Tagged articles
5 articles
Page 1 of 1
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jan 13, 2025 · Operations

Using FRP for Intranet Penetration and Flexible Port Mapping – A Practical Guide

This article explains the limitations of existing intranet penetration tools, presents a custom SSH port‑mapping script, and provides a step‑by‑step tutorial on deploying FRP (frps and frpc), configuring tunnels, managing services with systemd, and verifying port forwarding through the FRP dashboard.

SSH Tunnelfrpintranet penetration
0 likes · 13 min read
Using FRP for Intranet Penetration and Flexible Port Mapping – A Practical Guide
Liangxu Linux
Liangxu Linux
May 27, 2023 · Information Security

10 Essential Methods to Secure SSH Connections on Linux

This guide presents ten practical techniques for establishing secure SSH connections on Linux, covering password authentication, key‑based login, tunnels, SCP/SFTP file transfers, SSH agent, keychain, SOCKS proxy, remote desktop, and port forwarding, each with command examples and usage notes.

LinuxSFTPSSH
0 likes · 5 min read
10 Essential Methods to Secure SSH Connections on Linux
ITPUB
ITPUB
Mar 22, 2016 · Operations

Build a Secure Proxy Server on AWS with Squid and SSH Tunneling

This guide walks you through creating an AWS EC2 instance, installing and configuring Squid as a proxy, restarting the service, setting up local proxy settings, and securing the connection with an SSH tunnel for encrypted traffic.

AWSLinuxProxy
0 likes · 5 min read
Build a Secure Proxy Server on AWS with Squid and SSH Tunneling