Secure connections with SSH



Whether you need an encrypted tunnel between multiple PCs or graphical applications over a LAN, the all-purpose SSH tool leaves little to be desired.

This article is excerpted from our Linux Shell Handbook, available on newsstands or by order.

Order by phone:

+1 866 247 2802 (Toll free from the US and Canada)

Or order online (**outside the US and Canada only**):

See more of our specials at

Buy this article as PDF

Express-Checkout as PDF
Price $0.00
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • SSH Reverse Tunnels

    We’ll show you a practical project for monitoring home energy usage with SSH and OpenWrt.

  • OpenVPN

    Wireless networks are practical but dangerous at the same time.WEP encryption is unlikely to stop an attacker. But help is at hand in the form of add-on security measures such as an encrypted OpenVPN tunnel.

  • Command Line: SSH

    SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.

  • Mosh and AutoSSH

    SSH can make you crazy if the WLAN connection keeps breaking down, the IP address changes, or the data packets trickle over a slow mobile connection. AutoSSH and Mosh offer some features you won’t find in ordinary SSH.

  • Instant Remote Desktop Access with DeskView
comments powered by Disqus