If you are in an environment that disallows the use of SSH and forces the use of an HTTP proxy, it is possible to use that HTTP proxy as a transport for SSH. Vincent Danen explains how to use the ...
Have you ever avoided checking your email over that free wireless access point for fear of someone snarfing your password? Secure, trusted networks aren't always available, so today we'll show you how ...
"If we see light at the end of the tunnel, it is the light of the oncoming train" ~ Robert Lowell. Oh yes, another good quote. This post is on SSH tunneling, or as I like to call it 'Poor Man's VPN'.
Once upon a time the thought of a firewalled, cordoned, and censored web was enough to send chills up the spine of any internet user. As the years have passed, however, our sentiment has softened. A ...
Can a (Cisco, typical?) Layer 7 filter tell the difference between SSL-encrypted HTTP traffic on port 443 and SSL-encrypted SSH on port 443? I know the port doesn't make a difference, just wondering ...