LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 03-15-2006, 10:04 PM   #1
mazinoz
Member
 
Registered: Mar 2003
Location: Mansfield Queensland Australia
Distribution: Linux Mint - Tara
Posts: 497

Rep: Reputation: 35
Cool tightvnc - disabling 'remote administration' message


Does anyone know how to turn off the 'feature' in tightvnc where when you connect to a client's computer it displays a message 'remote administration enabled'.

The reason I want to do this is I want to use this on a network to monitor users behaviour as the PC's will be in a setup where hacking occurs both from the network side as well as via the internet. That is there is NO TRUSTED ZONE. I realise the message disappears eventually, but I would like to get rid of it entirely, so that I can
turn off vncviewer if no-one is using a PC in order to conserve resources, then restart it if someone uses a PC. I could just keep it running though.
 
Old 03-16-2006, 02:26 AM   #2
doc.nice
Member
 
Registered: Oct 2004
Location: Germany
Distribution: Debian
Posts: 274

Rep: Reputation: 34
this sounds like spying out users what is normally not allowed, even for Admins and BofHs...
 
Old 03-16-2006, 05:54 AM   #3
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
this sounds like spying out users
I concur. Combat cracking attempts by enforcing company policies, educating users, restricting system and network access and using a NIDS. AFAIK you need to have legal backing to be able to monitor traffic, wrt to local Law the company should have this checked with a lawyer. A company policy should be the framework for that. Accompanying procedures should see to it that data isn't abused and set limits wrt cases, retention etc, etc. Users should be aware they are monitored. AFAIK SANS has template policies to use.
 
Old 03-16-2006, 11:33 PM   #4
mazinoz
Member
 
Registered: Mar 2003
Location: Mansfield Queensland Australia
Distribution: Linux Mint - Tara
Posts: 497

Original Poster
Rep: Reputation: 35
It is an internet cafe where rival companies do come in and do hack the
linux and windows boxes and use physical intimidation as a backup. Police are fu**ing useless. I would like to be able to ban access to computers by people I know have hacked and to check out suspects. I have NIDS based on AIDS. Forget 'company policy', user education, restricting network access and similar as I said there is NO F****** TRUSTED ZONE! I make it clear that their behaviour will be monitored. Also I know of system and network administrators who use vncviewer type software to monitor suspicious activity on the network and they work in well-known companies. Even there you have users who persist in continuing despite company policies to load virus infected floppies etc, and ignoring warning messages about a virus being detected etc, hence the use of vncviewer. In an ideal world this would not be necessary, in the REAL world though it often happens.

Last edited by Capt_Caveman; 03-17-2006 at 12:35 AM.
 
Old 03-17-2006, 12:36 AM   #5
Capt_Caveman
Senior Member
 
Registered: Mar 2003
Distribution: Fedora
Posts: 3,658

Rep: Reputation: 69
@mazinoz: Please watch your language.
 
Old 03-17-2006, 06:23 AM   #6
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
It is an internet cafe
I really wished you explained your situation better in your initial post, but OK, clear.


I have NIDS based on AIDS.
I'm truely sorry to hear that. And here I thought baboons couldnt infect computers... :-]


Forget 'company policy', user education, restricting network access and similar as I said there is no fsckin trusted zone!
Not having any "trusted zones" does not mean you can't have a policy against illegal use of computers, unless you have other considerations like losing business.


Also I know of system and network administrators who use vncviewer type software to monitor suspicious activity on the network and they work in well-known companies.
And they are most likely backed by company policies allowing them to do so w/o legal repercussions.


So, unless you have to deal with considerations like losing business, you should be restricting access because it simply will make it easier to manage the whole thing so you can concentrate on the biggest rotten apples. Wrt vncviewer I think you'll need to hack the source yourself if you want to get rid of that message, besides that I think it's too laborious: there's keyloggers and apps that can record X sessions unattended. If the boxen run in Kiosk mode and you restrict access to stuff like process views (GRSecurity kernel patch) they wouldn't be able to find out.
 
Old 03-17-2006, 05:11 PM   #7
mazinoz
Member
 
Registered: Mar 2003
Location: Mansfield Queensland Australia
Distribution: Linux Mint - Tara
Posts: 497

Original Poster
Rep: Reputation: 35
When you say "restricting access" could you explain in detail, as I do indeed do this.

Do you mean

a. physical access
b. access to software

If b. the situation is not black and white, and yes it is a business and guess what I am trying to earn a living as well as provide a service, and if you restrict legitimate users access too much they bitch, although this can depend on the level of sophistication of the user as well.

AS I SAID I do have clearly stated policy regarding use of computers, hacking.

I am aware of keylogging and rootkits and what they can do. I have looked at Kiosk software, but find it TOO restrictive eg: have to add games which a lot of people want to do and also Office type products and so forth. Multimedia access and programs are also a popular activity on the internet. As are IM type programs. I have taken the opposite approach initially because I was doing this BEFORE the kiosk type projects got started, and removed software, modified KDE, linux versions of IM etc.

Anyway, thanks for the help you have provided though I could do without the sarcasm and patronisation.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Remote Administration brentos Red Hat 1 04-01-2004 11:04 AM
remote administration Digital_Err0r Linux - Newbie 1 03-22-2004 10:56 AM
TightVNC - Only one font available on Remote Desktop Apollo77 Linux - General 2 07-29-2003 08:09 PM
Remote Administration DavidPhillips Linux - General 4 04-13-2002 01:58 PM
REmote Administration gblydenburgh Linux - General 4 06-27-2001 08:36 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:16 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration