- 1 -
Secure VNC Table of Contents
Chapter 1: Getting Started…………………………….…… 1
Chapter 2: Installation……………………………………... 5
Chapter 3: Using the Software…………………………...... 6
Bibliography: …………………………………………...… 7
- 2 -
Secure VNC Getting Started
Getting Started 1
Before we get started on installing the application on your computer, we are going to learn about a few terms dealing with this application so that you, the user, can get a better understanding of what exactly you are going to be installing.
What is a Virtual Desktop?
There are many definitions of a virtual desktop, but the definition we are using is being able to have access to another desktop through the use of our software. After installing the software, you are able to use certain features present on the virtual desktop and able to run them as if it was installed on your own personal desktop.
What is VNC?
VNC (Virtual Network Computing) is the software we are using to create the virtual desktop. The user, through this software, can view and fully-interact with one computer from any other computer or mobile device anywhere on the Internet, including your personal PC or laptop. Even if your computer is running Windows XP, you can still access a computer that is using Linux and operate both Windows and Linux on the same desktop. So it like using two operating systems at the same time, but one of them is not installed on your personal computer.
What is Secure Shell?
Secure Shell (SSH) is the program being used to authenticate you, the user, accessing the VNC and creating a secure connection between your computer and the virtual desktop you are accessing. With this secure connection, we are protecting whatever information you are transporting or accessing across the network. But how are we authenticating this process?
- 3 -
Secure VNC Getting Started
What is a RSA Key?
An RSA Key is the authentication protocol we are using to secure the VNC. The user will have to generate the key, which is 1024 bits, and placed the key in a file on the server. When you, the user, want to connect to the server, SSH will first negotiate an encrypted session, and then send the server the client's public key. The server checks that the public key is in the user's authorized keys. If so, the server sends the client a challenge which is a random number encrypted with the user's public key. If the client can then send back the random number unencrypted, it has just proven that it has the private key and is therefore authentic. But how is the user going to get the key in the first place and place it in the server file?
What is Plink?
Plink is a command-line interface to the SSH. When you run Plink, it will generate the RSA key you will use to access the server and the program will store that key in the cache under your username. This cache holds all the RSA keys being used to access the server.
Now that we have established some of the terms and processes being used in this software, let us begin installing.
- 4 -
Secure VNC Installation
Installation 2
Now we will begin installing the software on your computer. For purposes of this installation, we are assuming you are using Windows XP.
1.
Go to the download page located on redux.comp.ncat.edu
2.
Double click on SecureVNC.exe to download the software onto your computer.
- 5 -
Secure VNC Using the Software
Using the Software 3
We will now discuss how to use the Secure VNC software
1.
First double click the SecureVNC icon located on your Desktop.
2.
Enter in URL or IP, your username, and password in the appropriate fields.
3.
Press “Start Connection” to begin connection.
- 6 -
Secure VNC Bibliography
Bibliography 4
Acheson, Steve. “1.1 What is Secure Shell?” Onsight Inc. 25 March 2006
< http://www.onsight.com/faq/ssh/ssh-faq-1.html#ss1.1
>
Chapter 7: Using the command-line connection tool Plink. 17 January 2006. 27 March
2006 http://the.earth.li/~sgtatham/putty/0.58/htmldoc/Chapter7.html#plink
RealVNC. 2005. RealVNC Ltd. 25 March 2006 < http://www.vnc.com/ >
RSA key authentication. Jehsom. 11 November 2001. 25 March 2006
< http://www.runslinux.net/tech/ssh/node5.html
>
- 7 -