On Sun, 6 Mar 2016 12:05:17 -0800, Daniel Frey wrote:
> >> Ah, I wasn't aware. I am using it with KDE and haven't seen any
> >> issues.
> >
> > It works with KDE4 but not KDE5, so if you're on stable you'll be OK,
> > for now.
> >
> > http://wiki.x2go.org/doku.php/doc:de-compat
> >
> >
>
On 03/06/2016 09:36 AM, Neil Bothwick wrote:
> On Sun, 6 Mar 2016 08:43:09 -0800, Daniel Frey wrote:
>
>>> I'm using it with the latest testing xorg-server and it works fine.
>>> There are some DEs it has problems with, which are well documented,
>>> but not the X server.
>
>> Ah, I wasn't
On Sun, 6 Mar 2016 08:43:09 -0800, Daniel Frey wrote:
> > I'm using it with the latest testing xorg-server and it works fine.
> > There are some DEs it has problems with, which are well documented,
> > but not the X server.
> Ah, I wasn't aware. I am using it with KDE and haven't seen any
On 03/05/2016 01:22 AM, Neil Bothwick wrote:
> On Sat, 05 Mar 2016 00:55:17 +0100, lee wrote:
>
>>> I'm using the most recent stable and it works for me:
>>>
>>> $ equery list xorg-server
>>> * Searching for xorg-server ...
>>> [IP-] [ ] x11-base/xorg-server-1.17.4:0/1.17.4
>>
>> Maybe the
On Sat, 05 Mar 2016 00:55:17 +0100, lee wrote:
> >>> Still using x2go, still works wonderfully.
> >>
> >> IIRC, I wanted to try it, and it turned out to be incompatible with
> >> current X servers --- perhaps they fixed that in the meantime ...
> >>
> >
> > What version are you using?
>
Daniel Frey writes:
> On 02/21/2016 04:36 PM, lee wrote:
>> Daniel Frey writes:
>>
>>> On 02/20/2016 02:27 AM, lee wrote:
Daniel Frey writes:
> I looked up x2go and rebuilt openssh on my home server as it suggested
> to try
On 02/21/2016 04:36 PM, lee wrote:
> Daniel Frey writes:
>
>> On 02/20/2016 02:27 AM, lee wrote:
>>> Daniel Frey writes:
I looked up x2go and rebuilt openssh on my home server as it suggested
to try it out.
>>
>> I should mention I undid the hpn
Daniel Frey writes:
> On 02/20/2016 02:27 AM, lee wrote:
>> Daniel Frey writes:
>>> I looked up x2go and rebuilt openssh on my home server as it suggested
>>> to try it out.
>
> I should mention I undid the hpn USE-flag change (x2go suggested
> building
On 02/20/2016 02:27 AM, lee wrote:
> Daniel Frey writes:
>> I looked up x2go and rebuilt openssh on my home server as it suggested
>> to try it out.
I should mention I undid the hpn USE-flag change (x2go suggested
building without it) and it works fine, the newer versions
On Sat, Feb 20, 2016 at 5:55 AM, lee wrote:
> Rich Freeman writes:
>
>> develop. (Before somebody points out LUKS, be aware that Bitlocker
>> lets you do full-disk encyption that is secure without having to
>> actually type a decryption key at any point.
Rich Freeman writes:
> develop. (Before somebody points out LUKS, be aware that Bitlocker
> lets you do full-disk encyption that is secure without having to
> actually type a decryption key at any point. Remove the hard drive or
> boot from a CD, and the disks are unreadable
Rich Freeman writes:
> On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
>> Rich Freeman writes:
>>> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
Rich Freeman writes:
> However, while an RDP-like
Daniel Frey writes:
> On 01/17/2016 10:10 AM, Rich Freeman wrote:
>> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>>>
>>> I would prefer a method that is independent of OS used. And provides server
>>> side limitations with regards to filesharing
>> >> > However, this won't do away with XSS, or other similar attack vectors
>> >> > if
>> >> > the users are not careful with their browsing habits.
