Articles
SSH keys
Using a key file can greatly increase security when connecting to a host via SSH. This article presents how to create such keys and configure hosts to use them.
SSH through an SSH blocking proxy
Most corporate networks have their outbound traffic go through a proxy server to prevent unauthorized access to external resources. It can happen that such proxy only allows HTTP and HTTPS traffic. As such, one cannot connect to an external host via SSH. One way to solve this problem is to use <a href="https://github.com/proxytunnel/proxytunnel" rel="noopener noreferrer nofollow">Proxytunnel</a>. This article follows <a href="https://egret.psychol.cam.ac.uk/techniques/firewall.html" rel="noopener noreferrer nofollow">this guide</a>.
0 - 10 / 2