RE: Security Risk?

2002-05-22 Thread Shing-Fat Fred Ma
sity, Mackenzie Building 1125 Colonel By Drive Ottawa, Ontario Canada K1S 5B6 [EMAIL PROTECTED] === > > Date: Wed, 22 May 2002 15:33:28 -0500 > From: Paul Simon <[EMAIL PROTECTED]> > Subject: RE: Security Risk? > > Well I know the VNC d

RE: Security Risk?

2002-05-22 Thread Paul Simon
Well I know the VNC daemon will lock you out (possibly for a time limit??) after several (maybe 5) bad password attempts... -Original Message- From: Shing-Fat Fred Ma [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 22, 2002 11:33 AM To: [EMAIL PROTECTED] Subject: Re: Security Risk? I

Re: Security Risk?

2002-05-22 Thread Shing-Fat Fred Ma
PROTECTED] === > > Date: Tue, 21 May 2002 18:31:21 -0400 > From: Glenn Mabbutt <[EMAIL PROTECTED]> > Subject: RE: Security Risk? > > No, these risks and others still exist. If security is a necessity (ie, > outside of a local network, or even inside one if nosy people exist), o

RE: Security Risk?

2002-05-22 Thread Paul Simon
Is there a place you can point me that shows the vulnerabilities of VNC in it's current state? Thanks, Paul -Original Message- From: Glenn Mabbutt [mailto:[EMAIL PROTECTED]] Sent: Tuesday, May 21, 2002 4:31 PM To: '[EMAIL PROTECTED]' Subject: RE: Security Risk? No,

RE: Security Risk?

2002-05-21 Thread Glenn Mabbutt
No, these risks and others still exist. If security is a necessity (ie, outside of a local network, or even inside one if nosy people exist), one normally tunnels the VNC session inside of SSH or Zebedee or other encrypted tunnel. There are a couple of patches to do NT domain authentication, and

Re: Security Holes

2002-02-24 Thread barnowl
If you can get to a key board you can sniff a hub/switch or un secured router. This means ANY computer on the network can be used to go sniffing.. You don't need physical access to the router. That would just make life to easy Patrick Corneli_en <[EMAIL PROTECTED]> wrote: > Hello Michael Os

Re: Security Holes

2002-02-22 Thread Michael Ossmann
On Fri, Feb 22, 2002 at 10:38:34AM +0100, Patrick Corneli_en wrote: > > That's not the problem, the Datatransfer is going through my local hub > (in my room) and the rest of the house is completely switched, so I > see no problem here. > I will use it only from here, not over the internet. That's

Re: Security Holes

2002-02-21 Thread Michael Ossmann
On Thu, Feb 21, 2002 at 07:56:42PM +0100, Patrick Corneli_en wrote: > > are there any known security holes in VNC? > I'd like to use it on my server and the server has a public-static-IP > adress. Some would say that VNC _is_ a security hole. The authentication method looks somewhat secure, b

Re: Security questions

2002-02-01 Thread Alex Angelopoulos
Those are good questions to ask at the beginning of the process Sara - most people wait until after deployment to do so. The methodology you use for setting up your remote control system is actually what will determine how easy it is to manage VNC centrally - which is what it sounds like your cen

RE: Security questions

2002-02-01 Thread Joe O'Bremski
I found that with a simple policy to turn on the screen saver and lock the workstation works will for a little added security. If someone did get the VNC password to a machine it would still be fairly secure because the person conencting to the machine would get the Windows NT login prompt.

RE: Security Problems?

2001-08-29 Thread Glenn Mabbutt
search the mailing list archives - this has come up many times. -Original Message- From: Paul Brown [mailto:[EMAIL PROTECTED]] Sent: Wednesday, August 29, 2001 4:19 PM To: [EMAIL PROTECTED] Subject: Security Problems? Does anyone know of any security leaks or problems with VNC? Password

RE: Security Problems?

2001-08-29 Thread Zalman Margareten
Yes "VNCCrack" was mentioned a while back in this list. -Original Message- From: Paul Brown [mailto:[EMAIL PROTECTED]] Sent: Wednesday, August 29, 2001 4:19 PM To: [EMAIL PROTECTED] Subject: Security Problems? Does anyone know of any security leaks or problems with VNC? Password? Or Enc

Re: security

2001-05-09 Thread Jonathan Morton
>Is there a security setting that prevents users from accessing the VNC >properties? Please search the FAQ and archives for the "AllowProperties" registry setting. This does not involve hiding the icon, it merely disables the menu. If you *really* need to hide the icon, install TridiaVNC.

RE: security

2001-05-09 Thread Tony Do
Thanks I will look into that. At 12:18 PM 2001-05-09 -0400, you wrote: >According to the Documentation it can only be done by modifying the source >code. I found that in win2k it will work by removing the reference under the >"run" hive in Microsoft current control. > >Z > >-Original Message-

RE: security

2001-05-09 Thread Zalman Margareten
According to the Documentation it can only be done by modifying the source code. I found that in win2k it will work by removing the reference under the "run" hive in Microsoft current control. Z -Original Message- From: Tony Do [mailto:[EMAIL PROTECTED]] Sent: Wednesday, May 09, 2001 11:

Re: Security issue with WinVNC as service

2001-01-29 Thread Andrew van der Stock
I have an old fix for this on my Win2K box from the time it was last brought up on BugTraq (search the VNC archives for that discussion). I never really got around to sending the patch around because this list has a MIME stripper and I lost interest there for a while. The fix is simple: I did an

RE: Security issue with WinVNC as service

2001-01-24 Thread Glenn Mabbutt
Well, on NT/2000 I believe it's possible to restrict access to the registry. And if you have administrator access, you can see everything anyway. On 95/98, just delete regedit.exe from the user's machine ;) -Original Message- From: John Ineson [mailto:[EMAIL PROTECTED]] Sent: Wednesday,

Re: Security issue with WinVNC as service

2001-01-24 Thread Tim Waugh
On Wed, Jan 24, 2001 at 03:55:19PM +, John Ineson wrote: > P.S. I've just signed up, so sorry if this issue's come up before. I > have looked at the archives & docs and couldn't find anything. Take another look. There is a security advisory in the archive that's about a day old. Not to men

Re: Security issue with WinVNC as service

2001-01-24 Thread James ''Wez'' Weatherall
> I now find that (in this, a standard install) the password hash is > readable to all users, power users and administrators > (HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default). This astounded me, > and the other WinVNC users I know. > > So, if I'm not mistaken, by default even normal (i.e. only >