Recently at our local (Phoenix) Free Software Stammtisch, we were talking about security. I was surprised to find that no one else realized you can ssh safely across a compromised host to another ...
Secure shell can overcome a number of networking deficiencies. Jack Wallen illustrates how you can use SSH port forwarding to create encrypted tunnels for remote and local forwarding. The ssh system ...