Just trying to get this straight:
ssh -L 127.0.0.1:3390:<remote machine ip>:3389
In effect you create a secure ssh connection to the <remote machine ip> and then you tunnel an RDP connection through that ssh session, thereby making your RDP connection bulletproof secure against sniffing? Is that correct?
(I assume this requires a sshd server/daemon running on the local machine, correct? I haven't found a good sshd server for windows yet. I haven't looked at Cygwin much).
Tell me more about password sniffing during RDP login. Isn't Microsoft smart enough to make RDP login session encrypted? Oh, wait, they're not!