PPCGeeks

PPCGeeks (http://forum.ppcgeeks.com/index.php)
-   HTC Titan (http://forum.ppcgeeks.com/forumdisplay.php?f=44)
-   -   Remote Desktop (http://forum.ppcgeeks.com/showthread.php?t=28113)

maneetb 06-01-2008 03:17 AM

Remote Desktop
 
Hey everyone... I searched but i cant seam to find an answer to my question. I got remote desktop to work when my mogul is connected to the router that the computer is connected on... is it possible to use EVDO away from my home network? Preferably a free way! and if so can someone point me in the direction of a tutorial? Thank you!

holo 06-01-2008 03:26 AM

Re: Remote Desktop
 
Quote:

Originally Posted by maneetb (Post 301254)
Hey everyone... I searched but i cant seam to find an answer to my question. I got remote desktop to work when my mogul is connected to the router that the computer is connected on... is it possible to use EVDO away from my home network? Preferably a free way! and if so can someone point me in the direction of a tutorial? Thank you!

I don't understand the question here but I use remote desktop with very good results all the time without wifi (I don't even have wifi in my house). Forward the port in your router and just point remote desktop to your external IP address. There isn't a charge (assuming you have free data).

maneetb 06-01-2008 03:44 AM

Re: Remote Desktop
 
and how do I find my external ip address! that's not the simple 192.168.1.100 I assume.

So it works when using wifi for me but I just can't do it without being on the same network as the computer. I want to be able to control thecomputer from like school or work.

holo 06-01-2008 03:53 AM

Re: Remote Desktop
 
Quote:

Originally Posted by maneetb (Post 301281)
and how do I find my external ip address! that's not the simple 192.168.1.100 I assume.

So it works when using wifi for me but I just can't do it without being on the same network as the computer. I want to be able to control thecomputer from like school or work.

Your router should tell you, otherwise there are many sites out there that will tell you. A quick google gave this one: http://www.ipaddressworld.com/

Note that you will probably have to forward the port in your router (unless it supports UPNP and you have windows set to forward it automatically in your router (not sure if it will do this for remote desktop)...

If this is too confusing for you just try it with that address (and it may very well work without doing anything), if it doesn't work you will have to forward the port in your router. If it works now, ignore the next section:

This is accomplished usually by visiting http://192.168.1.1 on your home computer, logging into the router (often the password is simply admin with no username, otherwise you may need to look it up in your router's manual which is usually available online from your router manufacturer's website).

Go into the port forwarding area and forward port 3389 to your computer's internal IP (192.168.1.100). Note that this address can change if you have multiple computers connecting to your home network and you are using dhcp. You can set it to not change somewhere in your router config, or if you only have one computer on there it might not ever change and you might not have to worry about it.

Nickles 06-02-2008 04:30 PM

Re: Remote Desktop
 
Quote:

Originally Posted by holo (Post 301284)
Your router should tell you, otherwise there are many sites out there that will tell you. A quick google gave this one: http://www.ipaddressworld.com/

Note that you will probably have to forward the port in your router (unless it supports UPNP and you have windows set to forward it automatically in your router (not sure if it will do this for remote desktop)...

If this is too confusing for you just try it with that address (and it may very well work without doing anything), if it doesn't work you will have to forward the port in your router. If it works now, ignore the next section:

This is accomplished usually by visiting http://192.168.1.1 on your home computer, logging into the router (often the password is simply admin with no username, otherwise you may need to look it up in your router's manual which is usually available online from your router manufacturer's website).

Go into the port forwarding area and forward port 3389 to your computer's internal IP (192.168.1.100). Note that this address can change if you have multiple computers connecting to your home network and you are using dhcp. You can set it to not change somewhere in your router config, or if you only have one computer on there it might not ever change and you might not have to worry about it.

this was a tremendous help for me..
i can now remote, from my work location, to my home PC through my device.
when i jumped for joy and ran over to show my developer buddies 3 cubes down, they laughed at how seemingly unsecured this was.
however, i had to 'allow' incoming connections from my device IP address, before my Kaspersky firewall would accept that connection.

with that said, IS this really all that secure, and could anyone with a packet sniffer actually connect to my IP address and log in ?

