Wireless PCMCIA cards

Kent Borg kentborg at borg.org
Fri Feb 22 13:02:25 EST 2002


On Fri, Feb 22, 2002 at 12:49:02PM -0500, John Abreau wrote:
> If one is using ssh over the link (protocol 2), then presumably the
> ssh session would notice (and terminate) even if the access point didn't.
> So the bad guy can pull a DoS on you, but unless there's a vulnerability
> in ssh2 that I'm unaware of, the ssh sessions should still be safe.

And I know how to do a simple ssh into my basement Linux machine (that
is how I am writing this e-mail now), but does anyone know off-hand
how I can tunnel from my Linux notebook into my basement so that
everything is encrypted, but once it gets to my basement it can talk
to the net from my basement.

I have tunneled single ports, but how do I tunnel everything?


Thanks,

-kb



More information about the Discuss mailing list