Guardster and SSH Tunneling

Discussion in 'privacy technology' started by Neshco, Apr 12, 2011.

Thread Status:
Not open for further replies.
  1. Neshco

    Neshco Registered Member

    Apr 12, 2011
    Dear friends,
    ill be very greatfull to anyone for any answer about configuring Guardster, and why they discourage potential buyers of their product because of complexity of configuration?! Take a look here: (Please execuse me because of my Tarzan English).
    Can I (as a advanced PC user) configure PC computer to work safe thorough this service o_O
    As I understand I need client, paid subscription, and to configure browser (or some other application that i use) to go through that tunnel?
    Can You just link me on right thread about this, to try not waste Your time.
    Thank You in advance.
  2. box750

    box750 Registered Member

    Nov 11, 2008
    The configuration is the same than the Cotse SSH tunnel service, it is the same technology.

    Tutorial for MAC, Windows and Linux here:

    It isn't difficult really, I have used it in the past, you just need to read the instructions carefully which is time consuming but not hard to do. If you use Windows it helps if you have used PuTTY in the past, you might want to use KiTTY instead, it has more features and it will not affect anything.

Similar Threads
  1. Lyx
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.