{"id":16116,"date":"2024-03-27T08:00:00","date_gmt":"2024-03-27T07:00:00","guid":{"rendered":"https:\/\/www.tesseractechnologies.com\/ssh-proxy\/"},"modified":"2024-03-27T08:00:00","modified_gmt":"2024-03-27T07:00:00","slug":"ssh-proxy","status":"publish","type":"post","link":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/","title":{"rendered":"SSH Proxy"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<h3 class=\"wp-block-heading\" id=\"h-utilizzo-dei-proxy-ssh-per-un-accesso-sicuro-alle-risorse-di-rete\">Using SSH Proxies for Secure Access to Network Resources.<\/h3>\n\n\n\n<p><strong>TL;DR<\/strong><\/p>\n\n\n\n<p>In this article, we will explore the use of <strong>SSH proxies<\/strong> as a secure solution for remote access, especially when a VPN is not available. We will cover what SSH is, the benefits of SSH proxies, how to set up an SSH tunnel on Windows and Linux, using the SSH tunnel with Firefox, and using tools such as Proxifier to simplify routing traffic through proxies.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-cos-e-ssh\">What is SSH?<\/h4>\n\n\n\n<p><em>SSH (Secure Shell)<\/em> is a cryptographic protocol for establishing a secure connection over an unsecured network, typically the Internet. SSH provides a mechanism for remote access to systems and network resources in a secure manner by encrypting data transmitted during communication.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-a-cosa-serve-un-proxy-ssh\">What is an SSH Proxy for?<\/h4>\n\n\n\n<p>An <strong>SSH proxy<\/strong> acts as a secure intermediary between a user and a remote network. Major use cases include remote access to devices on unsecured networks, anonymous Internet browsing through encrypted tunnels, and bypassing geographic restrictions. Using an SSH proxy, an <em>encrypted tunnel<\/em> can be created to transmit data securely through an insecure network.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"501\" src=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/socks5.webp\" alt=\"socks5\" class=\"wp-image-15064\" style=\"width:566px;height:auto\" srcset=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/socks5.webp 860w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/socks5-300x175.webp 300w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/socks5-768x447.webp 768w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n<\/div>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-come-creare-un-tunnel-ssh-su-windows-utilizzando-putty\">How to Create an SSH Tunnel on Windows Using PuTTY<\/h4>\n\n\n\n<p><strong>\n  <a href=\"https:\/\/www.putty.org\/\">PuTTY<\/a>\n<\/strong> is one of the most popular SSH clients for Windows. Follow these steps to set up an SSH tunnel using PuTTY:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Start PuTTY<\/strong>: Enter the SSH server's IP address and port, then click \"Open.\"<\/li>\n\n\n\n<li><strong>Configure the Tunnel<\/strong>: In the \"SSH\" section of PuTTY, go to \"Tunnels.\" Specifies a source port for the tunnel and the destination address.<\/li>\n\n\n\n<li><strong>Start Session<\/strong>: Go back to the main screen and click \"Open\" to start the SSH session.<\/li>\n<\/ol>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"537\" src=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/putty-tunnel.webp\" alt=\"\" class=\"wp-image-15063\" style=\"width:367px;height:auto\" srcset=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/putty-tunnel.webp 605w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/putty-tunnel-300x266.webp 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n<\/div>\n\n\n<p>To configure a <em>SOCKS proxy<\/em>, go to \"Connection\" -&gt; \"Proxy\" and set the proxy type to \"SOCKS 5\" with the address \"localhost\" and the tunnel port.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-come-creare-un-tunnel-ssh-su-linux-dalla-shell\">How to Create an SSH Tunnel on Linux from the Shell<\/h4>\n\n\n\n<p>Use the following commands from the Linux shell to establish an SSH tunnel:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nssh -D &lt;porta_locale&gt; -f -C -q -N &lt;nome_utente&gt;@&lt;server_ssh&gt;\n<\/pre><\/div>\n\n\n<p>Where:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>-D &lt;porta_locale&gt;<\/code>: specifies the local port for the tunnel.<\/li>\n\n\n\n<li><code>-f<\/code>: starts SSH in the background.<\/li>\n\n\n\n<li><code>-C<\/code>: enables compression.<\/li>\n\n\n\n<li><code>-q<\/code>: disables the printing of debug messages.<\/li>\n\n\n\n<li><code>-N<\/code>: instructs SSH not to execute remote commands.<\/li>\n<\/ul>\n\n\n\n<p>To configure a <em>SOCKS5 proxy<\/em>, make sure that SOCKS configuration is enabled in the SSH client configuration file (<code>~\/.ssh\/config<\/code>).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-come-utilizzare-il-tunnel-ssh-socks5-con-firefox\">How to Use the SOCKS5 SSH Tunnel with Firefox<\/h4>\n\n\n\n<p>To route traffic through the SSH tunnel using Firefox, follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Open Firefox<\/strong>: Go to \"Settings\" -&gt; \"General\" -&gt; \"Network Connection\" -&gt; \"Settings.\"<\/li>\n\n\n\n<li><strong>Configure Proxy<\/strong>: Select \"Manually configure proxy.\" Enter \"localhost\" as the address and the tunnel port as the SOCKS port.<\/li>\n\n\n\n<li><strong>Save and Apply<\/strong>: Click \"OK\" to apply the settings.<\/li>\n<\/ol>\n\n\n\n<p>Now Firefox traffic will be routed through the SSH tunnel, ensuring a secure and anonymous connection.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-a-cosa-serve-proxifier\">What Is Proxifier Used For?<\/h4>\n\n\n\n<p><strong>\n  <a href=\"https:\/\/www.proxifier.com\/\">Proxifier<\/a>\n<\/strong> is a tool that simplifies application routing through proxies, including SOCKS proxies. Allows specific applications or all system traffic to be routed through configured proxies.