I use TightVNC behind my home LAN, but am open to alternative (free) suggestions.
Many's the time that I have wished that I could have remote access to my home PC (which must run Windows, for business reasons), generally just for a few minutes. Until now, I have avoided doing so, but it would be nice to have occasionally.
How could I reduce the attack vector?
I was thinking of coding a little Python script to run on the machine and react to a specially titled email, or the appearance & disappearance of a specially named (blank) file on a website, to start/stop the Tight VNC server. Of course, there is no guarantee of immediate, or even timely, delivery of email, and I don’t want to be permanently polling a website, but I could live with access after a few minutes of my action.
- Would that be a good mechanism?
- Is there something more secure?
- Any general hints & tips on reducing the attack vector on having a VNC server running, even if only for a few minutes, on my home PC (which probably allows access to everything behind the router if compromised)?
I prefer free solutions to paid, and off-the shelf to homebrew, but as a software developer I am not averse to rolling my own if needs must.
Obviously, I don’t want to take a security through obscurity approach.