remote access

warning: Creating default object from empty value in /home/www/drupal/drupal-6.19/modules/taxonomy/taxonomy.pages.inc on line 34.
19

A complete reference to SSH tunnelling

http://1024bitez.blogspot.com

In simple words tunneling is a method of bypassing firewall or proxy restrictions using some tunnelling protocols. It works by creating a "tunnel", or a communications channel that makes the firewall think that it is getting traffic from a web browser. Communications content is delivered through this tunnel to our gateway or your own personal gateway.

Read more »
jintujacob's picture
Created by jintujacob 4 years 6 weeks ago – Made popular 4 years 6 weeks ago
Category: End User   Tags:
18

Copying Remote Files with scp

http://1024bitez.blogspot.com

To use scp to transfer files, the SSH service (usually the sshd server daemon) must be running on the remote system. Here are some examples of useful scp commands:

Read more »
jintujacob's picture
Created by jintujacob 4 years 6 weeks ago – Made popular 4 years 6 weeks ago
Category: End User   Tags:
21

Canonical’s Landscape: The Ubuntu Management Strategy

http://www.workswithu.com

In this WorksWithU podcast, editorial director Joe Panettieri speaks with Ken Drachnik, Landscape manager at Canonical. Landscape is Canonical's remote management and monitoring tool for Ubuntu systems.

Read more »
beckham's picture
Created by beckham 4 years 51 weeks ago – Made popular 4 years 51 weeks ago
Category: High End   Tags:
21

Linux Remote Networking Tips and Tricks

http://www.linuxplanet.com

Linux has all kinds of great networking abilities built-in; Carla Schroder shares some tips and tricks for navigating multiple computers at home or in an office, and keeping your files where they belong.

Read more »
werewolf's picture
Created by werewolf 5 years 4 weeks ago – Made popular 5 years 4 weeks ago
Category: End User   Tags:
22

Remotely Accessing Your Linux Computer: Part 1

http://www.linuxloop.com

This is the first part in a four part series coving remote access to Linux machines using SSH.

Read more »
viubuntu's picture
Created by viubuntu 5 years 6 weeks ago – Made popular 5 years 6 weeks ago
Category: End User   Tags:
24

Remote X

http://linuxcritic.wordpress.com

Over at The Complete Geek my friend Jered posted a really nice howto on remote X11 forwarding the other day.

Like uses of Synergy, remote X can be extremely useful when you’re working with multiple machines, or even if you’re working with a virtual machine and need to run some of the applications on the host without constantly flipping windows back and forth.

Read more »
Mr_Shifty's picture
Created by Mr_Shifty 5 years 8 weeks ago – Made popular 5 years 7 weeks ago
Category: Beginner   Tags:
21

Prevent brute force attacks on SSH servers with DenyHosts

http://www.unixmen.com

DenyHosts is a Python script that analyzes the sshd server log messages to determine what hosts are attempting to hack into your system. It also determines what user accounts are being targeted. It keeps track of the frequency of attempts from each host.DenyHosts is designed for the use by Linux system administrators, the script can be useful to anybody running an sshd server.

Read more »
linuxadmiral's picture
Created by linuxadmiral 5 years 19 weeks ago – Made popular 5 years 19 weeks ago
Category: End User   Tags:
23

Login Graphically to A Computer in a Remote Location

http://bigbrovar.wordpress.com

The ability to login graphically into any computer from a remote location has a number of uses.

Read more »
missgeek's picture
Created by missgeek 5 years 26 weeks ago – Made popular 5 years 26 weeks ago
Category: High End   Tags:
14

Access remote network services with SSH tools

http://www.linux.com

You probably rely on the services on your own private network -- wikis, mail servers, Web sites, and other applications you've installed. What happens when you have to leave the friendly confines of your network?

Read more »
sexybeast's picture
Created by sexybeast 6 years 1 week ago – Made popular 6 years 1 week ago
Category: High End   Tags:
19

Nohup - Run a Command Even Once your Shell is Closed

http://fosswire.com

Oftentimes you’ll be in a situation where you want to run a command on a remote machine that will take a long time to complete, but you want to be able to issue the command and then log off and have that command run in the background. There are many ways you could achieve this, perhaps by using cron or at to schedule the command to run right away. However, there is a better way.

Read more »
chen2007's picture
Created by chen2007 6 years 19 weeks ago – Made popular 6 years 19 weeks ago
Category: High End   Tags:
16

Run any GNU/Linux app on Windows without any virtualization

http://www.freesoftwaremagazine.com

SSH tools, long used by UNIX gurus to perform complicated administrative tasks over the internet on machines miles away, are a very simple and user-friendly solution for more conventional purposes. Ubuntu users, read on to learn how to use SSH to run your favorite GNU/Linux software on Microsoft Windows—without installing any software on the Windows box.

Read more »
dave's picture
Created by dave 7 years 1 week ago – Made popular 7 years 1 week ago
Category: End User   Tags:
16

Simple home networking with SSH

http://www.linux.com

The Secure Shell (SSH) network protocol makes it easy to connect computers that are running Linux, share files, and remotely run applications. Along with an X server, it can make sharing a single computer simple on a home network.

Read more »
snotbutter's picture
Created by snotbutter 7 years 4 weeks ago – Made popular 7 years 4 weeks ago
Category: High End   Tags:
15

Secure remote access to your desktop

http://www.linux.com

Accessing your home server safely can be problematic, especially if you don't have a fixed IP address, but with Linux, DynDNS, PAM, and NX Free you can create a safe remote access path to your machine.

Read more »
snotbutter's picture
Created by snotbutter 7 years 6 weeks ago – Made popular 7 years 6 weeks ago
Category: High End   Tags:
21

SSH beyond the command line

http://www.freesoftwaremagazine.com

If you’re an experienced administrator, you’ve probably used SSH to remotely access a troublesome box or your personal computer. For those who don’t know: SSH it’s a great way to fiddle with a computer from miles away as if you were sitting at its keyboard, but it’s also just about the simplest and most secure way to configure your computer to let you access its files from anywhere.

Read more »
tony's picture
Created by tony 7 years 7 weeks ago – Made popular 7 years 7 weeks ago
Category: High End   Tags: