I am sure that people can scan networks, find VNC servers, guess passwords, etc., but this seems fairly rare. I might have seen *one* scan for port 5900 in two years of checking daily iplogs. Things might change any day now, so best to be cautious, but I don't imagine there have been a lot of VNC attacks. Many other services are being attacked on a daily basis from all over the world.
Mike On Tue, 24 Feb 2004, Scott C. Best wrote: > Heya. Yes, it's a safe bet that many people on this list have a > router with port 5900 forward to a Windows machine. Of course, this > increases "risk", but only some much as the integrity of what *listens* > to that port, namely the VNC Server itself. > > Of course, as I wrote back in Sept on a similar thread, I agree > with you that VNC users should try to use a secure-tunnel whenever they > VNC across the Internet. That just a inarguable Good Idea. For those > using VNC to remotely administer their content- sensitive servers, I'm > sure it's one of the first things done. > > But even a secure tunnel isn't a panacea. To implement a good > network security strategy (and/or a good network attack strategy), go > after the biggest holes first. For VNC users, the biggest weakness isn't > forwarding ports, it's choosing weak VNC passwords. _______________________________________________ VNC-List mailing list [EMAIL PROTECTED] To remove yourself from the list visit: http://www.realvnc.com/mailman/listinfo/vnc-list
