Secure connections with SSH



Whether you need an encrypted tunnel between multiple PCs or graphical applications over a LAN, the all-purpose SSH tool leaves little to be desired.

This article is excerpted from our Linux Shell Handbook, available on newsstands or by order.

Order by phone:

+1 866 247 2802 (Toll free from the US and Canada)

Or order online (**outside the US and Canada only**):

See more of our specials at

Buy this article as PDF

Express-Checkout as PDF
Price $0.00
(incl. VAT)

Buy Linux Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • SSH Reverse Tunnels

    We’ll show you a practical project for monitoring home energy usage with SSH and OpenWrt.

  • OpenVPN

    Wireless networks are practical but dangerous at the same time.WEP encryption is unlikely to stop an attacker. But help is at hand in the form of add-on security measures such as an encrypted OpenVPN tunnel.

  • Command Line: SSH

    SSH offers a secure approach to working on remote machines and encrypted data transfer. We'll show you other benefits of the secure shell.

  • Mosh and AutoSSH

    SSH can make you crazy if the WLAN connection keeps breaking down, the IP address changes, or the data packets trickle over a slow mobile connection. AutoSSH and Mosh offer some features you won’t find in ordinary SSH.

  • Instant Remote Desktop Access with DeskView
comments powered by Disqus

Direct Download

Read full article as PDF:

075-078_ssh.pdf (2.29 MB)


njobs Europe
Njobs Netherlands Njobs Deutschland Njobs United Kingdom Njobs Italia Njobs France Njobs Espana Njobs Poland
Njobs Austria Njobs Denmark Njobs Belgium Njobs Czech Republic Njobs Mexico Njobs India Njobs Colombia