>> >>
>> >> Can you give me an example?
>> >
>> > If your coder has another website page open in his/her browser which
>> > contains for example
On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
>
> So the user is safe if I send all internet requests from her remote
> laptop through the Zerotier connection (instead of only sending
> requests to my server through Zerotier)?
>
It depends on what you mean by "safe." If
On Sun, Jan 24, 2016 at 1:36 PM, Mick wrote:
> On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
>> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
>> > So the user is safe if I send all internet requests from her remote
>> > laptop through the
On Sunday 24 Jan 2016 13:44:12 Rich Freeman wrote:
> On Sun, Jan 24, 2016 at 1:36 PM, Mick wrote:
> > On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
> >> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
> >> > So the user is safe if I send all
On Sunday 24 Jan 2016 11:40:04 Rich Freeman wrote:
> On Sun, Jan 24, 2016 at 10:56 AM, Grant wrote:
> > So the user is safe if I send all internet requests from her remote
> > laptop through the Zerotier connection (instead of only sending
> > requests to my server through
On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > I'm sorry, I meant can I lock down access to my web stuff so that a
> >> > particular user can only come from a particular device (or from any
> >> > device containing a key).
> >
> > You can use apache client authentication with SSL
On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
>
>> > If a user certificate is lost of feared compromised, you revoke it with
>> > your CA and upload the CRL to the server.
>> >
>> > However, this won't do away with XSS, or
On Thursday, January 21, 2016 11:17:05 PM lee wrote:
> "J. Roeleveld" writes:
> > On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
> >> "J. Roeleveld" writes:
> >> > [...]
> >> > If disk-space is considered too expensive, you could even have every VM
>
On Saturday 23 Jan 2016 09:55:35 Rich Freeman wrote:
> On Sat, Jan 23, 2016 at 8:25 AM, Mick wrote:
> > On Tuesday 19 Jan 2016 15:59:25 Grant wrote:
> >> > If a user certificate is lost of feared compromised, you revoke it with
> >> > your CA and upload the CRL to the
On Sat, Jan 23, 2016 at 12:17 PM, Mick wrote:
> I would have thought SSL certificates/keys would be protected in RAM, but if
> you have a Man-In-The-Browser attack I guess they wouldn't be.
>
As far as I'm aware linux doesn't do anything to protect process RAM
from
"J. Roeleveld" writes:
> On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
>> "J. Roeleveld" writes:
>> > [...]
>> > If disk-space is considered too expensive, you could even have every VM
>> > use
>> > the same base image. And have them store only the
"J. Roeleveld" writes:
> On Wednesday, January 20, 2016 01:46:29 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On Monday, January 18, 2016
Rich Freeman writes:
> On Tue, Jan 19, 2016 at 5:08 PM, lee wrote:
>>
>> BTW, is it as easy to give a graphics card to a container as it is to
>> give it a network card?
>
> I've never tried it, but I'd think that the container could talk to a
> graphics
Rich Freeman writes:
> On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
>> "J. Roeleveld" writes:
>>
>> How does that work? IIUC, when you created a snapshot, any changes you
>> make to the snapshotted (or how that is called) file system are
Alec Ten Harmsel writes:
> On Tue, Jan 19, 2016 at 10:56:21PM +0100, lee wrote:
>> Alec Ten Harmsel writes:
>> >
>> > Depends on how the load is. Right now I have a 500GB HDD at work. I use
>> > VirtualBox and vagrant for testing various
On Thu, Jan 21, 2016 at 4:35 PM, lee wrote:
> And I thought vnc sends a copy of what is displayed on the screen, so if
> you were running a program that renders something on the screen and
> uses/requires a graphics card for that, you should be able to see what
> it renders. If
On Thu, Jan 21, 2016 at 5:00 PM, lee wrote:
> Hm, I must be misunderstanding snapshots entirely.
>
Well, in the case of zfs/btrfs you are. Different implementations
have different snapshotting features.
