Use the SSH to build up the tunnel access to other computer can make the communication encrypted and secured, tested on the http service by using the SSH tunnel access, 1, use the wireshark to capture the data without the SSH tunnel, host as 192.168.0.103, remote server as 192.168.0.254 The data can be viewed, 2, […]