[index] [text page] [<<start] [<prev] [next>] [last>>]
Page 41: Crypto tunnels

Page 41

  Crypto tunnels
  Crypto tunnels offer
  Ability to create (multiple) single-port tunnels
  Results in minimal access to the remote machine
  Can be created without administrator interaction
  Most common Crypto tunnels use SSH or SSL

Copyright 2003, Bri Hatch of Onsight, Inc.

Presented at Real World Linux, 2003.

Presentation created using vim and MagicPoint.