About the author
In the blog post Tunnelling RealVNC over a firewall with OpenSSH, I shared how I used SSH to carry VNC traffic so that I could connect to my machine at home from the office.
There were occasions when I needed to connect to the office back from home. At that time, ArcSight was renting an office space from another company, and got a shared IP. With a shared office and shared IP, of course, you're not going to get a port forward. And that's how SSH gets into the picture. SSH is able to allow port forwarding once you've configured it up properly.
So, one of the techniques I used to connect back to the office involved a little trick - that I send an email to initiate a OpenSSH tunnel from the office back to my home.
How I accomplished this was as follows:
With the above setup, I was able to connect from my home to at least 4 machines back in the office.
So, that's how I managed to achieve a VNC connection from an unknown IP (the office), back to a known IP (my home).
Learn why the map is cool in Go!
A method to design records so that they're allocated on a specific byte boundary, such as 16 bytes, 512 bytes, 4096 bytes, etc.
Learn the command line used to compile System.pas in Delphi
How to free more space on your home drive by redirecting the location for SDKs in RAD Studio