Use SSH
Provides transparent encryption/compression
Propagates X access controls
Tunnel through firewalls
27 of 30