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"526\" src=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-1024x526.webp\" alt=\"proxifier\" class=\"wp-image-15061\" srcset=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-1024x526.webp 1024w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-300x154.webp 300w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-768x394.webp 768w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-1536x788.webp 1536w, https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/proxifier-scaled.webp 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-come-utilizzare-proxifier-con-il-tunnel-ssh-creato\">How to Use Proxifier with SSH Tunnel Created<\/h4>\n\n\n\n<p>Follow these steps to configure Proxifier with the SSH tunnel:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Start Proxifier<\/strong>: Open Proxifier and go to \"Proxies\" -&gt; \"Add Proxy\" to add your SSH tunnel as a SOCKS5 proxy.<\/li>\n\n\n\n<li><strong>Configure Applications<\/strong>: Go to \"Rules\" -&gt; \"Proxification Rules\" to specify which applications should use the SSH proxy.<\/li>\n\n\n\n<li><strong>Apply Settings<\/strong>: Save the settings and start the desired applications.<\/li>\n<\/ol>\n\n\n\n<p>Now, configured applications will use the SSH tunnel as a SOCKS5 proxy, providing secure and anonymous access to network resources.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-utilizzo-di-proxychains-su-linux\">Using Proxychains on Linux<\/h4>\n\n\n\n<p>To use <em>proxychains<\/em> on Linux and route network traffic through an SSH proxy, follow these steps. First, make sure you have installed <em>proxychains<\/em> on your system through the package manager of the Linux distribution you are using. Once installed, open a terminal and edit the <em>proxychains<\/em> configuration file usually located at <code>\/etc\/proxychains.conf<\/code> using a text editor such as <code>nano<\/code> or <code>vi<\/code>. Within this file, find the section on SOCKS proxies and add the IP address and port of the remote SSH server you wish to use as a proxy. Make sure the format is correct, for example:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nsocks5 127.0.0.1 9050\n<\/pre><\/div>\n\n\n<p>Once the <em>proxychains<\/em> file is configured, you can run any command preceded by the command <code>proxychains<\/code>, which will route network traffic through the specified SSH proxy. For example, to run the command <code>wget<\/code> through the SSH proxy, type:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: plain; title: ; notranslate\" title=\"\">\nproxychains wget &lt;URL&gt;\n<\/pre><\/div>\n\n\n<p>In this way, <em>proxychains<\/em> will start the SSH tunnel specified in the configuration file and route the <code>wget<\/code> command traffic through it, allowing secure and anonymous access to network resources. Remember that you must have access to the remote SSH server and have valid login credentials to use this technique.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-conclusioni\">Conclusions<\/h4>\n\n\n\n<p>In conclusion, using <strong>SSH proxies<\/strong> offers a secure way to access network resources, especially in the absence of a VPN. These allow encrypted tunnels to be created to transmit data securely through unsecured networks. With tools such as PuTTY, Firefox and Proxifier, you can easily configure and manage SSH proxies, providing secure and anonymous access to network resources, even on unsecured networks. Considering the importance of communication security in an increasingly threatening digital environment, the use of SSH proxies is an essential solution to protect sensitive information and ensure online privacy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd10 We explore SSH proxies as a secure solution for remote access, an effective alternative to VPNs. Learn how to set up an SSH tunnel on Windows and Linux to protect your data on unsecured networks. Join the discussion and learn more about the importance of online safety. #InformationSecurity #SSH #VPNAlternative<\/p>\n","protected":false},"author":4,"featured_media":16121,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[223,225],"tags":[224,226,221,227],"class_list":["post-16116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","category-networks","tag-cybersecurity-en","tag-linux-en","tag-protocols","tag-tunneling-en","post-wrapper"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.9 (Yoast SEO v22.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SSH Proxy - Tesseract Technologies<\/title>\n<meta name=\"description\" content=\"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SSH Proxy\" \/>\n<meta property=\"og:description\" content=\"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\" \/>\n<meta property=\"og:site_name\" content=\"Tesseract Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-27T07:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"896\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Gianmarco Bonan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gianmarco Bonan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\"},\"author\":{\"name\":\"Gianmarco Bonan\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/5fe4c6a41297dd550739c3640495d54a\"},\"headline\":\"SSH Proxy\",\"datePublished\":\"2024-03-27T07:00:00+00:00\",\"dateModified\":\"2024-03-27T07:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\"},\"wordCount\":836,\"publisher\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp\",\"keywords\":[\"cybersecurity\",\"linux\",\"protocols\",\"tunneling\"],\"articleSection\":[\"Cybersecurity\",\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\",\"url\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\",\"name\":\"SSH Proxy - Tesseract Technologies\",\"isPartOf\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp\",\"datePublished\":\"2024-03-27T07:00:00+00:00\",\"dateModified\":\"2024-03-27T07:00:00+00:00\",\"description\":\"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage\",\"url\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp\",\"contentUrl\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp\",\"width\":896,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tesseractechnologies.