Jump to content

How-To:Port Forwarding: Difference between revisions

m
Line 5: Line 5:
Downloading email and browsing the Internet in such a way that the immediate (local) network does not know what you are doing. All it sees is encrypted SSH traffic, like that used when you type on [RedBrick] normally.
Downloading email and browsing the Internet in such a way that the immediate (local) network does not know what you are doing. All it sees is encrypted SSH traffic, like that used when you type on [RedBrick] normally.


Thus you can (a little more) securely access your stuff stuff from wireless hotspots
Thus you can (a little more) securely access your stuff from wireless hotspots
or from other insecure or filtered networks.
or from other insecure or filtered networks.


138

edits