Quick Way to Access Remotely Your GNU / Linux Desktop - Access Linux Desktop from Mac and Windows 7

Total Page:16

File Type:pdf, Size:1020Kb

Quick Way to Access Remotely Your GNU / Linux Desktop - Access Linux Desktop from Mac and Windows 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Quick way to access remotely your GNU / Linux Desktop - Access Linux Desktop from Mac and Windows 7 Author : admin For M$ Windows users its always handy to have remote access to your home PC or notebook via Remote Desktop (RDP) protocol. However in GNU / Linux, there is no native implementation of RDP protocol. So if you're using Linux as your Desktop like me you will probably want to be able to access the Linux system remotely not only via terminal with SSH using (Putty) or MobaXTerm all in one tabbed Windows terminal program but also be able to use your Linux GNOME / KDE Graphical environment from anywhere on the Internet. This will make you ponder - Is it possible to access Linux Desktop via proprietary RDP protocol and if not how you can achieve remote GUI access to Linux? 1. Using Linux Xorg and Xming Xserver for Windows Most people should already know of Linux ability to start multiple Xserver sessions remotely which is the native way to access between two Linux hosts or access remotely Linux from other Linux UNIX like OS. It is also possible to use xinit / startx / xhost commands to establish remotely connection to new or running Linux (Xorg) Xserver by using them in combination with XMing - XServer for Windows running on the Windows host and Debian package (x11-xserver-utils) - providing xhost cmd, however this method is a bit complicated and not so convenient. I used to be using this method XMing (whose mirror is here), earlier in my university years to use remotely my Debian Linux from Windows 98 and this works perfectly fine. 2. Using RDP emulation with XRDP server in order to be able to access your desk from any friend or computer club in the world using standard available in MS Windows Remote Desktop client (mstsc.exe). There is also another alternative way by using Windows Desktop sharing RDP experimental server xrdp: 1 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog apt-cache show xrdp |grep -i descr -A 3 Description: Remote Desktop Protocol (RDP) server Based on research work by the rdesktop project, xrdp uses the Remote Desktop Protocol to present a graphical login to a remote client. xrdp can connect to a VNC server or another RDP server. To make your Linux host accessible via RDP: On Debian / Ubuntu etc. deb based Linux: apt-get update apt-get install xrdp $ /etc/init.d/xrdp status Checking status of Remote Desktop Protocol server xrdp [ OK ] Checking status of RDP Session Manager sesman /etc/init.d/xrdp start On Fedora Linux: yum -y install xrdp systemctl enable xrdp.service systemctl start xrdp.service systemctl enable xrdp-sesman.service systemctl start xrdp-sesman.service It is possible to access remote Linux host using xrdp RDP server, but this will only work in older releases 2 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog of mstsc.exe (Windows XP / Vista / 2003) and will not work on Windows 7 / 8, because in MS Windows 7 and onwards RDP proto version has changed and the client no longer has compatability with older mstsc releases. There is a work around for this for anyone who stubbornly want to use RDP protocol to access Linux host. If you want to connect to xrdp from Windows 7 you have to copy the old RDP client (mstsc.exe and mstscax.dll) from a WinXP install to the Windows 7 box and run it independently, from the default installed ones, anyways this method is time consuming and not really worthy ... 3. Using the VNC withTightVNC server / client Taking above in consideration, for me personally best way to access Linux host from Windows and Mac is to use simply the good old VNC protocol with TightVNC. TightVNC is cross-platform free and open source remote Desktop client it uses RFB protocol to control another computer screen remotely. To use tightvnc to access remote Debian / Ubuntu - deb based Linux screen, tightvncserver package has to be installed: apt-cache show tightvncserver|grep -i desc -A 7 Description-en: virtual network computing server software VNC stands for Virtual Network Computing. It is, in essence, a remote display system which allows you to view a computing `desktop' environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. This package provides a server to which X clients can connect and the server generates a display that can be viewed with a vncviewer. -- apt-get --yes install tightvncserver ... TightVNCserver package is also available in default repositories of Fedora / CentOS / RHEL and most 3 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog other RPM based distros, to install there: yum -y install tightvnc-server ... Once it is installed to make tightvncserver running you have to start it (preferrably with non-root user), usually this is the user with which you're using the system: tightvncserver You will require a password to access your desktops. Password: