12 examples for ssh
# ssh port forwarding # route all local requests to 8080 to remote port 80 ssh -L 8080:localhost:80 user@remoteserver
# Create ssh tunnel with SOCKS interface on localhost:1234 ssh -D 1234 user@remotemachine
# see your path on a remote machine from a non-login shell ssh you@remotemachine echo \$PATH
# SSH-VPN create a tun interface with ssh (use as root on both sides) add ip's to both sides and change your default route ssh root@server -vNTw any:any
#Open a tunnel from 192.168.1.10's port 80 to your local port 2001 ssh -N -L2001:localhost:80 192.168.1.10
# To enable the ability to forward X11 windows to a machine logged in using SSH. This is great if you would like to run a graphical program from a remote computer on your local machine logged in with SSH. ssh -X user@remote-server
# Just connect to a remote server and get a shell # -p is needed, if remote SSH is not listining on # standard port (22) ssh -p 1234 user@remoteserver.com
# You can connect to the remote screen or tmux directly ssh user@host -t 'tmux a -t session_name||tmux new -s session_name'
# Kill stalled SSH session without closing any terminal client window or close the connection on virtual terminal itself. # Hit the keys in this order: Enter ~ . # Enter, tilde, dot
ssh -C user@server.com -C cat file > file # your_comment_here Speed up receiving data by compressing data in transit
# open a previously created tomb with this: $ sudo tomb open secret.tomb -k secret.tomb.key # close all tombs with this: $ tomb close # to create a tomb, do this: # 1. create a file of 100MB called secret.tomb $ sudo tomb dig -s 100 secret.tomb # 2. create a key-file called secret.tomb.key $ sudo tomb forge secret.tomb.key # 3. lock the tomb with the key-file $ sudo tomb lock secret.tomb -k secret.tomb.key