On Sun, 6 Mar 2016 12:05:17 -0800, Daniel Frey wrote:
> >> Ah, I wasn't aware. I am using it with KDE and haven't seen any
> >> issues.
> >
> > It works with KDE4 but not KDE5, so if you're on stable you'll be OK,
> > for now.
> >
> > http://wiki.x2go.org/doku.php/doc:de-compat
> >
> >
>
On 03/06/2016 09:36 AM, Neil Bothwick wrote:
> On Sun, 6 Mar 2016 08:43:09 -0800, Daniel Frey wrote:
>
>>> I'm using it with the latest testing xorg-server and it works fine.
>>> There are some DEs it has problems with, which are well documented,
>>> but not the X server.
>
>> Ah, I wasn't aware.
On Sun, 6 Mar 2016 08:43:09 -0800, Daniel Frey wrote:
> > I'm using it with the latest testing xorg-server and it works fine.
> > There are some DEs it has problems with, which are well documented,
> > but not the X server.
> Ah, I wasn't aware. I am using it with KDE and haven't seen any issues.
On 03/05/2016 01:22 AM, Neil Bothwick wrote:
> On Sat, 05 Mar 2016 00:55:17 +0100, lee wrote:
>
>>> I'm using the most recent stable and it works for me:
>>>
>>> $ equery list xorg-server
>>> * Searching for xorg-server ...
>>> [IP-] [ ] x11-base/xorg-server-1.17.4:0/1.17.4
>>
>> Maybe the pro
On Sat, 05 Mar 2016 00:55:17 +0100, lee wrote:
> >>> Still using x2go, still works wonderfully.
> >>
> >> IIRC, I wanted to try it, and it turned out to be incompatible with
> >> current X servers --- perhaps they fixed that in the meantime ...
> >>
> >
> > What version are you using?
>
>
Daniel Frey writes:
> On 02/21/2016 04:36 PM, lee wrote:
>> Daniel Frey writes:
>>
>>> On 02/20/2016 02:27 AM, lee wrote:
Daniel Frey writes:
> I looked up x2go and rebuilt openssh on my home server as it suggested
> to try it out.
>>>
>>> I should mention I undid the hpn USE-fla
On 02/21/2016 04:36 PM, lee wrote:
> Daniel Frey writes:
>
>> On 02/20/2016 02:27 AM, lee wrote:
>>> Daniel Frey writes:
I looked up x2go and rebuilt openssh on my home server as it suggested
to try it out.
>>
>> I should mention I undid the hpn USE-flag change (x2go suggested
>> buil
Daniel Frey writes:
> On 02/20/2016 02:27 AM, lee wrote:
>> Daniel Frey writes:
>>> I looked up x2go and rebuilt openssh on my home server as it suggested
>>> to try it out.
>
> I should mention I undid the hpn USE-flag change (x2go suggested
> building without it) and it works fine, the newer
On 02/20/2016 02:27 AM, lee wrote:
> Daniel Frey writes:
>> I looked up x2go and rebuilt openssh on my home server as it suggested
>> to try it out.
I should mention I undid the hpn USE-flag change (x2go suggested
building without it) and it works fine, the newer versions have patches
that don't
On Sat, Feb 20, 2016 at 5:55 AM, lee wrote:
> Rich Freeman writes:
>
>> develop. (Before somebody points out LUKS, be aware that Bitlocker
>> lets you do full-disk encyption that is secure without having to
>> actually type a decryption key at any point. Remove the hard drive or
>> boot from a
Rich Freeman writes:
> develop. (Before somebody points out LUKS, be aware that Bitlocker
> lets you do full-disk encyption that is secure without having to
> actually type a decryption key at any point. Remove the hard drive or
> boot from a CD, and the disks are unreadable - you can only read
Rich Freeman writes:
> On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
>> Rich Freeman writes:
>>> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
Rich Freeman writes:
> However, while an RDP-like solution protects you from some types of
> attacks, it still leaves you open to many c
Daniel Frey writes:
> On 01/17/2016 10:10 AM, Rich Freeman wrote:
>> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>>>
>>> I would prefer a method that is independent of OS used. And provides server
>>> side limitations with regards to filesharing and clipboard access.
