Berkeley CSUA MOTD:Entry 11716
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/03 [General] UID:1000 Activity:popular
4/3     

2004/1/8 [Computer/SW/Security] UID:11716 Activity:kinda low
1/7     I know soda runs a browser based ssh login scheme but I've never
        had to use it so I know nothing about it.  Now for various unimportant
        reasons I need the same thing running on my home machine.  What is
        the name of the software that soda uses for this and where can I get
        it?  Thanks!
        \_ Easier is just download putty ssh when you need it.
        \_ Google for "mindterm", or just grab it from soda. There's different
            versions.  It is  a 'ssh1' client implemented in java. -ERic
            URL is http://www.mindbright.se/mindterm
        \_ and an excellent FAQ for getting to systems from behind networks
           with firewalls administered by idiot/bofh network admins:
           http://www.tldp.org/HOWTO/Firewall-Piercing
        \_ It sounds to me like he is looking for server software, not a client.
        \_ OP here to clarify: a friend who recently can ssh out from a corp
        \_ OP here to clarify: a friend who recently who ssh out from a corp
           network no longer can.  they only have some sort of http proxy to
           the public net now.  I'm looking for a way for them to abuse the
           corp http proxy to ssh to remote hosts outside the corp net.  I
           thought the soda solution was running some sort of proxy abusing
           ssh client which is why I asked about that.
           \_ I could never get mindterm to work right with http proxies.
              Mindterm2 has no problems, though.  Run it as a local jarfile
              if you have funky security settings.  -John
           ssh client which is why I asked about that.
              \_ Thanks!
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/04/03 [General] UID:1000 Activity:popular
4/3     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/9/24-11/7 [Computer/SW/Languages, Computer/SW/Unix] UID:54484 Activity:nil
9/24    How come changing my shell using ldapmodify (chsh doesn't work) doesn't
        work either? ldapsearch and getent show the new shell but I still get
        the old shell on login.
        \_ Scratch that, it magically took my new shell now. WTF?
           \_ probably nscd(8)
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
Cache (1247 bytes)
www.mindbright.se/mindterm -> www.appgate.com/products/5_MindTerm/
It contains an extremely powerful and easy to use SSH client that provides advanced features such as tunneling support, file transfer GUI as well as support for HTTP and SOCKS proxies. MindTerm client also includes an integrated xterm/vt100 terminal emulator. It has the ability to run both a standalone application and as an applet. Typical applications SSH Host access MindTerm is very well suited for technically skilled users in situations where you have an open network architecture with direct SSH based host and server access. Zero installation requirements With the Applet version of MindTerm its possible to run a secure terminal session from a Java enabled web browser, eg when traveling and on lent computers. OEM integration Integration into other products to achieve java based secure terminal network access and/or file transfer. OEM customers MindTerm source code has a well defined API and the MindTerm library is easy to use and has successfully been integrated into many third-part products. If you have a more protected network and users with less technical skills you may want look into our other SSH based product, the AppGate Security Server. Below you find a comparison between MindTerm and other AppGate SSH based products.
Cache (569 bytes)
www.tldp.org/HOWTO/Firewall-Piercing -> tldp.org/HOWTO/Firewall-Piercing/
Directions for using ppp over ssh , telnet or whatever, so as to do achieve transparent network connection accross a firewall. Applies to friendly VPN construction as well as to piercing unfriendly firewalls. Stuff 11 DISCLAIMER 12 Legal Blurp 13 Looking for a maintainer 14 Credits 15 Latest versions 2. Introduction 21 Foreword 22 Security issues 23 Other requirements 24 Downloading software 3. Understanding the problem 31 Giving names to things 32 The main problem 33 The secondary problem 4. Secure solution: piercing using ssh 41 Principle 42 A sample session 5.