Posts Tagged get
Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. SSH was designed to replace Telnet (an insecure shell), now nearly all Unix based computers use SSH to access their shell accounts. SSH uses Public-Key encryption, thus enabling it to provide confidentiality and integrity of data over an insecure network like the Internet.
So you can hide your shell commands, nice, but how does this allow me to hide my traffic. SSH can do much more then just remotely login to machines, it supports tunnelling, TCP port forwarding , file transfer and X11 connections. So for this tutorial I’m going to discuss using SSH to tunnel and port forward enabling us to encrypt our data across the Internet. Read the rest of this entry »