If you are not averse to having Python installed the remote computer, and can live without UDP, you could give Sshuttle a try: https://github.com/apenwarr/sshuttle Works well for forwarding more than just a few ports - i.e. a whole network - (assuming you can run Python on the far end - think port forwarding). Kelly KB0GBJ > Sun Dec 02 2012 09:41:18 PM CST from "Justin Krejci" ><jus at krytosvirus.com> Subject: Re: [tclug-list] vnc/rdesktop > > To add to eriks socks proxy comments, firefox and perhaps other browsers >can also tunnel its DNS queries through the socks proxy as well for added >privacy. > > >-------- Original message -------- >From: Erik Anderson <erikerik at gmail.com> >Date: >To: TCLUG Mailing List <tclug-list at mn-linux.org> >Subject: Re: [tclug-list] vnc/rdesktop > > >On Sun, Dec 2, 2012 at 8:09 PM, Brian Wood <woodbrian77 at gmail.com> wrote: >> Does anyone know of examples of on line services that use >> tunneling? I've not found much. > >No, but I suspect that's due to the fact that learning the few >command-line flags for tunneling is a bit higher learning curve than >most people are willing to put up with. That said, ssh tunnelling is >*immensely* useful for day-to-day development/sysadmin type >activities. > >I use it exclusively to connect to our EC2 cluster, in lieu of a >full-fledged VPN. It's fast, simple, reliable, and doesn't require any >additional configuration on the server side of things. > >As an example of how I use ssh tunneling on a near-daily basis: Sequel >Pro, a MySQL client for OSX, supports accessing the remote DB over an >ssh tunnel. So all you need to do is give Sequel Pro the ssh server >name, your username, and db credentials and Bob's your uncle. Instant >secure, remote database access. > >Oh, I did think of one very popular service that leverages ssh >tunnelling - github. When pushing commits to any repository on github, >you're tunnelling git over ssh. > >-Erik >P.S. I know this has been discussed on the list before, but it's >useful enough to bear repeating: One more frequent use case is giving >yourself a secure SOCKS-compatible proxy. This is very useful on >public, untrusted networks to allow you to tunnel all of your browsing >traffic through a secure tunnel. Assuming you have a linux server >somewhere at your disposal, just run: > >$ ssh user at host -D8000 > >That will set up a dynamic (SOCKS) proxy on your localhost port 8000. >Then in your browser settings, just configure it to use localhost:8000 >as a proxy. >_______________________________________________ >TCLUG Mailing List - Minneapolis/St. Paul, Minnesota >tclug-list at mn-linux.org >http://mailman.mn-linux.org/mailman/listinfo/tclug-list > > > (, 0 bytes) [View| Download] > > > > > > > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20121202/c4955ed3/attachment-0001.html> -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: URL: <http://mailman.mn-linux.org/pipermail/tclug-list/attachments/20121202/c4955ed3/attachment-0001.ksh>