On Mon, 2012-08-20 at 22:08 +0300, Lars Noodén wrote: > On 8/20/12 7:27 PM, lina wrote: > > On Monday 20,August,2012 11:15 PM, Lars Noodén wrote: > >> It looks like it is possible to use Tor as a proxy: > >> > >> http://www.howtoforge.com/anonymous-ssh-sessions-with-tor > >> > >> If this document is correct, it is very easy to set up. That would > >> obfuscate the ip number you are connecting from by adding a jump in the > >> middle. The target server would only see that last step. > > > > I followed the instruction from link, but during connection it showed me: > > > > [warn] Got SOCKS5 status response '4': host is unreachable > > /bin/bash: line 0: exec: connect: not found > > ssh_exchange_identification: Connection closed by remote host > [snip] > > The package connect-proxy contains the utility connect. That has to be > installed. You might also consider using Vidalia to manage Tor. > > Regards, > /Lars
I thought using tor was a joke :( or a hint, that too much security at some point really is too much. I don't have much knowledge about the Internet, but I'm sure tor in this case (IMO in any case) is idiotic. Sorry. I used tor myself, around the time of Suse 9.0 or 10.0?! dunno, just for surfing the web. It's not usable for serious work. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/1345490303.1285.78.camel@localhost.localdomain