Berkeley CSUA MOTD:Entry 21100
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2001/4/25 [Computer/SW/Security] UID:21100 Activity:high
4/25    Where can I get the web based ssh stuff soda is running?  I want to do
        the same thing at home to get around some workplace lame network setup
        issues.  Thanks.
        \_ /usr/local/www/htdocs/ssh
        \_ or dl it  from mindbright yourself:
                http://www.mindbright.com./products/mindterm
        \_ you do realize that it's just an ssh client in java, right?  it's
           not ssh over http or anything, so if your network doesn't allow
           ssh packets to go through, it won't help you.
           \_ That can easily be remedied by having sshd listen to a port
              that the firewall allows instead of 22.
                \_ Ok, I dug further into it (I'm remote so this is all through
                   email with the other person) and it appears they're doing
                   http proxying.  Nothing goes directly out.  The workstation
                   IP is 10.x.y.z.  There is a unix box though, so I'm having
                   them install sshd on that, running it on a high port, and
                   then doing ssh NT->unix->home.  The unix box has a real IP
                   but only runs telnetd right now.  You were right about the
                   mindbright stuff not being what I wanted.
           \_ Hmmm... didn't know that.  I'll have to check it out.  Thanks
              for all the links and paths.
        \_ Ok, I found httptunnel.  There's source, RPMs and a windows binary.
           Thanks for the help and info.  Anyone bored is welcome to delete
           this thread.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
Cache (1247 bytes)
www.mindbright.com./products/mindterm -> www.appgate.com/products/5_MindTerm/
It contains an extremely powerful and easy to use SSH client that provides advanced features such as tunneling support, file transfer GUI as well as support for HTTP and SOCKS proxies. MindTerm client also includes an integrated xterm/vt100 terminal emulator. It has the ability to run both a standalone application and as an applet. Typical applications SSH Host access MindTerm is very well suited for technically skilled users in situations where you have an open network architecture with direct SSH based host and server access. Zero installation requirements With the Applet version of MindTerm its possible to run a secure terminal session from a Java enabled web browser, eg when traveling and on lent computers. OEM integration Integration into other products to achieve java based secure terminal network access and/or file transfer. OEM customers MindTerm source code has a well defined API and the MindTerm library is easy to use and has successfully been integrated into many third-part products. If you have a more protected network and users with less technical skills you may want look into our other SSH based product, the AppGate Security Server. Below you find a comparison between MindTerm and other AppGate SSH based products.