Verify: Would you like to enter a view-only password (y/n)? n New 'X' desktop is rublev:4 Creating default startup script /home/hipo/.vnc/xstartup Starting applications specified in /home/hipo/.vnc/xstartup Log file is /home/hipo/.vnc/rublev:4.log 4 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog To access now TightVncserver on the Linux host Download and Install TightVNC Viewer client note that you need to download TightVNC Java Viewer JAR in ZIP archive - don't install 32 / 64 bit installer for Windows, as this will install and setup TightVNCServer on your Windows - and you probably don't want that (and - yes you will need to have Oracle Java VM installed) ... Once unzipped run tightvnc-jviewer.jar and type in the IP address of remote Linux host and screen, 5 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog where TightVNC is listening, as you can see in prior screenshot my screen is :4, because I run tightvnc to listen for connections in multiple X sessions. once you're connected you will be prompted for password, asker earlier when you run tightvncserver cmd on Linux host. If you happen to be on a Windows PC without Java installed or Java use is prohibited you can use TightVNC Viewer Portable Binary (mirrored here) If you have troubles with connection, on Linux host check the exact port on which TightVncServer is running: ps ax |grep -i Tightvnc 8630 pts/8 S 0:02 Xtightvnc :4 -desktop X -auth /var/run/gdm3/auth-for- hipo-7dpscj/database -geometry 1024x768 -depth 24 -rfbwait 120000 -rfbauth /home/hipo/.vnc/passwd -rfbport 5904 -fp /usr/share/fonts/X11/misc/,/usr/share/fonts/X11/Type1/,/ usr/share/fonts/X11/75dpi/,/usr/share/fonts/X11/100dpi/ -co /etc/X11/rgb 6 / 7 Walking in Light with Christ - Faith, Computing, Diary Articles & tips and tricks on GNU/Linux, FreeBSD, Windows, mobile phone articles, religious related texts http://www.pc-freak.net/blog Then to check, whether the machine you're trying to connect from doesn't have firewall rules preventing the connection use (telnet) - if installed on the Windows host: telnet www.pc-ferak.net 5904 Trying 192.168.56.101... Connected to 192.168.56.101. Escape character is '^]'. RFB 003.008 telnet> quit Connection closed. 7 / 7 Powered by TCPDF (www.tcpdf.org).
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Institutionen För Datavetenskap Department of Computer and Information Science
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A—14/015--SE 6/28/14 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping Final thesis Implementing extended functionality for an HTML5 client for remote desktops by Samuel Mannehed LIU-IDA/LITH-EX-A--14/015--SE June 28, 2014 Supervisors: Peter Åstrand (Cendio AB), Maria Vasilevskaya (IDA) Examiner: Prof. Simin Nadjm-Tehrani På svenska Detta dokument hålls tillgängligt på Internet – eller dess framtida ersättare – under en längre tid från publiceringsdatum under förutsättning att inga extra-ordinära omständigheter uppstår. Tillgång till dokumentet innebär tillstånd för var och en att läsa, ladda ner, skriva ut enstaka kopior för enskilt bruk och att använda det oförändrat för ickekommersiell forskning och för undervisning. Överföring av upphovsrätten vid en senare tidpunkt kan inte upphäva detta tillstånd. All annan användning av dokumentet kräver upphovsmannens medgivande. För att garantera äktheten, säkerheten och tillgängligheten finns det lösningar av teknisk och administrativ art. Upphovsmannens ideella rätt innefattar rätt att bli nämnd som upphovsman i den omfattning som god sed kräver vid användning av dokumentet på ovan beskrivna sätt samt skydd mot att dokumentet ändras eller presenteras i sådan form eller i sådant sammanhang som är kränkande för upphovsmannens litterära eller konstnärliga anseende eller egenart. För ytterligare information om Linköping University Electronic Press se förlagets hemsida http://www.ep.liu.se/ In English The publishers will keep this document online on the Internet - or its possible replacement - for a considerable time from the date of publication barring exceptional circumstances.
    [Show full text]
  • Third-Party License Acknowledgments
    Symantec Privileged Access Manager Third-Party License Acknowledgments Version 3.4.3 Symantec Privileged Access Manager Third-Party License Acknowledgments Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright © 2021 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. 2 Symantec Privileged Access Manager Third-Party License Acknowledgments Contents Activation 1.1.1 ..................................................................................................................................... 7 Adal4j 1.1.2 ............................................................................................................................................ 7 AdoptOpenJDK 1.8.0_282-b08 ............................................................................................................ 7 Aespipe 2.4e aespipe ........................................................................................................................
