Questions tagged [remote-desktop]

Remote desktop is the ability to connect to a remote computer, see an image of that computer's desktop and interact with it as if it were local.

Remote desktop is the ability to connect to a remote computer, see an image of that computer's desktop and interact with it as if it were local.

179 questions
12
votes
2 answers

Why do scammers use victims' computers to remote-control their own computers?

I've seen videos showing how tech support scammers operate. In nearly all of these videos, the scammer instructs their intended victim to install and run remote-control software, which allows the scammer to control the victim's computer. No…
Psychonaut
  • 615
  • 4
  • 14
11
votes
3 answers

Is it insecure to have an SSH server on a workstation?

I know one systems administrator who runs SSH Server on his workstation to push files to it and check things from a phone but I think it is a bad idea for several reasons: An operations workstation is a sweet spot for the adversary. Once she is in,…
11
votes
2 answers

Does Microsoft Remote Desktop require a VPN to be secured?

I am connecting from my home Windows 7 machine to a hosted server Windows Server 2008 R2. I am connecting to it using Remote Desktop on a non-default port. I am wondering if I should go to the effort of setting up a VPN connection for Remote Desktop…
Mark Allison
  • 213
  • 1
  • 2
  • 6
11
votes
5 answers

Copy SSH Public Key from Windows to Ubuntu

I am trying to get my ssh public key from my windows client to ubuntu host, but I have no idea how to. I tried to find the authorized_keys file, but had zero success. ssh-copy-id command did not work from windows. I generated the public/private key…
user15791
  • 125
  • 1
  • 1
  • 4
10
votes
1 answer

unauthorized logging into my computer

I ve been suspecting someone logging into my computer because a couple of times, during the user log on screen I saw "Signed in remotely from.." The first timeIi saw some of my pictures copied on the desktop, the second time there were some folders…
10
votes
4 answers

Is Teredo in my router a back door?

I use the school computer, which I bought from school, administered by the IT-department. I opened a port to my computer when I stumbled upon this: It points to my computer IP. (I have a static IP to my router.) The contract says the IT-department…
Friend of Kim
  • 391
  • 2
  • 3
  • 12
9
votes
2 answers

What is considered an acceptable, secure method of remotely connecting to a Linux system?

Given that VNC and X11 were not developed with security in mind, what do people typically see done to remotely connect to a Linux system where a GUI is required. While SSH access alone might be preferred, often times there are requirements where a…
appsecguy
  • 435
  • 4
  • 12
8
votes
3 answers

Does setting a user password on Windows XP help protect against remote exploits compared to no password?

In a typical home user situation with a PC connected to the internet via a router, suppose we are not concerned with protecting the machine from people with physical access. Does setting a password on a Windows XP user account help secure the…
arjan
  • 183
  • 3
8
votes
4 answers

How can Antivirus differentiate between a Trojan and a normal remote desktop application software?

RAT (Remote Access Tool, e.g. Sub7) are considered malicious by Antivirus software. How can it distinguish between such patches and a client application for commercial software like NetSupport School?!
HSN
  • 1,188
  • 12
  • 23
7
votes
1 answer

How to deal with tunnel applications such as TeamViewer on the corporate network

Our IT department uses TeamViewer to provide support to users at remote locations. More recently we've noticed that users are using TeamViewer to get support for their lab equipment from vendors. Though I support the idea, it does bug me a little…
SilverViper
  • 171
  • 3
7
votes
5 answers

(SoHo) Multi-Factor Authentication for Remote Desktop Gateway

I am looking at implementing some sort of multi-factor authentication for a Remote Desktop Gateway at a small office (less than 20 users). Where would be a good place to start for a quality, economically-feasible solution for a small office? -Josh
Josh Brower
  • 1,366
  • 2
  • 13
  • 24
7
votes
1 answer

Is indirect access to a computer as bad as direct?

I'm deploying a web-based ERP system for a customer, such that both the server and the client machines will be inside the customer's intranet. I was advised not to allow the server machine to connect to the internet, but the clients won't have this…
mgibsonbr
  • 2,905
  • 2
  • 20
  • 35
7
votes
2 answers

Does using a VPN completely stop MITM (man in the middle) attacks? If not, what other defences should I consider?

Just for added context, I am curious about connecting to a remote desktop using a VPN but if there are any major differences that can be highlighted for other services I would be interested in that too.
Arlix
  • 1,459
  • 3
  • 13
  • 22
6
votes
1 answer

Incident Response - Which logs are of most interest following a social engineered remote desktop attack

Unfortunately, someone in my family fell for a phone scam after data was leaked from TalkTalk. As a result, they allowed remote access to two computers and transferred money from their bank account to the value of over £10,000. The money will be…
6
votes
1 answer

How do I verify exactly which cipher suite is in use for this Remote Desktop session?

You can configure Windows to use only certain cipher suites during things like Remote Desktop sessions. Cipher suites such as RC4 56 bit, RC4 128 bit, Triple DES 168 bit, etc. SSL/TLS is not in play here so I'm talking about RDP encryption. You can…
Ryan Ries
  • 949
  • 1
  • 10
  • 14
1
2
3
11 12