Ok, thanks to Pat I will now explain something for all you people sitting behind restrictive Firewalls that don't want you to communicate with the outside :)

First of all: My guess would be that doing that stuff would be a reason for getting yourself fired because there usually is some security reason behind all that firewall stuff —> Don't do it!

And now to the fun part:JPG title=";01_default_putty.JPG">

First of all, you get yourself Putty

When starting it it will probably look something like this:

01_default_putty.JPG

The first thing you do is entering the host name of a shell to connect to (universities often allow ssh access to their students, so do some webhosting providers):

02_putty_hostname.JPG

Now go to the Tunneling Section of the SSH Tree:

03_putty_ssh_tunnel_settings.JPG

In that part of putty, you'll now enter a local port (I just took 31337 because it looks cool ;D) and change the Destination to "Dynamic";

04_dynamic_enabled.JPG

Now click the "Add Button";

05_add_button.JPG

and it should look something like this:

05_added.JPG

Next thing you do is clicking on the "Open"; Button at the bottom of putty.

Most probably, that window will pop up:

06_security_alert.JPG

Klick "Yes"; (or in my case: "Ja";)

In the following window, just enter the username and password to your shell:

07_login.JPG

And you're done :D

Now you can tell every application you'd like to use the SSH Tunnel to simply use the SOCKS Proxy running on your localhost on port 31337 (in my case)

Comments