{"id":206,"date":"2005-09-12T20:13:09","date_gmt":"2005-09-13T01:13:09","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2005\/09\/12\/setting-up-a-socks-proxy-using-ssh\/"},"modified":"2022-06-16T15:17:55","modified_gmt":"2022-06-16T09:47:55","slug":"setting-up-a-socks-proxy-using-ssh","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/09\/setting-up-a-socks-proxy-using-ssh\/","title":{"rendered":"Setting up a SOCKS Proxy using SSH"},"content":{"rendered":"\n<p>This article explains how we can setup a SOCKs proxy via SSH which lets you surf the internet securely from unsecure locations.<\/p>\n<p>Excerpt:<\/p>\n<p>Open PuTTY (see the list of requirements above for a URL). You should be greeted with a configuration screen. First, you will enter the hostname or IP address of the SSH server. Type in a name for your connection settings in the box below \u00e2\u20ac\u0153Saved Sessions\u00e2\u20ac\u009d, and click the Save button.<\/p>\n<p>Now you need to look at the tree of options to the left; expand the SSH tree, and select \u00e2\u20ac\u0153Tunnels\u00e2\u20ac\u009d. Enter 4567 (or any port number above 1024) in the Source Port area, and click the Dynamic radio button to select it. Leave the Destination field blank, and click \u00e2\u20ac\u0153Add\u00e2\u20ac\u009d.<\/p>\n<p>Now go back to the Session tree (very top of the left section), and save again.<\/p>\n<p>You will be prompted to enter a username, which is the username of your shell account. Type that in, hit enter, and then type in your password when it prompts you.<\/p>\n<p>Original Article:<br \/>\n<a href=\"http:\/\/security.the-engine.org\/documents\/31\/secure-surfing-e-mail-and-more-with-ssh\">Security Engine: Secure surfing SSH<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explains how we can setup a SOCKs proxy via SSH which lets you surf the internet securely from unsecure locations. Excerpt: Open PuTTY (see the list of requirements above for a URL). You should be greeted with a configuration screen. First, you will enter the hostname or IP address of the SSH server. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"","activitypub_status":"","footnotes":""},"categories":[19,17,2],"tags":[],"class_list":["post-206","post","type-post","status-publish","format-standard","hentry","category-computer-security","category-security-tutorials","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":5024,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/206\/revisions\/5024"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}