|
You are here |
www.ubuntubuzz.com | ||
| | | | |
128bit.io
|
|
| | | | | SSH is one of my favorite tools on a Linux/Unix system. There is so much you can do from copying files, to tunneling data security. SSH is a great way to get access to your system at home, but also access to your network. Lets go over some things about SSH tunneling and why it's good to use! Basic Idea: The idea of tunneling is to give you a secure way to pass data from one point to another. | |
| | | | |
www.trickster.dev
|
|
| | | | | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting | |
| | | | |
hjr265.me
|
|
| | | | | To test some of Toph's IP-based access control features, I needed to access it from a few different IP addresses than mine. I thought I finally needed to get one of those VPN subscriptions YouTube content creators keep rambling about. Fortunately, I remembered an easier way to do this. You see, it is possible to run a SOCKS proxy that tunnels your connection over SSH. And it is built right into the ssh command: | |
| | | | |
danielrotter.at
|
|
| | | It was not trivial to setup nginx with php-fpm to run in separate containers in kubernetes. Therefore I want to explain how I got it to work. | ||