Java Eclipse Linux Operating Systems Web Technology Software Software Engineering Computing Societies
VNC is a very useful protocol for remotely controlling a machine. There are many free implementations, such as RealVNC and TightVNC. However, most of the free implementations are not secure. But it is possible to use the tunneling support of SSH to provide secure and encrypted access to the machine. (Note: commercial version of RealVNC and UltraVNC provides encryption. However, I have no first hand experience with them.)
sshd, either by , or by downloading cygwin and then Setting up sshd Note:
sshdserver can be installed on the same machine as the VNC server.
setup.exedoes not install ssh. Make sure that the appropriate packages are installed by clicking on the action column in the
sshdwas configured to run on on your system) on the machine on which
sshdis running. It is also a good idea to limit access to other ports on that machine for better security.
ssh -L 5901:127.0.0.1:5900 user@ssh-server-ip
127.0.0.1indicates that VNC is running on the same machine as the VNC server (if VNC is running on a different machine, substitute the address of the machine as seen by sshd).
5901is the port on the client machine whose traffic is to be tunneled.
5900is the port on which VNC server will listen for traffic on the VNC machine.
useris the user name that we will connect to the ssh machine as, and
ssh-sever-ipis the address of the machine on which sshd is running. Enter the password for
localhost:1. Type in the VNC password as usual.
References: SSH VNC Tunneling
Written by Mike Kwong