>>>
>>
>> x2go is
On Sunday 24 Jan 2016 13:44:12 Rich Freeman wrote:
> On Sun, Jan 24, 2016 at 1:36 PM, Mick wrote:
> > On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
> >> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
> >> > So the user is safe if I send all internet requests from her remote
> >> > laptop thr
On Sun, Jan 24, 2016 at 1:36 PM, Mick wrote:
> On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
>> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
>> > So the user is safe if I send all internet requests from her remote
>> > laptop through the Zerotier connection (instead of only sending
>> > re
On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
> > So the user is safe if I send all internet requests from her remote
> > laptop through the Zerotier connection (instead of only sending
> > requests to my server through Zerotier)?
>
> It depen
On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
>
> So the user is safe if I send all internet requests from her remote
> laptop through the Zerotier connection (instead of only sending
> requests to my server through Zerotier)?
>
It depends on what you mean by "safe." If you mean that there is n
>> >> > However, this won't do away with XSS, or other similar attack vectors
>> >> > if
>> >> > the users are not careful with their browsing habits.
>> >>
>> >> Can you give me an example?
>> >
>> > If your coder has another website page open in his/her browser which
>> > contains for example XSS
On Sat, Jan 23, 2016 at 12:17 PM, Mick wrote:
> I would have thought SSL certificates/keys would be protected in RAM, but if
> you have a Man-In-The-Browser attack I guess they wouldn't be.
>
As far as I'm aware linux doesn't do anything to protect process RAM
from other processes with the same U
On Saturday 23 Jan 2016 09:55:35 Rich Freeman wrote:
> On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> > On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > If a user certificate is lost of feared compromised, you revoke it with
> >> > your CA and upload the CRL to the server.
> >> >
> >> > Howeve
On Thursday, January 21, 2016 11:17:05 PM lee wrote:
> "J. Roeleveld" writes:
> > On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
> >> "J. Roeleveld" writes:
> >> > [...]
> >> > If disk-space is considered too expensive, you could even have every VM
> >> > use
> >> > the same base image. And
On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
>
>> > If a user certificate is lost of feared compromised, you revoke it with
>> > your CA and upload the CRL to the server.
>> >
>> > However, this won't do away with XSS, or other similar attack vectors
On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > I'm sorry, I meant can I lock down access to my web stuff so that a
> >> > particular user can only come from a particular device (or from any
> >> > device containing a key).
> >
> > You can use apache client authentication with SSL certificates
lee wrote:
> Rich Freeman writes:
>
> > On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
> >> "J. Roeleveld" writes:
> >>
> >> How does that work? IIUC, when you created a snapshot, any changes you
> >> make to the snapshotted (or how that is called) file system are being
> >> referenced by the s
On Thu, Jan 21, 2016 at 5:00 PM, lee wrote:
> Hm, I must be misunderstanding snapshots entirely.
>
Well, in the case of zfs/btrfs you are. Different implementations
have different snapshotting features.
> What happens when you remove a snapshot after you modified the
> "original" /and/ the snap
On Thu, Jan 21, 2016 at 4:35 PM, lee wrote:
> And I thought vnc sends a copy of what is displayed on the screen, so if
> you were running a program that renders something on the screen and
> uses/requires a graphics card for that, you should be able to see what
> it renders. If you can't see that
"J. Roeleveld" writes:
> On Wednesday, January 20, 2016 01:46:29 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> >> >> "J. Roeleveld" writes:
>
>> >> >
>
Alec Ten Harmsel writes:
> On Tue, Jan 19, 2016 at 10:56:21PM +0100, lee wrote:
>> Alec Ten Harmsel writes:
>> >
>> > Depends on how the load is. Right now I have a 500GB HDD at work. I use
>> > VirtualBox and vagrant for testing various software. Every VM in
>> > VirtualBox gets a 50GB hard dis
Rich Freeman writes:
> On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
>> "J. Roeleveld" writes:
>>
>> How does that work? IIUC, when you created a snapshot, any changes you
>> make to the snapshotted (or how that is called) file system are being
>> referenced by the snapshot which you can either
Rich Freeman writes:
> On Tue, Jan 19, 2016 at 5:08 PM, lee wrote:
>>
>> BTW, is it as easy to give a graphics card to a container as it is to
>> give it a network card?
>
> I've never tried it, but I'd think that the container could talk to a
> graphics card.
Maybe ... it's really easy with ne
"J. Roeleveld" writes:
> On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
>> "J. Roeleveld" writes:
>> > [...]
