tssh-tunnels: add PS1 to code snippets meant for terminal - adamsgaard.dk - my academic webpage
(HTM) git clone git://src.adamsgaard.dk/adamsgaard.dk
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
(DIR) commit db3807a0b7a4617410c13e4b34a262dcb02a879a
(DIR) parent 3d728665c7ec2a79d7098c5a3794892ec9797054
(HTM) Author: Anders Damsgaard <anders@adamsgaard.dk>
Date: Thu, 17 Dec 2020 15:23:54 +0100
ssh-tunnels: add PS1 to code snippets meant for terminal
Diffstat:
M pages/007-ssh-tunnels.html | 8 ++++----
M pages/007-ssh-tunnels.txt | 8 ++++----
2 files changed, 8 insertions(+), 8 deletions(-)
---
(DIR) diff --git a/pages/007-ssh-tunnels.html b/pages/007-ssh-tunnels.html
t@@ -60,7 +60,7 @@ it is easy to create a tunnel that connects the outside computer
with the internal network via SSH. The following command creates
the tunnel when executed on the outside computer:</p>
-<pre><code>ssh -D 1337 -C -N company-domain.com
+<pre><code>$ ssh -D 1337 -C -N company-domain.com
</code></pre>
<p>Note that the port number specified with the -D option should be
t@@ -101,7 +101,7 @@ reverse ssh tunnel and utilize it in a similar manner as in the
previous scenario. On the office computer, create a reverse tunnel
to the outside server:</p>
-<pre><code>ssh -f -N -R 10022:localhost:22 outside-server.com
+<pre><code>$ ssh -f -N -R 10022:localhost:22 outside-server.com
</code></pre>
<p>As long as the above command runs, you can initiate new SSH connections
t@@ -118,13 +118,13 @@ on the outside laptop:</p>
<p>With the above configuration, it is very easy to establish a SSH
connection from the outside laptop to the office computer:</p>
-<pre><code>ssh office_computer
+<pre><code>$ ssh office_computer
</code></pre>
<p>As in the previous example, you can use this setup to create a SSH
tunnel all the way from the outside laptop to the office computer:</p>
-<pre><code>ssh -D 1337 -C -N office_computer
+<pre><code>$ ssh -D 1337 -C -N office_computer
</code></pre>
<p>Again, this creates a SOCKSv5 proxy that you can use for tunneling
(DIR) diff --git a/pages/007-ssh-tunnels.txt b/pages/007-ssh-tunnels.txt
t@@ -58,7 +58,7 @@ it is easy to create a tunnel that connects the outside computer
with the internal network via SSH. The following command creates
the tunnel when executed on the outside computer:
- ssh -D 1337 -C -N company-domain.com
+ $ ssh -D 1337 -C -N company-domain.com
Note that the port number specified with the -D option should be
greater than 1000 when running as an unpriviledged (non-root) user.
t@@ -97,7 +97,7 @@ reverse ssh tunnel and utilize it in a similar manner as in the
previous scenario. On the office computer, create a reverse tunnel
to the outside server:
- ssh -f -N -R 10022:localhost:22 outside-server.com
+ $ ssh -f -N -R 10022:localhost:22 outside-server.com
As long as the above command runs, you can initiate new SSH connections
from the outside server to the office computer with the command
t@@ -112,12 +112,12 @@ on the outside laptop:
With the above configuration, it is very easy to establish a SSH
connection from the outside laptop to the office computer:
- ssh office_computer
+ $ ssh office_computer
As in the previous example, you can use this setup to create a SSH
tunnel all the way from the outside laptop to the office computer:
- ssh -D 1337 -C -N office_computer
+ $ ssh -D 1337 -C -N office_computer
Again, this creates a SOCKSv5 proxy that you can use for tunneling
network traffic from the outside laptop to the closed network. It