On 4/2/06, Niklaus <[EMAIL PROTECTED]> wrote: > > what problem are you really trying to solve?
really, what problem are you trying to solve? the fact that you have untrusted users? > I understand the tunnelling through ssh part. > Can you explain what reverse telnet is . I don't get it. assume have an http proxy listening on 127.0.0.1 on your machine. assume you've disabled port forwarding in sshd_config so i can't tunnel to my proxy. i then change my proxy program to i connect back to a listener (netcat?) on my remote machine at which point i have a tcp connection through which i can forward my http requests to make them look like they're coming from your box. this sort of trick is easy to whack together... probably 10 or 15 minutes if you're ripping code straight out of "learning perl" without knowing what you're doing. no doubt there's stuff in ports that can be used too. CK -- GDB has a 'break' feature; why doesn't it have 'fix' too?