Thanks Matthew, I'm not sure about these questions you asked, but I'm just getting started. I will research this and get back to you. Thanks again.
-----Original Message----- From: Matthew Scholtz [mailto:[EMAIL PROTECTED]] Sent: Monday, May 20, 2002 10:09 AM To: [EMAIL PROTECTED] Subject: VNC security on Win Hello All, I'm sure this has been asked a million times before, but since there don't seem to be any archives available for this list, I have no choice but to ask it again. Forgive the redundancy. My main concern with VNC is the possibility for brute-force attacks on the password, since as far as I know VNC does not have any functionality to allow only x password attempts before taking some sort of defensive action. I'm not so worried about encrypting all of the traffic, since in most cases I can set it up so that sending truly sensitive text during a session is not necessary. But someone getting access via a brute-force attack would be a disaster. I know about the possibility of using SSH (and the possibilty of doing this on Win using CygWin.) What I'm wondering is: short of that, is there any reliable way under Win to protect against repeated password attempts? What about in any of the offshoot VNC distributions? How have others addressed this issue? TIA, Matthew Matthew Scholtz Database and Non-Profit Technology Consultant Bellingham, WA --------------------------------------------------------------------- To unsubscribe, mail [EMAIL PROTECTED] with the line: 'unsubscribe vnc-list' in the message BODY See also: http://www.uk.research.att.com/vnc/intouch.html --------------------------------------------------------------------- --------------------------------------------------------------------- To unsubscribe, mail [EMAIL PROTECTED] with the line: 'unsubscribe vnc-list' in the message BODY See also: http://www.uk.research.att.com/vnc/intouch.html ---------------------------------------------------------------------