    [Show full text]
  • Working from Home Efficiently, Ethically and Securely by Sharon D
    Working From Home Efficiently, Ethically and Securely by Sharon D. Nelson, Esq., John W. Simek and Michael C. Maschke © 2020 Sensei Enterprises, Inc. The world is trying to deal with the COVID-19 in a variety of ways. Controlling the spread of the deadly virus is at the top of the list. Travel is being restricted, and some countries have even closed their borders. The United States was slow to react, but eventually states imposed restrictions for business operations to reduce the coronavirus spread and then began re-opening in phases. Social distancing and maintaining clean hygiene practices are the normal mode of operation now. More and more businesses are allowing their employees to stay at home where possible. What does that mean for the practice of law? How will you meet with clients? Most firms have adopted a telework environment and allow their employees to work from home, even while some firms have begun re-opening. Working from home has different consequences depending on your current capabilities and whether a plan is already in place. While we can’t cover all the possibilities and capabilities of every law firm, we’ll attempt to attack some of the common considerations. Equipment Let’s start with a very basic item…the computer. Hopefully, everyone is already using a laptop as their main office machine. As expected, some popular models of laptops are still in short supply. Worst case, you may have to find a Best Buy, Target, Walmart, etc. and see if you can purchase a consumer-grade machine. If you planned properly, laptop users are already configured for remote access.
    [Show full text]
  • Free Open Source Vnc
    Free open source vnc click here to download TightVNC - VNC-Compatible Remote Control / Remote Desktop Software. free for both personal and commercial usage, with full source code available. TightVNC - VNC-Compatible Remote Control / Remote Desktop Software. It's completely free but it does not allow integration with closed-source products. UltraVNC: Remote desktop support software - Remote PC access - remote desktop connection software - VNC Compatibility - FileTransfer - Encryption plugins - Text chat - MS authentication. This leading-edge, cloud-based program offers Remote Monitoring & Management, Remote Access &. Popular open source Alternatives to VNC Connect for Linux, Windows, Mac, Self- Hosted, BSD and Free Open Source Mac Windows Linux Android iPhone. Download the original open source version of VNC® remote access technology. Undeniably, TeamViewer is the best VNC in the market. Without further ado, here are 8 free and some are open source VNC client/server. VNC remote access software, support server and viewer software for on demand remote computer support. Remote desktop support software for remote PC control. Free. All VNCs Start from the one piece of source (See History of VNC), and. TigerVNC is a high- performance, platform-neutral implementation of VNC (Virtual Network Computing), Besides the source code we also provide self-contained binaries for bit and bit Linux, installers for Current list of open bounties. VNC (Virtual Network Computing) software makes it possible to view and fully- interact with one computer from any other computer or mobile. Find other free open source alternatives for VNC. Open source is free to download and remember that open source is also a shareware and freeware alternative.
    [Show full text]
  • VNC User Guide 7 About This Guide
    VNC® User Guide Version 5.3 December 2015 Trademarks RealVNC, VNC and RFB are trademarks of RealVNC Limited and are protected by trademark registrations and/or pending trademark applications in the European Union, United States of America and other jursidictions. Other trademarks are the property of their respective owners. Protected by UK patent 2481870; US patent 8760366 Copyright Copyright © RealVNC Limited, 2002-2015. All rights reserved. No part of this documentation may be reproduced in any form or by any means or be used to make any derivative work (including translation, transformation or adaptation) without explicit written consent of RealVNC. Confidentiality All information contained in this document is provided in commercial confidence for the sole purpose of use by an authorized user in conjunction with RealVNC products. The pages of this document shall not be copied, published, or disclosed wholly or in part to any party without RealVNC’s prior permission in writing, and shall be held in safe custody. These obligations shall not apply to information which is published or becomes known legitimately from some source other than RealVNC. Contact RealVNC Limited Betjeman House 104 Hills Road Cambridge CB2 1LQ United Kingdom www.realvnc.com Contents About This Guide 7 Chapter 1: Introduction 9 Principles of VNC remote control 10 Getting two computers ready to use 11 Connectivity and feature matrix 13 What to read next 17 Chapter 2: Getting Connected 19 Step 1: Ensure VNC Server is running on the host computer 20 Step 2: Start VNC
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • Distance Learningʼs Impact on Education IT
