![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Fri, Feb 22, 2002 at 12:49:02PM -0500, John Abreau wrote: > If one is using ssh over the link (protocol 2), then presumably the > ssh session would notice (and terminate) even if the access point didn't. > So the bad guy can pull a DoS on you, but unless there's a vulnerability > in ssh2 that I'm unaware of, the ssh sessions should still be safe. And I know how to do a simple ssh into my basement Linux machine (that is how I am writing this e-mail now), but does anyone know off-hand how I can tunnel from my Linux notebook into my basement so that everything is encrypted, but once it gets to my basement it can talk to the net from my basement. I have tunneled single ports, but how do I tunnel everything? Thanks, -kb
![]() |
|
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |