VNC as spyware on TV

Bryan A. Pendleton bp "at" geekdom.net
Tue, 26 Jun 2001 07:05:40 +0000


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

At 12:53 PM 6/25/2001, David Brodbeck wrote:
>Netmeeting uses TCP, I think.  However, typically of Microsoft, it picks 
>essentially random port numbers.  The official line is apparently that 
>you're supposed to open something like ports 1024 through 65,000 inclusive 
>if you want to make it work.  No thanks.

Actually, it uses H.323, which just happens to piggy-back on 
TCP/IP.  Unfortunately, for some good though currently proving 
short-sighted reasons, H.323 is a complete protocol which negotiates ports 
on the fly, and does that negotiating through an encrypted channel. That's 
not Microsoft's fault, except for using it... but, it does play pretty 
poorly next to VNC's "single port" desktop access.

- ----------

Bryan Pendleton
ICQ: 2680952
Phone: (650)714-7827
"The root of all knowledge lies within, but knowledge is useless unless it 
is collected and shared."

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBOzgjg9D5wNo1pnTcEQI3jwCg7LsJTiPsP65MU19XG9f6lgG61tYAoOZ/
pn8W2/w55785a8tu3AXR0JWJ
=zbCz
-----END PGP SIGNATURE-----
---------------------------------------------------------------------
To unsubscribe, send a message with the line: unsubscribe vnc-list
to majordomo "at" uk.research.att.com
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------