2013-08-27 02:34:36 +02:00
|
|
|
# To ssh via pem file (which normally needs 0600 permissions):
|
|
|
|
ssh -i /path/to/file.pem user@example.com
|
|
|
|
|
2013-08-28 14:15:50 +02:00
|
|
|
# To connect on an non-standard port:
|
|
|
|
ssh -p 2222 user@example.com
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# To execute a command on a remote server:
|
2013-08-11 21:37:11 +02:00
|
|
|
ssh -t user@example.com 'the-remote-command'
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# To tunnel an x session over SSH:
|
2013-08-11 21:37:11 +02:00
|
|
|
ssh -X user@example.com
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# To launch a specific x application over SSH:
|
2013-08-11 21:37:11 +02:00
|
|
|
ssh -X -t user@example.com 'chromium-browser'
|
|
|
|
|
2013-12-03 21:20:11 +01:00
|
|
|
# To create a SOCKS proxy on localhost and port 9999
|
|
|
|
ssh -D 9999 user@example.com
|
|
|
|
|
2014-03-27 15:44:06 +01:00
|
|
|
# -X use an xsession, -C compress data, "-c blowfish" use the encryption blowfish
|
|
|
|
ssh user@example.com -C -c blowfish -X
|
|
|
|
|
2013-08-22 03:34:11 +02:00
|
|
|
# For more information, see:
|
|
|
|
# http://unix.stackexchange.com/q/12755/44856
|