Arrange proof of the following on the screen:
* # have configured sshd to allow connections over a non default port.* # have logged in to a VM using public key authentication* # have scp'd and sftp'd files to a VM.* # have tunneled Xwindows applications through ssh* # have tunneled http through firewall using ssh* # have secured ssh against root access
== Preparing for the Quizzes ==