1. SSH Tunneling
This is the processt thatallows an SSH server to become a proxy server. It then allows a local system to send information through a secure SSH server. For example, consider that you're connected to a public WiFi. You can get a lot of any prying by passing your browsing traffic through a secure SSH server.
ssh -D 9999 -C user@host
2. SCP File Transfers
The scp or secure copy command allows you to transfer files between a remote system running an SSH server and your local system.
scp /path/to/local/file user@host:/path/to/destination/file
3. Mounting Remote Directories
The SCP process for file transfers being tedious, it is often much better to just use SSH when viewing files from a remote folder. I you're using Ubuntu then the software requirded will be available by default alongside the GNOME desktop. In others you will ahve to download autilus (the software for Ubuntu) or some other.
4. Preserving Terminal Sessions
The GNU screen helps you accomplish this. What happens usually is that when you logout of an SSH sessions, you will have to set up the connection all over again. On the other hand, this utility lets you preserve a terminal session even after logging out.
ssh -t user@host screen -r
5. Visualising Key Fingerprints
When an SSH session is started, it shows a secure 'key', unless the system is known already. This key proves that the remote device you're connecting to is not an imposter. But, remembering a 16 digit key is really difficult, so you can turn on the virtual host key feature from the SSH config file.
ssh -o VisualHostKey=yes user@host
0 comments:
Post a Comment