![]() ![]() Unencrypted transmission of data between the administration machine and the administered machine.Īs a consequence, depending on the implemented security, the risks incurred from "users" with malicious intentions (call them pirates if you prefer) are:.Connections are "possible" at any moment when the VNC module installed on the client is running as a service.Unencrypted storage of the connection password in the Windows registry (older versions of VNC).In the case of VNC, the main reproaches made are: The use of a remote maintenance tool, whatever it is, carries the risk for a company of creating potential security holes. Secure and Simplify your VNC Installation with IDEAL Administration (installed in 2 minutes) Try IDEAL Administration during 30 days on your network for free! I've heard there are a lot security issues with the VNC family of products. How to configure the TightVNC remote control tool (screen sharing)? How can I make sure TightVNC is secure to use?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |