> remotehost="lightning"
> cmd="x11vnc -display :0 -localhost -connect localhost -ncache"
> ssh -t -c blowfish -R 5500:$remotehost:5500 localhost "$cmd"
I think you mean:
ssh -t -c blowfish -R 5500:localhost:5500 $remotehost "$cmd"
right? You want to ssh to $remotehost and have the 5500 traff
On Fri, 1 Jan 2010, Warren Block wrote:
>
> ssh -t -c blowfish -N -f -L 5500:$supporterhost:5500 $supporterhost && \
> x11vnc -display :0 -localhost -connect localhost -ncache 10
I think that will work, but I believe (for extra safety/clarity if nothing
else) you really want:
-L 5500:localho
On Fri, 1 Jan 2010, Warren Block wrote:
> [SSL mode for x11vnc]
>
> I've tried it now and it does just what is needed for my setup!
Very good.
> Finally, a little feedback:
>
> On a Windows Vista system, AVG screamed that the netcat.exe from
> ssvnc_windows_only-1.0.25.zip was a virus (don't
On Sat, 2 Jan 2010, Warren Block wrote:
>
> Proto: RFB 003.008
>
> Connected to RFB server, using protocol version 3.8
> Enabling TightVNC protocol extensions
> Security-Type: 16 (rfbSecTypeTight)
> No authentication needed
>
> Desktop name ""
> ...
> ...and that's it. The TightVNC server show
On Sun, 3 Jan 2010, Warren Block wrote:
> >
> > I believe a workaround for you will be:
> >
> >ssvncviewer -listen -rfbversion 3.7
> >
> > this reverts to the previous protocol version where there is no issue.
>
> Confirmed, that works fine with TightVNC servers from both of the
> Windows sys