[FoRK] Not the linux-mini yet,

Udhay Shankar N udhay
Thu Aug 18 22:03:21 PDT 2005

Lucas Gonze wrote [ at 10:08 AM 8/19/2005 ]:

>Question: how to use this as a secure base for logging in from a 
>cybercafe, given that all traffic can be observed by the compromised 
>machine?  I'm sure it's doable.

Tunnel everything via ssh. For extra paranoia points, proxy dns also via 
the encrypted link.


((Udhay Shankar N)) ((udhay @ pobox.com)) ((www.digeratus.com))

More information about the FoRK mailing list