1. The document discusses SSH, Telnet, and proxy servers. SSH provides encrypted connections over unsecured networks, while Telnet lacks encryption. Proxies act on behalf of users to access resources, with forward proxies providing external access through a firewall and reverse proxies providing internal access from outside. 2. It provides examples of Linux commands to switch users using SSH, copy a file between accounts using sudo, and set file permissions using chmod and chown.