Oh YES, Oh YES, really! Wait!, what!, NO! NO I mean YES! but…? Well, it all started when me and one of my ‘Skiddy’ friends went for a sleep over at our ‘Geeky’ friends place. The first few words that came out of his mouth (Skiddy friend) as we walked into our (Geeky friend’s) flat was, “I wish you had WiFi so I could connect to it and show you this web-based (bandwidth intense) app I have running remotely on one of my Servers but then again, I am picking up other WiFi signals, unfortunately their signals are really weak, like my Hacking skills!” (laughing) He went on to say, “If only I had mad skills (l337 h4x0r), I would have connected to one of the nearby WiFi’s, piggybacked it’s Internet connection to show you!” My Geeky friend replied, “I do have WiFi but it’s because of people like you it’s running in stealth mode!” It immediately registered and he (Skiddy friend) replied,
SSH Port Tunneling
SSH Port Tunneling using PuTTY
Have you ever been in a situation where you feel like someone is watching you whilst you are working on your computer? Be it at the airport, restaurant, hotel, coffee shop, at a client or on the move!? By watching you I mean, closely monitoring your network traffic, that is, your web browsing, your POP3 emails , your FTP file transfers, open VNC sessions and last but not least your remote desktop (RDP) sessions. Well, the good news is, you can make it difficult for someone to easily spy on you or intercept your traffic. The process of preventing people from snooping or eavesdropping your traffic requires one to force or redirect all the traffic to go via or through an artificial and encrypted electronic passage irrespective of whether