Crypto tunnels Crypto tunnels offer Ability to create (multiple) single-port tunnels Results in minimal access to the remote machine Can be created without administrator interaction Most common Crypto tunnels use SSH or SSL
Copyright 2003, Bri Hatch of Onsight, Inc.
Presented at Real World Linux, 2003.
Presentation created using vim and MagicPoint.