Advertisement

Remote Connectivity

  • Charles Edge
  • Daniel O’Donnell

Abstract

As a security expert, consider this all-too-real scenario: a passenger sits in the airport, working on his computer, waiting for the plane to start boarding. While sitting there, surfing on the wireless airport network, he notices that almost every laptop in sight is a Mac. On a hunch, he opens Bonjour Browser to discover that many of these laptops have various remote management tools (the Apple Remote Desktop client or Screen Sharing, based on VNC), SSH or Telnet enabled. He also notices that many of these computers are not password-protected, and are therefore easily controllable by anyone with the gall to tap into the computer. Within 10 minutes, nearly all the laptop lids are closed with their owners suspiciously looking around, attempting to determine which passenger was entertaining them with the “joke of the day” on their display.

Keywords

Virtual Private Network Remote User System Preference Remote System Client Machine 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Charles Edge and Daniel O’Donnell 2016

Authors and Affiliations

  • Charles Edge
    • 1
  • Daniel O’Donnell
    • 1
  1. 1.MNUS

Personalised recommendations