32 private links
If you connect to remote computers over the Internet, it is a pretty good chance you use some form of SSH or secure shell. On Linux or Unix you’ll use the ssh command. Same goes for Linux-lik…
Concerning about the features, we can list the following:
Theming and color schemes.
Configurable hotkey schemes.
GNU Screen style hotkeys available by default.
Full Unicode support including double-width characters.
Doesn’t choke on fast-flowing outputs.
Tab persistence on macOS and Linux.
Proper shell-like experience on Windows including tab completion (thanks, Clink!).
CMD, PowerShell, Cygwin, Git-Bash and Bash on Windows support.
Default Linux style hotkeys for copy (Ctrl+Shift+C) and paste (Ctrl+Shift+V).
Multi-platform support. It supports Windows, macOS and Linux.
Free and open source.
Like many people, you store sensitive information in your database. And like some, your database server is on a different host from one or more of your webservers. How do you secure the necessary network connections?
The obvious answer is SSL/TLS. But that requires you to a) use a custom MySQL binary, and b) manage yet another set of certificates. And it requires setting extra parameters when connecting to the database in your code.
A less obvious answer is to use the ssh's built-in port forwarding to tunnel the connection. Here's how.
Note that the commands and scripts in this document assume that you are connecting to a MySQL database named "db" on remotehost.com, port 3306, using username "dbuser" and password "PASS". You will need to change these values to match your own setup.