks proxy

Linux user account with ssh-only permissions

This entry is part 3 of 3 in the series SSH Best Practices

SSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a  service remotely  which is blocked by a firewall. In case we want someone…SSH (among other things) is a secure way of proxy-ing your traffic, web browsing or accessing a  service remotely  which is blocked by a firewall. In […]

How to setup SSH – Install SSH server and client

This entry is part 1 of 3 in the series SSH Best Practices

What is SSH? Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH was designed as a…What is SSH? Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH […]

Linux Server Monitoring – Schedule a Command Output to be Sent via Email on Boot

Scheduling a command on boot it’s easy and it can be done with different ways. One, with cronjobs and second, with the rc.local file (/etc/rc.local). Third, by putting your own…Scheduling a command on boot it’s easy and it can be done with different ways. One, with cronjobs and second, with the rc.local file (/etc/rc.local). Third, […]

Disable Direct Root Logins

3. In nano type Ctrl+w to search for “protocol 2” and hit Enter 4. Uncomment and change it to look like Protocol 2 5.find the line PermitRootLogin yes 6….

[crayon-5bea06e96abeb563012739/]

3. In nano type Ctrl+w to search for “protocol 2” and hit Enter 4. Uncomment and change it to look like Protocol 2 5.find the […]