>> > If disk-space is considered too expensive, you could even have every VM
>> > use
>> > the same base image. And have them store only the differences of the disk.
>> > eg:
>> > 1)
On 01/17/2016 10:10 AM, Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>>
>> I would prefer a method that is independent of OS used. And provides server
>> side limitations with regards to filesharing and clipboard access.
>>
>
> x2go is just X11, so it should be OS-i
On Wed, 20 Jan 2016 16:21:42 -0800, Grant wrote:
> I would
> need to be able to rsync to the laptop and I'd rather not be involved
> in the remote employee's router config. Is there an easier solution
> for that than OpenVPN?
There is ZeroTier as a replacement for OpenVPN, and Syncthing for
sync
On Wed, Jan 20, 2016 at 7:21 PM, Grant wrote:
> Despite Rich's best efforts (thank you Rich! :-) ) I'm still
> considering a Gentoo laptop for this along with a Chromebook.
No worries. Gentoo laptops are great. There's a reason that Google
decided to use them as the starting point for creating
>>> > I'm sorry, I meant can I lock down access to my web stuff so that a
>>> > particular user can only come from a particular device (or from any
>>> > device containing a key).
>>>
>> You can use apache client authentication with SSL certificates only. Of
>> course you will need to create a sel
On Wednesday, January 20, 2016 01:46:29 AM lee wrote:
> "J. Roeleveld" writes:
> > On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> >> "J. Roeleveld" writes:
> >> >
> >> > Yes
> >> >
> >> >> That wou
On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
> "J. Roeleveld" writes:
> > [...]
> > If disk-space is considered too expensive, you could even have every VM
> > use
> > the same base image. And have them store only the differences of the disk.
> > eg:
> > 1) Create a VM
> > 2) Snapshot the d
On Tue, Jan 19, 2016 at 7:18 PM, Grant wrote:
>
> Is an SSL key stored on a smartcard better than a TOTP password? They
> seem roughly equivalent to me. I don't think either would restrict
> access by device.
>
They'd be roughly equivalent, especially if the TOTP is backed by a smartcard.
--
On Tue, Jan 19, 2016 at 5:08 PM, lee wrote:
>
> BTW, is it as easy to give a graphics card to a container as it is to
> give it a network card?
I've never tried it, but I'd think that the container could talk to a
graphics card.
> What if you have a container for each user who
> somehow logs in
On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
> "J. Roeleveld" writes:
>
> How does that work? IIUC, when you created a snapshot, any changes you
> make to the snapshotted (or how that is called) file system are being
> referenced by the snapshot which you can either destroy or abandon.
> When you
On Tue, Jan 19, 2016 at 10:56:21PM +0100, lee wrote:
> Alec Ten Harmsel writes:
> >
> > Depends on how the load is. Right now I have a 500GB HDD at work. I use
> > VirtualBox and vagrant for testing various software. Every VM in
> > VirtualBox gets a 50GB hard disk, and I generally have 7 or 8 at
"J. Roeleveld" writes:
> [...]
> If disk-space is considered too expensive, you could even have every VM use
> the same base image. And have them store only the differences of the disk.
> eg:
> 1) Create a VM
> 2) Snapshot the disk (with the VM shutdown)
> 3) create a new VM based on the snapsh
"J. Roeleveld" writes:
> On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On 17 January 2016 18:35:20 CET, Mick
>> >> > wrote:
>> >> >
>> >> > [...]
>> >> >
>> >> >>I use
Rich Freeman writes:
> On Mon, Jan 18, 2016 at 9:45 PM, Alec Ten Harmsel
> wrote:
>>
>> All Joost is saying is that most resources can be overcommitted, since
>> all the users will not be using all their resources at the same time.
>>
>
> Don't want to sound like a broken record, but this is pre
Alec Ten Harmsel writes:
> On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
>> "J. Roeleveld" writes:
>>
>> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On 17 January 2016 18:35:20 CET, Mick wrote:
>> >> >
>> >> > [...]
>> >> >
>> >> >>I use
>> You can use apache client authentication with SSL certificates only. Of
>> course you will need to create a self-signed CA, which you will use to create
>> the web server public/private key pair and also sign each client's
>> certificate
>> and upload it along with your CA certificate to the u
>> > I'm sorry, I meant can I lock down access to my web stuff so that a
>> > particular user can only come from a particular device (or from any
>> > device containing a key).
