A Secure Shell (SSH) tunnel consists of an encrypted tunnel created through an SSH protocol connection. SSH tunnels are used to transfer unencrypted traffic over a network through an encrypted channel.SSH tunnels provide a means to bypass firewalls that prohibit certain Internet services. Provided your network or ISP allows outgoing connection on port 80 (http) you can connect to our SSH server and then create an SSH tunnel to forward a given port on your local machine to port 80 on our remote SSH server.SSH Tunnel is an alternative for OpenVPN but with higher throughput and speed.
Our SSH accounts can be used as SSH Socks proxy which are highly secure and also provide a very fast connection. Compared to standard Socks 5 proxies,SSH Socks in addition to providing you full anonymity also encrypts your connection with a AES-256 bit data encryption. Our SSH Socks proxy or tunnel accounts are available on shared high performance 17 fast and secure servers in 17 countries and all accounts comes with unlimited bandwidth and connections. Some SSH clients support dynamic port forwarding such as Putty that allows you to create a SOCKS 5 proxy. In this case users can configure their applications to use their local SOCKS proxy server. This gives the appearance that you are coming directly from us, and not your from home or school or work.
For MAC users, SSH Socks proxy can be setup very easily using an application called iSSH. It provides a quick and easy way to start an SSH connection to a remote computer. To see how this works and how to setup, please go to: http://www.anonyproz.com/issh.pdf