> What happens when you remove a snapshot after you modified the
>
lee wrote:
> Rich Freeman writes:
>
> > On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
> >> "J. Roeleveld" writes:
> >>
> >> How does that work? IIUC, when you created a snapshot, any changes you
> >> make to the
On Wed, 20 Jan 2016 16:21:42 -0800, Grant wrote:
> I would
> need to be able to rsync to the laptop and I'd rather not be involved
> in the remote employee's router config. Is there an easier solution
> for that than OpenVPN?
There is ZeroTier as a replacement for OpenVPN, and Syncthing for
On 01/17/2016 10:10 AM, Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>>
>> I would prefer a method that is independent of OS used. And provides server
>> side limitations with regards to filesharing and clipboard access.
>>
>
> x2go is just X11,
On Wed, Jan 20, 2016 at 7:21 PM, Grant wrote:
> Despite Rich's best efforts (thank you Rich! :-) ) I'm still
> considering a Gentoo laptop for this along with a Chromebook.
No worries. Gentoo laptops are great. There's a reason that Google
decided to use them as the
>>> > I'm sorry, I meant can I lock down access to my web stuff so that a
>>> > particular user can only come from a particular device (or from any
>>> > device containing a key).
>>>
>> You can use apache client authentication with SSL certificates only. Of
>> course you will need to create a
On Tue, Jan 19, 2016 at 12:22 AM, wrote:
>
> I'm an absolute windows noop. I only use it for graphics work. I even
> didn't know that such a kind of file sharing is possible with it. :-)
>
No worries - I think that is a great place to be. However, it is
useful to understand
On Tue, Jan 19, 2016 at 2:32 PM, Grant wrote:
>
> I'm sorry, I meant can I lock down access to my web stuff so that a
> particular user can only come from a particular device (or from any
> device containing a key).
>
It looks like this hasn't been widely implemented, but
>> If that's the case then it sounds like 2FA doesn't really provide any
>> extra assurance. It's another layer but if the machine is hacked then
>> it sounds like it becomes a very thin layer.
>>
>> I'd most like to allow the remote employee to use their own computer,
>> but is there any way to
On Tue, Jan 19, 2016 at 9:02 AM, Grant wrote:
>
> If that's the case then it sounds like 2FA doesn't really provide any
> extra assurance. It's another layer but if the machine is hacked then
> it sounds like it becomes a very thin layer.
>
> I'd most like to allow the
On Tuesday 19 Jan 2016 08:42:07 J. Roeleveld wrote:
> On Tuesday, January 19, 2016 01:57:38 AM lee wrote:
> > Rich Freeman writes:
> > > On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> > >> Rich Freeman writes:
> > >>> However, while an
>> You can use apache client authentication with SSL certificates only. Of
>> course you will need to create a self-signed CA, which you will use to create
>> the web server public/private key pair and also sign each client's
>> certificate
>> and upload it along with your CA certificate to the
"J. Roeleveld" writes:
> On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On 17 January 2016 18:35:20 CET, Mick
Rich Freeman writes:
> On Mon, Jan 18, 2016 at 9:45 PM, Alec Ten Harmsel
> wrote:
>>
>> All Joost is saying is that most resources can be overcommitted, since
>> all the users will not be using all their resources at the same time.
>>
>
> Don't want to
Alec Ten Harmsel writes:
> On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
>> "J. Roeleveld" writes:
>>
>> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> >> "J. Roeleveld" writes:
>> >> > On 17 January 2016
"J. Roeleveld" writes:
> [...]
> If disk-space is considered too expensive, you could even have every VM use
> the same base image. And have them store only the differences of the disk.
> eg:
> 1) Create a VM
> 2) Snapshot the disk (with the VM shutdown)
> 3) create a new
On Tue, Jan 19, 2016 at 6:26 PM, Mick wrote:
>
> You can use apache client authentication with SSL certificates only. Of
> course you will need to create a self-signed CA, which you will use to create
> the web server public/private key pair and also sign each client's
On Tue, Jan 19, 2016 at 5:22 PM, lee wrote:
> "J. Roeleveld" writes:
>
> How does that work? IIUC, when you created a snapshot, any changes you
> make to the snapshotted (or how that is called) file system are being
> referenced by the snapshot which you
On Tuesday 19 Jan 2016 17:46:27 Rich Freeman wrote:
> On Tue, Jan 19, 2016 at 2:32 PM, Grant wrote:
> > I'm sorry, I meant can I lock down access to my web stuff so that a
> > particular user can only come from a particular device (or from any
> > device containing a key).