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SSH Proxy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#website\",\"url\":\"https:\/\/www.tesseractechnologies.com\/en\/\",\"name\":\"Tesseract Technologies\",\"description\":\"Rivoluzioniamo il modo di fare business, un byte alla volta.\",\"publisher\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tesseractechnologies.com\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#organization\",\"name\":\"Tesseract Technologies\",\"url\":\"https:\/\/www.tesseractechnologies.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2017\/04\/tesseract-technologies-pbx.png\",\"contentUrl\":\"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2017\/04\/tesseract-technologies-pbx.png\",\"width\":3120,\"height\":736,\"caption\":\"Tesseract Technologies\"},\"image\":{\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/5fe4c6a41297dd550739c3640495d54a\",\"name\":\"Gianmarco Bonan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e78d7979250a6d52eeb9fdfae294a75d2969c785e9127a922910b7aa0763a5cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e78d7979250a6d52eeb9fdfae294a75d2969c785e9127a922910b7aa0763a5cf?s=96&d=mm&r=g\",\"caption\":\"Gianmarco Bonan\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SSH Proxy - Tesseract Technologies","description":"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/","og_locale":"en_US","og_type":"article","og_title":"SSH Proxy","og_description":"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.","og_url":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/","og_site_name":"Tesseract Technologies","article_published_time":"2024-03-27T07:00:00+00:00","og_image":[{"width":896,"height":512,"url":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp","type":"image\/webp"}],"author":"Gianmarco Bonan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Gianmarco Bonan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#article","isPartOf":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/"},"author":{"name":"Gianmarco Bonan","@id":"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/5fe4c6a41297dd550739c3640495d54a"},"headline":"SSH Proxy","datePublished":"2024-03-27T07:00:00+00:00","dateModified":"2024-03-27T07:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/"},"wordCount":836,"publisher":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/#organization"},"image":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp","keywords":["cybersecurity","linux","protocols","tunneling"],"articleSection":["Cybersecurity","Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/","url":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/","name":"SSH Proxy - Tesseract Technologies","isPartOf":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage"},"image":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp","datePublished":"2024-03-27T07:00:00+00:00","dateModified":"2024-03-27T07:00:00+00:00","description":"Learn how to browse safely with SSH proxies: an alternative to VPN for remote access to network resources.","breadcrumb":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#primaryimage","url":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp","contentUrl":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2024\/03\/tunnel-socks5.webp","width":896,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.tesseractechnologies.com\/en\/ssh-proxy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tesseractechnologies.com\/en\/"},{"@type":"ListItem","position":2,"name":"SSH Proxy"}]},{"@type":"WebSite","@id":"https:\/\/www.tesseractechnologies.com\/en\/#website","url":"https:\/\/www.tesseractechnologies.com\/en\/","name":"Tesseract Technologies","description":"Rivoluzioniamo il modo di fare business, un byte alla volta.","publisher":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tesseractechnologies.com\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.tesseractechnologies.com\/en\/#organization","name":"Tesseract Technologies","url":"https:\/\/www.tesseractechnologies.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2017\/04\/tesseract-technologies-pbx.png","contentUrl":"https:\/\/www.tesseractechnologies.com\/wp-content\/uploads\/2017\/04\/tesseract-technologies-pbx.png","width":3120,"height":736,"caption":"Tesseract Technologies"},"image":{"@id":"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/5fe4c6a41297dd550739c3640495d54a","name":"Gianmarco Bonan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tesseractechnologies.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e78d7979250a6d52eeb9fdfae294a75d2969c785e9127a922910b7aa0763a5cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e78d7979250a6d52eeb9fdfae294a75d2969c785e9127a922910b7aa0763a5cf?s=96&d=mm&r=g","caption":"Gianmarco Bonan"}}]}},"_links":{"self":[{"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/posts\/16116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/comments?post=16116"}],"version-history":[{"count":0,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/posts\/16116\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/media\/16121"}],"wp:attachment":[{"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/media?parent=16116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/categories?post=16116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tesseractechnologies.com\/en\/wp-json\/wp\/v2\/tags?post=16116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}