>>
> You can use apache client authentication with SSL certificates only. Of
> course you will need to create a self-sign
On Tue, Jan 19, 2016 at 6:26 PM, Mick wrote:
>
> You can use apache client authentication with SSL certificates only. Of
> course you will need to create a self-signed CA, which you will use to create
> the web server public/private key pair and also sign each client's certificate
> and upload it
On Tuesday 19 Jan 2016 17:46:27 Rich Freeman wrote:
> On Tue, Jan 19, 2016 at 2:32 PM, Grant wrote:
> > I'm sorry, I meant can I lock down access to my web stuff so that a
> > particular user can only come from a particular device (or from any
> > device containing a key).
>
> It looks like this
On Tue, Jan 19, 2016 at 2:32 PM, Grant wrote:
>
> I'm sorry, I meant can I lock down access to my web stuff so that a
> particular user can only come from a particular device (or from any
> device containing a key).
>
It looks like this hasn't been widely implemented, but it looks like
they do ha
>> If that's the case then it sounds like 2FA doesn't really provide any
>> extra assurance. It's another layer but if the machine is hacked then
>> it sounds like it becomes a very thin layer.
>>
>> I'd most like to allow the remote employee to use their own computer,
>> but is there any way to h
On Tue, Jan 19, 2016 at 9:02 AM, Grant wrote:
>
> If that's the case then it sounds like 2FA doesn't really provide any
> extra assurance. It's another layer but if the machine is hacked then
> it sounds like it becomes a very thin layer.
>
> I'd most like to allow the remote employee to use thei
On Tuesday 19 Jan 2016 08:42:07 J. Roeleveld wrote:
> On Tuesday, January 19, 2016 01:57:38 AM lee wrote:
> > Rich Freeman writes:
> > > On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> > >> Rich Freeman writes:
> > >>> However, while an RDP-like solution protects you from some types of
> > >>> att
> In any case, if you aren't going to own the client hardware, you
> basically are going to have to assume it is vulnerable since nobody
> maintains their PCs well. That means keyboard sniffing, cookie
> stealing, and so on. If you're web-based a hostile browser could just
> open another session
On Tue, Jan 19, 2016 at 12:22 AM, wrote:
>
> I'm an absolute windows noop. I only use it for graphics work. I even
> didn't know that such a kind of file sharing is possible with it. :-)
>
No worries - I think that is a great place to be. However, it is
useful to understand what ideas are out t
On Tuesday, January 19, 2016 02:15:17 AM lee wrote:
> writes:
> > lee wrote:
> >> Rich Freeman writes:
> >> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> >> Suppose you use a VPN connection. How do does the client
> >> >> (employee) secure their own network and the machine they're using
>
On Monday, January 18, 2016 08:35:20 PM Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
> > Rich Freeman writes:
> >> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> >>> Rich Freeman writes:
> However, while an RDP-like solution protects you from some types of
> attack
On Tuesday, January 19, 2016 01:57:38 AM lee wrote:
> Rich Freeman writes:
> > On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> >> Rich Freeman writes:
> >>> However, while an RDP-like solution protects you from some types of
> >>> attacks, it still leaves you open to many client-side problems like
On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
> "J. Roeleveld" writes:
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On 17 January 2016 18:35:20 CET, Mick
> >> > wrote:
> >> >
> >> > [...]
> >> >
> >> >>I use the icaclient provided by Citrix to
On Monday, January 18, 2016 09:45:28 PM Alec Ten Harmsel wrote:
> On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
> > "J. Roeleveld" writes:
> > > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> > >> "J. Roeleveld" writes:
> > >> > On 17 January 2016 18:35:20 CET, Mick
> > >> > wrote:
Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 10:33 PM, wrote:
> >
> > Sharing files can be done via SCP/SFTP. If a VPN connection is used,
> > then even NFS or FTP are possibilities.
>
> I have 100 computers. I want a user on those 100 computers to be able
> to share a file on their computer
On Mon, Jan 18, 2016 at 10:33 PM, wrote:
>
> Sharing files can be done via SCP/SFTP. If a VPN connection is used,
> then even NFS or FTP are possibilities.