>
>> > I'm sorry, I meant can I lock down access to my web stuff so that a
>> > particular user can only come from a particular device (or from any
>> > device containing a key).
>>
> You can use apache client authentication with SSL certificates only. Of
> course you will need to create a
On Tue, Jan 19, 2016 at 10:56:21PM +0100, lee wrote:
> Alec Ten Harmsel writes:
> >
> > Depends on how the load is. Right now I have a 500GB HDD at work. I use
> > VirtualBox and vagrant for testing various software. Every VM in
> > VirtualBox gets a 50GB hard disk, and I
On Tue, Jan 19, 2016 at 5:08 PM, lee wrote:
>
> BTW, is it as easy to give a graphics card to a container as it is to
> give it a network card?
I've never tried it, but I'd think that the container could talk to a
graphics card.
> What if you have a container for each user who
On Tue, Jan 19, 2016 at 7:18 PM, Grant wrote:
>
> Is an SSL key stored on a smartcard better than a TOTP password? They
> seem roughly equivalent to me. I don't think either would restrict
> access by device.
>
They'd be roughly equivalent, especially if the TOTP is
On Tuesday, January 19, 2016 11:22:02 PM lee wrote:
> "J. Roeleveld" writes:
> > [...]
> > If disk-space is considered too expensive, you could even have every VM
> > use
> > the same base image. And have them store only the differences of the disk.
> > eg:
> > 1) Create a VM
On Wednesday, January 20, 2016 01:46:29 AM lee wrote:
> "J. Roeleveld" writes:
> > On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> >> "J. Roeleveld"
> In any case, if you aren't going to own the client hardware, you
> basically are going to have to assume it is vulnerable since nobody
> maintains their PCs well. That means keyboard sniffing, cookie
> stealing, and so on. If you're web-based a hostile browser could just
> open another session
On Mon, Jan 18, 2016 at 12:06 PM, Grant wrote:
>
> I am 100% web-based. I don't want to administrate machines outside of
> my LAN so I can imagine a Chromebook would end up vulnerable
> eventually.
The whole point of chromebooks is that they auto-update in a timely
On Mon, Jan 18, 2016 at 1:44 AM, J. Roeleveld wrote:
> On Monday, January 18, 2016 02:02:27 AM lee wrote:
>>
>> You would have a full VM for each user?
>
> Yes
>
>> That would be a huge waste of resources,
>
> Diskspace and CPU can easily be overcommitted.
>...
> The biggest
On Monday, January 18, 2016 06:07:33 AM Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 1:44 AM, J. Roeleveld wrote:
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> You would have a full VM for each user?
> >
> > Yes
> >
> >> That would be a huge waste of
>> Suppose you use a VPN connection. How do does the client (employee)
>> secure their own network and the machine they're using to work remotely
>> then?
>
> Poorly, most likely. Your data is probably not nearly as important to
> them as their data is, and most people don't take great care of
"J. Roeleveld" writes:
> On Monday, January 18, 2016 02:02:27 AM lee wrote:
>> "J. Roeleveld" writes:
>> > On 17 January 2016 18:35:20 CET, Mick wrote:
>> >
>> > [...]
>> >
>> >>I use the icaclient provided by Citrix to
writes:
> lee wrote:
>
>> Rich Freeman writes:
>>
>> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
>> >> Suppose you use a VPN connection. How do does the client
>> >> (employee) secure their own network and the
Rich Freeman writes:
> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
>> Rich Freeman writes:
>>
>>> However, while an RDP-like solution protects you from some types of
>>> attacks, it still leaves you open to many client-side problems like
On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
> Rich Freeman writes:
>> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
>>> Rich Freeman writes:
>>>
However, while an RDP-like solution protects you from some types of
On Mon, Jan 18, 2016 at 9:45 PM, Alec Ten Harmsel
wrote:
>
> All Joost is saying is that most resources can be overcommitted, since
> all the users will not be using all their resources at the same time.
>
Don't want to sound like a broken record, but this is precisely
On Mon, Jan 18, 2016 at 10:33 PM, wrote:
>
> Sharing files can be done via SCP/SFTP. If a VPN connection is used,
> then even NFS or FTP are possibilities.
I have 100 computers. I want a user on those 100 computers to be able
to share a file on their computer with just me.
Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 10:33 PM, wrote:
> >
> > Sharing files can be done via SCP/SFTP. If a VPN connection is used,
> > then even NFS or FTP are possibilities.
>
> I have 100 computers. I want a user on those 100 computers to be
Rich Freeman wrote:
> I do sometimes wonder how the #1 server OS in the world somehow lacks
> decent facilities for graphical remote login, and for sharing files
> across the network. (For the latter NFS is a real pain to set up in a
> remotely secure fashion - part of the
On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
> "J. Roeleveld" writes:
>
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On 17 January 2016 18:35:20 CET, Mick wrote:
> >> >
> >>
lee wrote:
> writes:
>
> > lee wrote:
> >
> >> Rich Freeman writes:
> >>
> >> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> >> Suppose you use a VPN connection. How do does the client
> >> >>
On Monday, January 18, 2016 09:45:28 PM Alec Ten Harmsel wrote:
> On Tue, Jan 19, 2016 at 01:46:45AM +0100, lee wrote:
> > "J. Roeleveld" writes:
> > > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> > >> "J. Roeleveld" writes:
> > >> > On 17 January
On Tuesday, January 19, 2016 01:46:45 AM lee wrote:
> "J. Roeleveld" writes:
> > On Monday, January 18, 2016 02:02:27 AM lee wrote:
> >> "J. Roeleveld" writes:
> >> > On 17 January 2016 18:35:20 CET, Mick
> >> > wrote:
> >> >
>
On Monday, January 18, 2016 08:35:20 PM Rich Freeman wrote:
> On Mon, Jan 18, 2016 at 7:57 PM, lee wrote:
> > Rich Freeman writes:
> >> On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> >>> Rich Freeman writes:
> However,
On Tuesday, January 19, 2016 01:57:38 AM lee wrote:
> Rich Freeman writes:
> > On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> >> Rich Freeman writes:
> >>> However, while an RDP-like solution protects you from some types of
> >>> attacks, it
On Tuesday, January 19, 2016 02:15:17 AM lee wrote:
> writes:
> > lee wrote:
> >> Rich Freeman writes:
> >> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> >> Suppose you use a VPN connection. How do does the client
On Monday, January 18, 2016 02:02:27 AM lee wrote:
> "J. Roeleveld" writes:
> > On 17 January 2016 18:35:20 CET, Mick wrote:
> >
> > [...]
> >
> >>I use the icaclient provided by Citrix to access my virtual desktop at
> >>work,
> >>but have never
On Sun, Jan 17, 2016 at 12:35 PM, Mick wrote:
> I use the icaclient provided by Citrix to access my virtual desktop at work,
> but have never tried to set up something similar at home. What opensource
> software would I need for this? Is there a wiki somewhere to
On Sunday 17 Jan 2016 13:10:42 Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
> > I would prefer a method that is independent of OS used. And provides
> > server side limitations with regards to filesharing and clipboard access.
> x2go is just X11,
On 17 January 2016 18:35:20 CET, Mick wrote:
>On Sunday 17 Jan 2016 16:51:00 J. Roeleveld wrote:
>> On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
>> > On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld
>wrote:
>> > > Actually, there are
On Sun, Jan 17, 2016 at 1:03 PM, J. Roeleveld wrote:
>
> I would prefer a method that is independent of OS used. And provides server
> side limitations with regards to filesharing and clipboard access.
>
x2go is just X11, so it should be OS-independent as long as you have a
On 17 January 2016 18:59:36 CET, Rich Freeman wrote:
>On Sun, Jan 17, 2016 at 12:35 PM, Mick
>wrote:
>> I use the icaclient provided by Citrix to access my virtual desktop
>at work,
>> but have never tried to set up something similar at home. What
"J. Roeleveld" writes:
> On 17 January 2016 18:35:20 CET, Mick wrote:
> [...]
>>I use the icaclient provided by Citrix to access my virtual desktop at
>>work,
>>but have never tried to set up something similar at home. What
>>opensource
lee wrote:
> Rich Freeman writes:
>
> > On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> >> Suppose you use a VPN connection. How do does the client
> >> (employee) secure their own network and the machine they're using
> >> to work remotely
Rich Freeman writes:
> On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
>> Suppose you use a VPN connection. How do does the client (employee)
>> secure their own network and the machine they're using to work remotely
>> then?
>
> Poorly, most likely. Your data
On Sun, Jan 17, 2016 at 7:26 PM, lee wrote:
> Rich Freeman writes:
>
>> However, while an RDP-like solution protects you from some types of
>> attacks, it still leaves you open to many client-side problems like
>> keylogging. I don't know any major
On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> Suppose you use a VPN connection. How do does the client (employee)
> secure their own network and the machine they're using to work remotely
> then?
Poorly, most likely. Your data is probably not nearly as important to
them as
Mick writes:
> On Saturday 16 Jan 2016 09:39:24 Alan McKinnon wrote:
>> On 16/01/2016 06:17, Grant wrote:
>> > I'm considering allowing some employees to work from home but I'm
>> > concerned about the security implications. Currently everybody shows up
>> > and logs
On Sunday, January 17, 2016 07:27:45 AM Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 6:38 AM, lee wrote:
> > Suppose you use a VPN connection. How do does the client (employee)
> > secure their own network and the machine they're using to work remotely
> > then?
>
> Poorly,
On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
> On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
> > Actually, there are several large corporations that use RDP-like
> > technologies. Although those are called "VDI" and usually use XenDesktop
> > on the
On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
>
> Actually, there are several large corporations that use RDP-like technologies.
> Although those are called "VDI" and usually use XenDesktop on the server side
> and "icaclient" on the client.
> Runs through HTTPS and
On Sunday 17 Jan 2016 16:51:00 J. Roeleveld wrote:
> On Sunday, January 17, 2016 10:46:38 AM Rich Freeman wrote:
> > On Sun, Jan 17, 2016 at 10:27 AM, J. Roeleveld wrote:
> > > Actually, there are several large corporations that use RDP-like
> > > technologies. Although those
On Sat, Jan 16, 2016 at 2:39 AM, Alan McKinnon wrote:
>
> As for the security levels of their personal machines, tell them what
> you require and from that point on you really have to trust your people
> so be security aware and with the program.
>
Most employers just
On Saturday 16 Jan 2016 09:39:24 Alan McKinnon wrote:
> On 16/01/2016 06:17, Grant wrote:
> > I'm considering allowing some employees to work from home but I'm
> > concerned about the security implications. Currently everybody shows up
> > and logs into their locked down Gentoo system and from
Grant wrote:
> I'm considering allowing some employees to work from home but I'm
> concerned about the security implications. Currently everybody shows
> up and logs into their locked down Gentoo system and from there is
> able to access the company webapps which are
On 01/15/2016 09:18 PM, waben...@gmail.com wrote:
> Grant wrote:
>
>> I'm considering allowing some employees to work from home but I'm
>> concerned about the security implications. Currently everybody shows
>> up and logs into their locked down Gentoo system and from
On 16/01/2016 06:17, Grant wrote:
> I'm considering allowing some employees to work from home but I'm
> concerned about the security implications. Currently everybody shows up
> and logs into their locked down Gentoo system and from there is able to
> access the company webapps which are
95 matches
Mail list logo