Just posted der.hans presentation on SSH tunnels that he gave to the Phoenix Linux Users Group on June 8th https://youtu.be/bWtPCARl0U0 Use SSH to create secure tunnels across untrusted networks and hosts. Learn tunneling basics, tunneling GUI applications, tunneling into a machine behind a firewall, SOCKS proxy and other scenarios. Need to connect to an intranet? Need to connect back to your home network? Need a VPN, but want more control over what gets forwarded? Use SSH tunnels to create specific, secure connections. SSH, the original VPN. The presentation will include an SSH tunneling primer and more complex examples including forwarding web traffic, forwarding mail, and, of course, forwarding SSH connections. Use reverse connections to get into a home network that doesn't allow inbound SSH traffic. Securely connect across someone else's machine. Use SOCKS to forward arbitrary services. Learn to create and use SSH keys and to use them to limit what command can be run when SSH connects. Learn how you can sometimes run commands via SSH even though your server is thrashing too hard to allow logins. If you're a GNU/Linux system administrator and you don't know how to do all these things please read at least ssh(1), ssh-agent(1), ssh-keygen(1) and sshd(8) and also attend this talk. Brian Cluff