![]() ![]() And if you plan to take a plunge on trying their services, check out the URL of their website – it’s HTTPS. This simply means that you can access computer remotely not only through your laptop or notebook but also from your smartphone (with larger screen), Android tablets, iPad, and other devices that has an Internet browser and Internet connection.Īre you bit worried about security or how secured your remote connection will be? First and foremost, I guess the company won’t last long if there’s such bad reputation about their services. You can now access your computer from almost anything where there’s a browser and Internet connection. What’s neat about the application? You just need to install the LogMeIn application on the target computer, turn it on, ensure that it’s connected to the Internet – that’s it. And almost over 125M were using their application. The company is not new in the business they’ve been there since 2003. You just need to install the application on your target computer and leave the application turned on – viola! You can now access the computer remotely even if it is behind your company’s firewall. LogMeIn application offers a tool for everybody which enables them to access computer remotely with no configuration hassles. Otherwise, sit back and read more about it here.ĭownload Mozilla Firefox 7 Officially Released For Windows, Mac and Linux The application to access computer remotely is called LogMeIn, hear it before? If yes, please share your experience about the application because I just recently used it. Do you really want to go through with all of those request and paper works? Or would you want me to share with you a simpler way to do it and the fun part about it is it’s FREE. Most companies which allow remote connection or access to their Intranet provide VPN application with access to authorize you to access computer remotely. The IP address of your computer in the office is not published in the Internet and it is only known within your company Intranet. Furthermore, I am sure that the IP address of your computer is an internal octet or simply saying that it is an internal LAN connection. Of course, before you can even reach your computer I am pretty damn sure that you’ll have to face your company’s firewalls. Yes, this is quite true especially if you aim to access computer remotely in your office from a remote location. However, although there are some advantages of using these applications there are also some big blockers and one of which is “firewall”. Some of you might be already using the Microsoft Windows built-in Remote Desktop application while some of you were using VNC or Ultra VNC, Cisco VPN and many other applications. I am pretty sure that some of you already have their own choice of applications or software that enables you to do this stuff. It’s not a choice but a must and I am not only talking about one computer here but servers and computers from different data centers, both local and international. ![]() The general connection scheme is shown below.In my line of work, the need to access computer remotely is a must. In this example, we will create a local Port 8888, and the connection to it will be forwarded to the RDP port 3389 on a remote Windows computer. All connections to this port are forwarded to the specified port on a remote server via the SSH tunnel. In this mode, you create a local TCP port on your computer. RDP Access Through SSH Tunnel (Local TCP Forwarding) Double SSH tunnel connects computers without any dedicated pubic IP addresses behind NAT through an SSH server (if OpenVPN solution is not applicable).Remote TCP forwarding is a remote port forwarding to a local computer.Local TCP forwarding is a local port forwarding to a remote server.Here are the typical usage scenarios of SSH tunneling: However, you can use the port forwarding technique through the SSH tunnel. It seems impossible since Remote Desktop port 3389 is blocked by the firewall. Your task is to connect to the Windows Server using the RDP client. All other ports are blocked by a hardware firewall or Windows Firewall. For example, you have a Windows Server with only SSH port open (TCP 22). SSH tunneling is mostly used in the scenarios when you need to connect to a remote computer behind the firewall. ![]()
0 Comments
Leave a Reply. |