Bernard et al,

> >specific users is a secure activity, but our IT guys are now 
> saying that
> >it doesn't necessarily protect our systems from worms or viruses that
> >may already inhabit the trusted user's computers.
> 
> That's correct, in that if there was a weakness in VNC it could be 
> exploited through the open port.

No, it isn't.  They are talking about viruses/worms propagating, which is
not possible via the RFB protocol.

> VNC server there. To find that out they would need to sniff 
> all of the 
> network traffic to see what addresses were in use. If they 
> succeeded in 
> doing that they would also harvest the password.

This is not true.  The authentication scheme used by VNC Free Edition uses a
challenge-response protocol to protect the password.  Session data is not
protected, however, unless you use VNC Personal or Enterprise Edition at
both ends.

Regards,

Wez @ RealVNC Ltd.
_______________________________________________
VNC-List mailing list
VNC-List@realvnc.com
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to