Next: Architecture
Up: Actim - Manual
Previous: Introduction
  Contents
In my opinion, I wrote this application for use behind the firewall:
- For example, your office workstation is behind a very secure firewall.
The only way that you can communicate from your home PC is through email or http.
If the company has socks servers setup, then you can use remote port forward with ssh to establish
a connection to your home IP address. Suppose you dial up to an ISP that gives
you a dynamic IP address. The only way is to publish this IP address by email or put it
on your own web page. Then set up your office workstation continuously detecting the new IP address
and launch ssh to connect to your home PC.
- If your organisation only allows email and http,
and is without socks server to allow outgoing connections, then
you can use this tool to gain some access but in a slow and inconvenient way.
- Imagine your home PC is connected to the internet at all time and you
hardly connect to your home PC from work.
Instead, you can switch on or off all the
listening services (such as ftp server, telnet server, etc) on your home PC
with this application.
For instance, you can send an actim event with
a command ID, This active server recognises the ID and activates all the
listening services. Then the user can telnet, ftp, ssh, etc to the home PC.
When the user is finished, the user sends another actim event to switch off
all the services. This is one way to protect your home PC.
Of course, in this scenario, you must connect to your ISP mail server at
all times.
Next: Architecture
Up: Actim - Manual
Previous: Introduction
  Contents
Joseph Kuan
2001-10-16