What is SSH tunneling?
SSH (Secure Shell Host) protocol is used to heighten computer security when working with Unix systems on the Internet. SSH uses several encryption algorithms of different reliability. The spread of SSH is also connected with the fact that a number of Linux-like OS’s (for example FreeBSD) include SSH server in their standard integration. To learn more information on this issue, please, visit http://openssh.org. SSH tunneling feature of SQL Manager is a means of ensuring secure connection to PostgreSQL servers when working over insecure connection channels. You can also use SSH tunnel to get access to the remote PostgreSQL servers when port 5432 is closed for external connections due to some reasons. The connection over SSH tunnel works in the following way. First a connection is established and authentication between SSH client built in SQL Manager and remote PostgreSQL server is performed. Then all incoming and outgoing information between the program and PostgreSQL server is transmitt
SSH (Secure Shell Host) protocol is used to heighten computer security when working with Unix systems on the Internet. SSH uses several encryption algorithms of different reliability. The spread of SSH is also connected with the fact that a number of Linux-like OS’s (for example FreeBSD) include SSH server in their standard integration. To learn more information on this issue, please, visit http://openssh.org. SSH tunneling feature of SQL Manager is a means of ensuring secure connection to MySQL servers when working over insecure connection channels. You can also use SSH tunnel to get access to the remote MySQL servers when port 3306 is closed for external connections due to some reasons. The connection over SSH tunnel works in the following way. First a connection is established and authentication between SSH client built in SQL Manager and remote MySQL server is performed. Then all incoming and outgoing information between the program and MySQL server is transmitted through SSH serve