jfruh writes: "If you have to administer a *nix computer remotely, you hopefully ditched Telnet for SSH years ago. But you might not know that this tool does a lot more than offer you a secured command line. These 16 tips will help you do everything from detect man-in-the-middle attacks (how are you supposed to know if you should accept a new hosts public key, anyway?) to evading restrictions on Web surfing."
"Call immediately. Time is running out. We both need to do something
monstrous before we die."
-- Message from Ralph Steadman to Hunter Thompson