[ref:http://www.afp548.com/Articles/security/sshtips.html]
One of the nice things about having access to SSH is that you can port-forward a connection through an SSH tunnel and know that your connection is reasonably secure compared to an open data stream.
Following the tips given in on afp548.com, I was able to easily get Timbuktu to run through the SSH tunnel and connect to my home OS X machine by doing the following in Terminal:
ssh [servername or IP] -l username -L 10660:127.0.0.1:407
authenticate the SSH connection and once you are in, switch over to Timbuktu and enter the following in the connection name:
localhost:10660
You should immediately be connected to your remote Timbuktu host as if you were connecting through standard TB2 ports.
You can do a lot more with this handy trick; read through the rest of the article and get a feel for what can be done.
Cheers.
One of the nice things about having access to SSH is that you can port-forward a connection through an SSH tunnel and know that your connection is reasonably secure compared to an open data stream.
Following the tips given in on afp548.com, I was able to easily get Timbuktu to run through the SSH tunnel and connect to my home OS X machine by doing the following in Terminal:
ssh [servername or IP] -l username -L 10660:127.0.0.1:407
authenticate the SSH connection and once you are in, switch over to Timbuktu and enter the following in the connection name:
localhost:10660
You should immediately be connected to your remote Timbuktu host as if you were connecting through standard TB2 ports.
You can do a lot more with this handy trick; read through the rest of the article and get a feel for what can be done.
Cheers.