Home arrow BrainDump arrow Page 5 - Secure Remote Desktop Sharing with VNC on Linux

Final Words - BrainDump

This article is the second half of a two-part series on secure remote desktop sharing with VNC. If you missed the first part, which appeared Monday on ASP Free, I'd suggest skimming through it, at least. The first part was an introduction to VNC connections and it focused on Windows. This one will get into the depths of configuration, optimization and explain ways to set up and benefit from VNCs on Linux platforms too.

  1. Secure Remote Desktop Sharing with VNC on Linux
  2. Getting Started
  3. Setting up the Environment
  4. More Useful VNC Commands
  5. Final Words
By: Barzan "Tony" Antal
Rating: starstarstarstarstar / 16
April 24, 2007

print this article



We've come to the end of this article, therefore the end of the series too. I think that my two-part series should be useful and helpful. It should help you to realize many possibilities for securing connections. Encryption and SSH work wonders.

It might happen that some parts of this two part series were too hard and advanced but I certainly hope you could follow my instructions and understand what's happening behind the scenes. That way you can benefit from SSH tunneling for many other connections. Furthermore, you should be able to configure, optimize and secure all of your connections.

If you are facing some serious dilemmas or issues don't hesitate to contact us over at DevHardware Forums. It is definitely worth mentioning that we have a strong base of experienced members who are friendly and knowledgeable. Your question might be Linux or Windows related, SSH tunneling or even hardware, router or firewall configuration; you name it, we're there to help you.

Good luck and I really hope that my two-part series has boosted your level of understanding, shown you new ideas and opportunities.

Now that you know how to set up, configure, optimize and secure platform independent VNC connections, it should make you feel and act confidently like a real network and/or system administrator. You will be amazed at how many times you will find yourself benefiting from VNC connections, securing other users' connections, and feeling safe knowing that your connections can't be easily intercepted anymore.

Be safe!

>>> More BrainDump Articles          >>> More By Barzan "Tony" Antal

blog comments powered by Disqus
escort Bursa Bursa escort Antalya eskort


- Apple Founder Steve Jobs Dies
- Steve Jobs` Era at Apple Ends
- Google's Chrome Developer Tool Updated
- Google's Chrome 6 Browser Brings Speed to th...
- New Open Source Update Fedora 13 is Released...
- Install Linux with Knoppix
- iPad Developers Flock To SDK 3.2
- Managing a Linux Wireless Access Point
- Maintaining a Linux Wireless Access Point
- Securing a Linux Wireless Access Point
- Configuring a Linux Wireless Access Point
- Building a Linux Wireless Access Point
- Migrating Oracle to PostgreSQL with Enterpri...
- Demystifying SELinux on Kernel 2.6
- Yahoo and Microsoft Create Ad Partnership

Developer Shed Affiliates


Dev Shed Tutorial Topics: