Sokolov's twiter! RSS Лента
everythg | browser | program |
Scientists have found the key to recreating the human brain? Scientists have found the key to recreating the human brain?
If you want to build a computer on what that image and likeness, then in that case you have to copy it exactly.... [2017-03-12]

 Scientists: the human brain unique Scientists: the human brain unique
People say, "our brains work differently, but nevertheless they are unique," and at this stage of the tests, a team of scientists from the University Carnegie Mellon has proven that it is literally so.... [2016-11-20]

Scientists from MIT have made sensor-tablet Scientists from MIT have made sensor-tablet
Have you ever been at a reception at the therapist? The doctor first takes the Stethoscope and starts to listen to your heart and lungs, for the presence of a heart murmur or rales in the lungs, if not, then the doctor ex... [2016-01-09]

It Appears to use smartphones unhealthy! It Appears to use smartphones unhealthy!
Previously, not one physician or group of physicians so definitely not claimed to use smartphones not very desirable. There have only been warnings about that.... [2015-03-06]

teleshema - Free operating instructions of consumer electronics

Create a Tunnel with SSH encryption.

Create a Tunnel with SSH encryption. Today I will tell you about one very simple way to maintain your information secret. It is no secret that all browsers gather information about you and you can use all kinds of programs interceptors to track where you go on the network Intenet. At the level of local provider is to make pairs of trivia. But it did not seem an easy task let me tell you how easy it is to encrypt your data until IP spoofing. The
IN General, all realized that we needed to hide, not for the reason that you scornicesti in the network, and due to the fact that everyone in this world is trying to extract information about another and in the future to use it for the benefit of their own enrichment. From these we will hide in the tunnel.
What is a tunnel This connection between two computers via SSH through separately specified port with password login. How are you It became interesting. About how to create a tunnel in the world wide web written a lot, but few people have spent as much time as I have written before today more clear on this topic. All write and say that everything is simple and pow blunder. But I read and it seems that people either just blows stuff about the other tunnel, or it was written in a drunken stupor. Sometimes articles about the tunnel and what that program is and what the hell else is there wedged information, otherwise the intermediate software. Begins "Kettle" to configure a tunnel and gets himself into the wormhole and he does not even account or anything. Just you and some articles were confused earlier. I benefit from it or what, except that you will like my article and you on it answer:)
AND so! Download the program MyEntunnel. You can download it here This is a program which will create the beginning of the tunnel on your home computer with encryption support shh. I mean from the data you already will leave compressed and encrypted. And it is a clear to start to increase the speed of the Internet.
Now we need hosting that supports SSH/ certainly Better to buy some cheap hosting and it has to create a tunnel. But to ensure that you have travelled dashing enough for Russia to create a free account with this service from any host. Then, after registration, the hosting company will send you everything you need, login, access point (server) and password.
now You do not need any of Putti and all sorts of tutti, third-party software. Everything you have, except for one thing... To create the tunnel, but to integrate it with the Fox just does not work. To do this, you shake Adon FoxyProxy and put it in the browser. I do not understand why, but sometimes this Adona, though you stupidly put the access point to the internal entrance to the tunnel, still the browser does not go.... You will see that everything works, and can be monitored by the firewall, but the sites will not be loaded.
When you Adon, get and mount it as I write below, we will all just work without any turbulence. So, you have downloaded and installed the tunnel, lock glows in the Trey green, and the tabs and see something I will post. The beginning of the tunnel works and the end too. Now combine this with a browser. As shown in the figure prescribed then and there. Now go to the browser and turn on the option to proxy the connection. That is all you need for this operation. After you create and everything will work, go to the address on the website where you can check your privacy. And there protectice your SSH sure you will just see the difference between all those proxicam that the public lying around in piles. Your proxy tunnel will be much faster. Good luck! If you like my article, can copy, but please put a link to my blog. Good luck.

<<<< Back >>>>

All about that there is best in the world of the electronics!