[FoRK] Not the linux-mini yet,
Udhay Shankar N
Thu Aug 18 22:03:21 PDT 2005
Lucas Gonze wrote [ at 10:08 AM 8/19/2005 ]:
>Question: how to use this as a secure base for logging in from a
>cybercafe, given that all traffic can be observed by the compromised
>machine? I'm sure it's doable.
Tunnel everything via ssh. For extra paranoia points, proxy dns also via
the encrypted link.
((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))
More information about the FoRK