#! /usr/bin/perl # # $Id$ # Definition of 'My::Project::ssht' for list.cgi.pl # Copyright (C) 2003 Jan Kratochvil # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; exactly version 2 of June 1991 is required # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA package project::ssht::ListItem; require 5.6.0; # at least 'use warnings;' but we need some 5.6.0+ modules anyway our $VERSION=do { my @r=(q$Revision$=~/\d+/g); sprintf "%d.".("%03d"x$#r),@r; }; our $CVS_ID=q$Id$; use strict; use warnings; use My::Web; our @ListItem=( "name"=>"ssht", "platform"=>"unixuser", "priority"=>4, "cvs"=>"ssht", "summary"=>'Intranet host accessibility by '.a_href('http://www.openssh.org/','SSH').' tunnel', "license"=>"PD", "maintenance"=>"ready", "sponsorship"=>a_href('http://www.jklabs.cz/','JKLabs'), "language"=>"bash", "description"=><<"HERE",

Do you need to admin remote host placed in the intranet behind enemy firewall? If you are able to set up port forward on the firewalling you are done. In the case of HTTP-only proxy you cannot use these scripts - look elsewhere.

If the firewall performat NAT (masquerade) where you can connect from the intranet to the outer world by @{[ a_href 'http://www.openssh.org/','SSH' ]} you can use these security safe (TODO: chroot) scripts.

HERE ); 1;