HomeBrainDump Page 5 - Secure Remote Desktop Sharing with VNC on Linux
Final Words - BrainDump
This article is the second half of a two-part series on secure remote desktop sharing with VNC. If you missed the first part, which appeared Monday on ASP Free, I'd suggest skimming through it, at least. The first part was an introduction to VNC connections and it focused on Windows. This one will get into the depths of configuration, optimization and explain ways to set up and benefit from VNCs on Linux platforms too.
We've come to the end of this article, therefore the end of the series too. I think that my two-part series should be useful and helpful. It should help you to realize many possibilities for securing connections. Encryption and SSH work wonders.
It might happen that some parts of this two part series were too hard and advanced but I certainly hope you could follow my instructions and understand what's happening behind the scenes. That way you can benefit from SSH tunneling for many other connections. Furthermore, you should be able to configure, optimize and secure all of your connections.
If you are facing some serious dilemmas or issues don't hesitate to contact us over at DevHardware Forums. It is definitely worth mentioning that we have a strong base of experienced members who are friendly and knowledgeable. Your question might be Linux or Windows related, SSH tunneling or even hardware, router or firewall configuration; you name it, we're there to help you.
Good luck and I really hope that my two-part series has boosted your level of understanding, shown you new ideas and opportunities.
Now that you know how to set up, configure, optimize and secure platform independent VNC connections, it should make you feel and act confidently like a real network and/or system administrator. You will be amazed at how many times you will find yourself benefiting from VNC connections, securing other users' connections, and feeling safe knowing that your connections can't be easily intercepted anymore.