Install XMing
- http://sourceforge.net/projects/xming/files/Xming-mesa/6.9.0.31/Xming-mesa-6-9-0-31-setup.exe/download
Additional Notes: XServer_Putty_Windows7-ECE.pdf

Technical notes, and other ideas.
Install XMing
Additional Notes: XServer_Putty_Windows7-ECE.pdf
Refer: http://www.mattlestock.com/
Software goodie: plink.exe
For episode 416 of HAK5, I showed how easy it really is to tunnel all kinds of traffic from HTTP, FTP, and more over a secure SSH Socks proxy.
What you’ll need is:
How proxies work
In a nutshell, what you’re doing with a proxy is setting up a middle-person (no not a pineapple, but close) between you and the internet. Using the proxy, your browser hands off web page requests to the proxy server, which handles the request and fetches the page for you from the internet. The web site actually thinks the request is coming from the proxy server, not your computer, which is a good way to obscure your originating IP address.
Additionally, the connection between your computer and the proxy happens over SSH, an encrypted protocol. This prevents wifi sniffers from seeing what you’re doing online.
Start your SSH tunnel
So you’ve got your ssh server setup at your house or workplace. Great! To connect to it we’re going to setup a local proxy server on your client that you’ll be browsing the internet from, which will then “tunnel” web traffic from your local machine to the remote server over SSH. The command to run on your linux / mac client in a terminal window is : ssh -ND 9999 you@example.com
For Windows it’s as simple as browsing to the directory you saved plink to and running
plink.exe -N -D 9999 you@example.com
Of course, you’re going to replace the you with your username on your SSH server and example.com with your server domain name or IP address. What that command does is accept requests from your local machine on port 9999 and hands that request off to your server at example.com for processing.
When you execute either of those commands, you’ll be prompted for your password. After you authenticate, nothing will happen. The -N tells ssh not to open an interactive prompt, so it will just hang there, waiting. That’s exactly what you want.
Set Firefox to use SOCKS proxy
Once your proxy’s up and running, configure Firefox to use it. From Firefox’s Tools menu, choose Options, and from the Advanced section choose the Network tab. Next to “Configure how Firefox connects to the Internet” hit the “Settings” button and enter the SOCKS information, which is the server name (localhost) and the port you used (in the example above, 9999.)
Save those settings and hit up a web page. When it loads, visit http://www.ipchicken.com to see if it’s using your remote ssh server to tunnel traffic. If you are, GOLDEN!
If you feel there’s something I’ve missed, hit me up here (http://www.mattlestock.com)
PS: Remember that you’ll need to open your firewall a bit by cracking open port 9999 on your local machine and port 22 on your server for SSH.
Refer: LifeHacker
Ubuntu 8.10
sudo apt-get install ssh
Stop the server
sudo /etc/init.d/ssh stop
Start the server
sudo /etc/init.d/ssh start
Restart the server
sudo /etc/init.d/ssh restart
You probably want to change security for users allowed SSH login and disable root from SSH login
Edit this file:
vi /etc/ssh/sshd_config
Un-comment the following line:
PermitRootLogin no
Now restart the SSH server
/etc/init.d/sshd restart
SSH with Public Key
Refer: Cyberciti
Idea: Install Ubuntu in Virtual PC hang outside firewall and use for SSH uninstall samba and perhaps a whole bunch of other stuff too.
Use GuardDog to install a firewall, and lockdown everything except SSH. Tested inside proxy, and it was necessary to enable Internet, HTTP, HTTPS and also Network, Windows Networking (NETBIOS). This seemed to do a good job of locking down pretty much everything.