You forgot the worst 4-letter word of all

WORK

At 10:34 AM 4/25/2001 -0700, you wrote:
>Do you trust your isp?  Do you trust your mail server's ISP?  Do you trust 
>your isp's isp?  Do you trust echelon's ability to trace every packet that 
>is transmitted, even between my local server and my local workstation?
>
>
>This email does not contain the following words:
>terrorism, attack, drugs, terrorist, antigovernment, revolution, 
>manifesto, revolt..
>
>On Wed, Apr 25, 2001 at 09:49:02AM -0700, Rob Hudson wrote:
> > That works.  :)
> >
> > Should it be a concern?  Seems like Stallman thinks one shouldn't
> > worry about it.  Seems to me it is equivalent to telnetting, which is
> > considered bad b/c everything is in the clear.
> >
> > -Rob
> >
> > > On 20010425.0936, jakob said ...
> > >
> > > On Wed, 25 Apr 2001, Rob Hudson wrote:
> > > > I'm just polling for what options are available for using fetchmail
> > > > w/o sending the password in the clear.
> > > >
> > > > I'm using fetchmail on a Linux machine, and asking for the mail via a
> > > > POP protocol on a FreeBSD machine.
> > >
> > > Read the excellent Secure POP via SSH Mini-HOWTO, located at:
> > > http://www.linuxdoc.org/HOWTO/mini/Secure-POP+SSH.html
> > >
> > > It includes information on doing it in several POP3 situations, including
> > > fetchmail.
> > >
> > > In short, for general use run:
> > > ssh -C -f popserver -L 31337:popserver:110 sleep 5
> > >
> > > -C enables compression
> > > -f once established, fork to background
> > > -L forward local port 31337 to port 110 on remote server (popserver). Use
> > >    a high local port, so any user can create a socket (>1024)
> > >
> > > sleep 5 - sleep 5 seconds, I usually like to bump this up to 8 hours or
> > > so, so I can have my tunnel all day long
> > >
> > > hope this helps!
> > > jakob
> > >

Jim Darrough, ARS KI7AY
[EMAIL PROTECTED]
http://www.ki7ay.com

Reply via email to