|Main Archive Page > Month Archives > fedora-users archives|
Some time ago I was the on call admin for a critical system at a certain
large company. I wanted to fix problems from home. I checked with three
different guys in the computer security department before implementing
anything. I wouldn't want to do someting that would get me fired or
charged with a crime.
The computer security guys were somewhat arrogant, they basically said
if you can figure out a way around our firewalls, go ahead, but we won't
create a hole for you.
A couple of days later I had the remote access going and I showed them
how it worked. They were amazed, but just shrugged and said "cool!, Can
I have a copy of that script?"
Again - check around, don't do something that would get you in trouble.
In this economic climate don't take a chance and lose your job!
These days, I'm working for a small company and I make the policies, so
office computer setup
create script on your office computer to check home website for special
file (trigger file)
if not exists
sleep 5 minutes
ssh to home computer. ssh command uses options to open a reverse
tunnel on a special port
home computer setup
copy the public key from the office computer to .ssh/authorized-keys
create special file
start trying to access the special port. You can open multiple windows
on that port. One window may have to run a "keep alive" program.
-- users mailing list firstname.lastname@example.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines