I am sure that people can scan networks, find VNC servers, guess
passwords, etc., but this seems fairly rare.  I might have seen *one* scan
for port 5900 in two years of checking daily iplogs.  Things might change
any day now, so best to be cautious, but I don't imagine there have been a
lot of VNC attacks.  Many other services are being attacked on a daily
basis from all over the world.

Mike


On Tue, 24 Feb 2004, Scott C. Best wrote:

>       Heya. Yes, it's a safe bet that many people on this list have a
> router with port 5900 forward to a Windows machine. Of course, this
> increases "risk", but only some much as the integrity of what *listens*
> to that port, namely the VNC Server itself.
>
>       Of course, as I wrote back in Sept on a similar thread, I agree
> with you that VNC users should try to use a secure-tunnel whenever they
> VNC across the Internet. That just a inarguable Good Idea. For those
> using VNC to remotely administer their content- sensitive servers, I'm
> sure it's one of the first things done.
>
>       But even a secure tunnel isn't a panacea. To implement a good
> network security strategy (and/or a good network attack strategy), go
> after the biggest holes first. For VNC users, the biggest weakness isn't
> forwarding ports, it's choosing weak VNC passwords.
_______________________________________________
VNC-List mailing list
[EMAIL PROTECTED]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to