    Key Insights Distance Learningʼs Impact on Education IT The changes taking place in the education COVID-19 caused an acceleration of K-12 education’s technology landscape as a result of the digital roadmap in three key areas: coronavirus school closures are extensive — and many will be permanent or evolving. Closing the “homework gap” to enable digital However, the rapid speed of change is creating learning. Mobile hotspots are increasingly going home, with students, new challenges for IT teams. creating an "always-connected" online learning dynamic1 New research by Absolute examines the Enabling remote and hybrid learning models. effects of distance learning on endpoint 75% of schools intend to operate remote or hybrid models2 health, device usage, safety, and security as schools adapt to remote and hybrid learning Protecting students, staff, and schools from cyberattacks. 60% of all malware attacks (particularly ransomware) occur in models in the 2020/21 school year. education3 To better understand what is happening on the ground, Millions of Absolute- 10,000 Schools and 12 analyst reports and Absolute studied: enabled devices districts peer research This is what we discovered… Reliance on devices to drive IT teams are doing School devices are mainly learning outcomes has more with less. being used for learning. While federal stimulus packages may help increased. 40% in the short term, long-term budgets are 16% YouTube, Edgenuity®, uncertain: Google Docs™, and 5% Google Classrooms 61% 28% are where most 11% students are increase in
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Use of Remote Desktop Protocol in Ddos Attacks
    Security Advisory 2021-005 Use of Remote Desktop Protocol in DDoS Attacks January 26, 2021 — v1.0 TLP:WHITE History: • 26/01/2021 — v1.0 – Initial publication Summary DDoS attacks were observed recently, where Microsoft Remote Desktop Protocol (RDP) was abused in order to reflect and amplify the amount of bandwidth involved. This is not a vulner- ability by itself, but an abuse of the RDP protocol design [1]. Attacks using this technique were observed with sizes range from 20-750 Gbps [2]. Technical Details The Remote Desktop Protocol (RDP) service is included in Microsoft Windows operating sys- tems. It provides authenticated remote access to Windows-based workstations and servers. RDP can be configured to run on TCP and/or UDP. By default both use port 3389. When enabled on UDP, the Microsoft Windows RDP service may be abused to launch UDP re- flection/amplification attacks with an amplification ratio of 85.9:1. The amplified attack traffic consists of non-fragmented UDP packets sourced from UDP/3389 and directed towards the destination IP address(es) and UDP port(s) of the attacker’s choice. The collateral impact of RDP reflection/amplification attacks affects also the organizations whose Windows RDP servers are abused as reflectors/amplifiers. This may include partial or full interruption of mission-critical remote-access services, as well as additional service disruption due to transit capacity consumption, state-table exhaustion of stateful firewalls, load balancers, etc. Filtering of all UDP/3389-sourced traffic by network operators may potentially block also legitimate traffic, including legitimate RDP remote session replies [2].
    [Show full text]
  • Overview of a Password Vulnerability in Siemens Hmis
    Gardiner, J. , & Rashid, A. (2020). Technical Report: Gone in 20 Seconds -- Overview of a Password Vulnerability in Siemens HMIs. Unpublished. https://arxiv.org/abs/2009.03961v1 Early version, also known as pre-print Link to publication record in Explore Bristol Research PDF-document This is the submitted manuscript (SM). It first appeared online via arXiv at https://arxiv.org/abs/2009.03961v1. Please refer to any applicable terms of use of the publisher. University of Bristol - Explore Bristol Research General rights This document is made available in accordance with publisher policies. Please cite only the published version using the reference above. Full terms of use are available: http://www.bristol.ac.uk/red/research-policy/pure/user-guides/ebr-terms/ Technical Report: Gone in 20 Seconds - Overview of a Password Vulnerability in Siemens HMIs Joseph Gardiner and Awais Rashid Bristol Cyber Security Group, University of Bristol Bristol, UK fjoe.gardiner,[email protected] Abstract— Siemens produce a range of industrial human Human machine interfaces (HMIs) primarily refer to a machine interface (HMI) screens which allow operators to both physical device which is designed to be installed in physical view information about and control physical processes. For proximity to a physical process. HMI screens are programmed scenarios where an operator cannot physically access the screen, Siemens provide the SM@rtServer features on HMIs, which to both provide a display of information relating to the when activated provides remote access either through their own physical process below, as well as allow operators to provide Sm@rtClient application, or through third party VNC client inputs to the control system to control and manage physical software.
    [Show full text]