I have 100 computers. I want a user on those 100 computers to be able
to share a file on their computer with just me. On windows they just
Rich Freeman wrote:
> I do sometimes wonder how the #1 server OS in the world somehow lacks
> decent facilities for graphical remote login, and for sharing files
> across the network. (For the latter NFS is a real pain to set up in a
> remotely secure fashion - part of the problem is that it is
On Mon, Jan 18, 2016 at 9:45 PM, Alec Ten Harmsel
wrote:
>
> All Joost is saying is that most resources can be overcommitted, since
> all the users will not be using all their resources at the same time.
>
Don't want to sound like a broken record, but this is precisely why
containers are so attra
lee wrote:
> writes:
>
> > lee wrote:
> >
> >> Rich Freeman writes:
> >>
> >> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> >> Suppose you use a VPN connection. How do does the client
> >> >> (employee) secure their own network and the machine they're
> >> >> using to work remotely th
On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
> "J. Roeleveld" writes:
>
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On 17 January 2016 18:35:20 CET, Mick wrote:
> >> >
> >> > [...]
> >> >
> >> >>I use the icaclient provided by Citrix to ac
On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
> Rich Freeman writes:
>> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
>>> Rich Freeman writes:
>>>
However, while an RDP-like solution protects you from some types of
attacks, it still leaves you open to many client-side problems like
k
Rich Freeman writes:
> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
>> Rich Freeman writes:
>>
>>> However, while an RDP-like solution protects you from some types of
>>> attacks, it still leaves you open to many client-side problems like
>>> keylogging. I don't know any major corporation that
writes:
> lee wrote:
>
>> Rich Freeman writes:
>>
>> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
>> >> Suppose you use a VPN connection. How do does the client
>> >> (employee) secure their own network and the machine they're using
>> >> to work remotely then?
>> >
>> > Poorly, most likely
"J. Roeleveld" writes:
> On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On 17 January 2016 18:35:20 CET, Mick wrote:
>> >
>> > [...]
>> >
>> >>I use the icaclient provided by Citrix to access my virtual desktop at
>> >>work,
>> >>but have never tried to set
On Mon, Jan 18, 2016 at 12:06 PM, Grant wrote:
>
> I am 100% web-based. I don't want to administrate machines outside of
> my LAN so I can imagine a Chromebook would end up vulnerable
> eventually.
The whole point of chromebooks is that they auto-update in a timely
fashion, and have a guaranteed
>> Suppose you use a VPN connection. How do does the client (employee)
>> secure their own network and the machine they're using to work remotely
>> then?
>
> Poorly, most likely. Your data is probably not nearly as important to
> them as their data is, and most people don't take great care of th
On Monday, January 18, 2016 06:07:33 AM Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 1:44 AM, J. Roeleveld wrote:
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> You would have a full VM for each user?
> >
> > Yes
> >
> >> That would be a huge waste of resources,
> >
> > Diskspace
On Mon, Jan 18, 2016 at 1:44 AM, J. Roeleveld wrote:
> On Monday, January 18, 2016 02:02:27 AM lee wrote:
>>
>> You would have a full VM for each user?
>
> Yes
>
>> That would be a huge waste of resources,
>
> Diskspace and CPU can easily be overcommitted.
>...
> The biggest reason why I don't use
On Monday, January 18, 2016 02:02:27 AM lee wrote:
> "J. Roeleveld" writes:
> > On 17 January 2016 18:35:20 CET, Mick wrote:
> >
> > [...]
> >
> >>I use the icaclient provided by Citrix to access my virtual desktop at
> >>work,
> >>but have never tried to set up something similar at home. What
lee wrote:
> Rich Freeman writes:
>
> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> Suppose you use a VPN connection. How do does the client
> >> (employee) secure their own network and the machine they're using
> >> to work remotely then?
> >
> > Poorly, most likely. Your data is proba
On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> Rich Freeman writes:
>
>> However, while an RDP-like solution protects you from some types of
>> attacks, it still leaves you open to many client-side problems like
>> keylogging. I don't know any major corporation that lets people RDP
>> into their
"J. Roeleveld" writes:
> On 17 January 2016 18:35:20 CET, Mick wrote:
> [...]
>>I use the icaclient provided by Citrix to access my virtual desktop at
>>work,
>>but have never tried to set up something similar at home. What
>>opensource
>>software would I need for this? Is there a wiki some
Rich Freeman writes:
> On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
>> Suppose you use a VPN connection. How do does the client (employee)
>> secure their own network and the machine they're using to work remotely
>> then?
>
> Poorly, most likely. Your data is probably not nearly as important t
On Sunday 17 Jan 2016 13:10:42 Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
> > I would prefer a method that is independent of OS used. And provides
> > server side limitations with regards to filesharing and clipboard access.
> x2go is just X11, so it should be OS-in
On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>
> I would prefer a method that is independent of OS used. And provides server
> side limitations with regards to filesharing and clipboard access.
>
x2go is just X11, so it should be OS-independent as long as you have a
client/server for it.
On 17 January 2016 18:59:36 CET, Rich Freeman wrote:
>On Sun, Jan 17, 2016 at 12:35 PM, Mick
>wrote:
>> I use the icaclient provided by Citrix to access my virtual desktop
>at work,
>> but have never tried to set up something similar at home. What
>opensource
>> software would I need for this?
On Sun, Jan 17, 2016 at 12:35 PM, Mick wrote:
> I use the icaclient provided by Citrix to access my virtual desktop at work,
> but have never tried to set up something similar at home. What opensource
> software would I need for this? Is there a wiki somewhere to follow?
>
There might be someth
On 17 January 2016 18:35:20 CET, Mick wrote:
>On Sunday 17 Jan 2016 16:51:00 J. Roeleveld wrote:
>> On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
>> > On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld
>wrote:
>> > > Actually, there are several large corporations that use RDP-like
>> >
On Sunday 17 Jan 2016 16:51:00 J. Roeleveld wrote:
> On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
> > On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
> > > Actually, there are several large corporations that use RDP-like
> > > technologies. Although those are called "VDI" and
On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
> > Actually, there are several large corporations that use RDP-like
> > technologies. Although those are called "VDI" and usually use XenDesktop
> > on the server side and "icaclien
On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
>
> Actually, there are several large corporations that use RDP-like technologies.
> Although those are called "VDI" and usually use XenDesktop on the server side
> and "icaclient" on the client.
> Runs through HTTPS and apart from keyloggers a
On Sunday, January 17, 2016 07:27:45 AM Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> > Suppose you use a VPN connection. How do does the client (employee)
> > secure their own network and the machine they're using to work remotely
> > then?
>
> Poorly, most likely. Your d
On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> Suppose you use a VPN connection. How do does the client (employee)
> secure their own network and the machine they're using to work remotely
> then?
Poorly, most likely. Your data is probably not nearly as important to
them as their data is, and mo
Mick writes:
> On Saturday 16 Jan 2016 09:39:24 Alan McKinnon wrote:
>> On 16/01/2016 06:17, Grant wrote:
>> > I'm considering allowing some employees to work from home but I'm
>> > concerned about the security implications. Currently everybody shows up
>> > and logs into their locked down Gento
On Saturday 16 Jan 2016 09:39:24 Alan McKinnon wrote:
> On 16/01/2016 06:17, Grant wrote:
> > I'm considering allowing some employees to work from home but I'm
> > concerned about the security implications. Currently everybody shows up
> > and logs into their locked down Gentoo system and from the
On Sat, Jan 16, 2016 at 2:39 AM, Alan McKinnon wrote:
>
> As for the security levels of their personal machines, tell them what
> you require and from that point on you really have to trust your people
> so be security aware and with the program.
>
Most employers just issue laptops to their emplo
On 16/01/2016 06:17, Grant wrote:
> I'm considering allowing some employees to work from home but I'm
> concerned about the security implications. Currently everybody shows up
> and logs into their locked down Gentoo system and from there is able to
> access the company webapps which are restricte
On 01/15/2016 09:18 PM, waben...@gmail.com wrote:
> Grant wrote:
>
>> I'm considering allowing some employees to work from home but I'm
>> concerned about the security implications. Currently everybody shows
>> up and logs into their locked down Gentoo system and from there is
>> able to access
Grant wrote:
> I'm considering allowing some employees to work from home but I'm
> concerned about the security implications. Currently everybody shows
> up and logs into their locked down Gentoo system and from there is
> able to access the company webapps which are restricted to the office
> I
I'm considering allowing some employees to work from home but I'm concerned
about the security implications. Currently everybody shows up and logs
into their locked down Gentoo system and from there is able to access the
company webapps which are restricted to the office IP address. I guess I
wou
96 matches
Mail list logo