Go back to fronty page View most popular entries View latest additions Submit tutorials to UnixTutorials.info
UnixTutorials logo

Search results for How to secure VNC remote access with two-factor authentication

Linux

How to secure VNC remote access with two-factor authentication

Post date: May 21, 2007, 22:05 Category: Security Views: 3242 Comments
Tutorial quote: VNC is the most popular remote access solution today. However, it was developed to provide remote access, not to provide secure remote access. Administrators have to add security to VNC by tunneling it through an encrpyted channel such as SSH and adding a layer of authentication. In this article, we will show you how to combine the NoMachine NX server to encrpyt VNC and remote X session combined with two-factor authentication from WiKID Systems to create a secure, fast remote access solution.
Fedora+Core

VNC (Virtual Network Computing) 101

Post date: April 16, 2005, 00:04 Category: Network Views: 3649 Comments
Tutorial quote: VNC stands for Virtual Network Computing. It is remote control software which allows you to view and interact with one computer (the "server") using a simple program (the "viewer") on another computer anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view an office Linux machine on your Windows PC at home. VNC is freely and publicly available and is in widespread active use by millions throughout industry, academia and privately.
Debian

Remotely Manage Machines Using VNC

Post date: November 1, 2006, 23:11 Category: Software Views: 3506 Comments
Tutorial quote: VNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing `desktop’ environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures.
OSX

VNC control of a Mac under OS X 10.4

Post date: December 10, 2005, 08:12 Category: Network Views: 5761 Comments
Tutorial quote: VNC support is built right into Tiger. This means you can remote control you mac from an another mac a PC or even you Palm or Blackberry.

However the functionality is a bit hidden. Here are the simple steps to set it up. Remember this is TIGER not Panther.
Debian

A couple of tricks with the secure shell

Post date: September 18, 2006, 13:09 Category: Network Views: 11343 Comments
Tutorial quote: One can do a lot more with ssh than use it for remote terminal session. Here we'll show how to copy files using ssh, use ssh as part of a pipe, vnc or samba forwarding via ssh and mounting filesystems using ssh (fuse + sshfs).
Ubuntu

How To Configure Remote Access To Your Ubuntu Desktop

Post date: February 14, 2008, 13:02 Category: Desktop Views: 4103 Comments
Tutorial quote: This guide explains how you can enable a remote desktop on an Ubuntu desktop so that you can access and control it remotely. This makes sense for example if you have customers that are not very tech-savvy. If they have a problem, you can log in to their desktops without the need to drive to their location. I will also show how to access the remote Ubuntu desktop from a Windows XP client and an Ubuntu client.
Debian

SSH your Debian servers without password

Post date: December 29, 2006, 20:12 Category: System Views: 3062 Comments
Tutorial quote: Secure Shell is a program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another. It provides strong authentication and secure communications over unsecure channels. It is intended as a replacement for telnet, rlogin, rsh, and rcp. For SSH2, there is a replacement for FTP: sftp.This might be useful if you are trying to connect everytime to your server remotely.
OpenBSD

Creating secure wireless access points with OpenBSD and OpenVPN

Post date: December 13, 2005, 18:12 Category: Network Views: 7937 Comments
Tutorial quote: You know how insecure 802.11x wireless networks are. In this article we'll create an OpenBSD-based secure wireless access point that prevents unauthorized access and encrypts every packet using a VPN tunnel. OpenBSD is one of the most secure operating systems available, is easy to use, and includes almost everything you need for this project in the base installation.
Unix+clones

Using Public Key Authentication with SSH

Post date: June 26, 2008, 10:06 Category: Network Views: 4734 Comments
Tutorial quote: The current leading SSH server, OpenSSH, offers two main methods of authentication: interactive password and public key authentication. While interactive password authentication is the default, there are several reasons for using public key authentication. After reading some background information about public key cryptography, you should have a firm understanding of what public key cryptography is and how it works. You're welcome to skip straight to generating keys for use with SSH. Setting up public key authentication will require a few minutes, but the results are worthwhile.
Unix+clones

Command your network with Kaboodle

Post date: June 28, 2005, 09:06 Category: Network Views: 2949 Comments
Tutorial quote: Quite often setting up a local network is much easier than managing it. Even technically challenged users can figure out how to connect a couple of computers and a printer. However, tasks like maintenance, troubleshooting, and remote secure connections require more than just "which-cable-goes-where" knowledge. You need something like Kaboodle, a nifty tool that can help you to manage your local network like a pro.

Kaboodle allows you to visualize your local network, control computers on it via VNC, and connect to other Kaboodle-enabled networks. Kaboodle was developed for Windows, but according to its Web site, it will happily run under Wine on Linux and FreeBSD.
Web-based applications and online marketing solutions - LumoLink