I also DID port forward 3389 in my router admin.. should i un-do that ? or is that the action that actually allows this connection..
i'm just amazed at how simple it is now to be able to remote to my home machine like this ! but am slightly concerned at the security of it now...
any comments ?

calash 06-02-2008 04:53 PM

Re: Remote Desktop
 
Anytime you forward a port to a computer there is risk, you are opening a service up to the entire Internet. Was playing with SSH a while back, and in a matter of a few weeks I was getting hammered with brute force attacks daily.

Nickles 06-02-2008 05:55 PM

Re: Remote Desktop
 
Quote:

Originally Posted by calash (Post 302611)
Anytime you forward a port to a computer there is risk, you are opening a service up to the entire Internet. Was playing with SSH a while back, and in a matter of a few weeks I was getting hammered with brute force attacks daily.

If i removed the port forwarding, would i still be able to remote connect to that desktop ?
or is the forwarding of port 3389 the magic key to all of this..

holo 06-02-2008 06:01 PM

Re: Remote Desktop
 
Quote:

Originally Posted by Nickles (Post 302578)
this was a tremendous help for me..
i can now remote, from my work location, to my home PC through my device.
when i jumped for joy and ran over to show my developer buddies 3 cubes down, they laughed at how seemingly unsecured this was.
however, i had to 'allow' incoming connections from my device IP address, before my Kaspersky firewall would accept that connection.

with that said, IS this really all that secure, and could anyone with a packet sniffer actually connect to my IP address and log in ?

I also DID port forward 3389 in my router admin.. should i un-do that ? or is that the action that actually allows this connection..
i'm just amazed at how simple it is now to be able to remote to my home machine like this ! but am slightly concerned at the security of it now...
any comments ?

You have to forward this port for it to work. One way to make it more secure is to pick a random port and forward it for 3389 on your internal machine. You can, say, forward port 33421 to port 3389 on your internal machine. Then you enter your_ip:33421 into the remote desktop app. This would block 99% of people trying to get into your machine or looking for one to get into even if your remote desktop was not secure.

Remote desktop is secure though anyways, as long as you don't have any easy to guess passwords on accounts you allow remote connections on. Remote desktop is also encrypted so you can't just sniff it and connect. Many businesses use it.

If a security flaw is ever found in remote desktop, as long as you have windows update on, your computer will automatically patch it anyways, but changing the port will keep anyone looking for that kind of thing out.

Edit: use a port from about 10000 to 65535 (the maximum port number)....

holo 06-02-2008 06:05 PM

Re: Remote Desktop
 
Quote:

Originally Posted by Nickles (Post 302705)
If i removed the port forwarding, would i still be able to remote connect to that desktop ?
or is the forwarding of port 3389 the magic key to all of this..

Oh, and also, if you remove the port forwarding and it still works, that means windows is automatically forwarding the port through UPNP (a service which allows windows to request it's own port forwardings). If you can connect with it off, that means windows is effectively forwarding it's own port through your router and doing the same thing. See my above post for a more secure way to do this.

edit: In all actuality though it really doesn't matter anyways unless someone can guess your password or a security flaw was found in remote desktop. I keep mine on a different port anyways though because I'm paranoid.

killerkhatiby009 06-02-2008 06:44 PM

Re: Remote Desktop
 
you could also try installing logmein, which is a program that runs on your computer, and allows you to connect to it and do remote desktop from just about any internet enabled device. www.logmein.com

maneetb 06-02-2008 09:04 PM

Re: Remote Desktop
 
Holo you helped a lot!!! It works anywhere now! Thanks!

rainfreak 06-02-2008 09:27 PM

Re: Remote Desktop
 
Being in IT for over 12 years, I can tell you that any remote connectivity is a risky thing. I personally use LogMeIn for my home stuff just because it incorporates the computer/domain account logon as well as runs over SSL, for additional security. And it is not only very simple to setup and maintain, but it is also free. For my company's network, I use a two layer approach: VPN over SSL -> Remote Desktop.

As for changing the port number for which RDC is being forwarded on, that really doesn't matter. My area of expertise in IT has been network and infrastructure security for the last five years or so, and I have seen a lot of the tools that these "script kiddies" are using to hack into people's computers and networks. I have even used many of them, to get a better idea of how they work and what they are looking for, to ensure that my networks are as safe as possible. What I have found is that most of the port scanners that are typically used start at the higher port numbers anyway. Because these are the non-typical ports and are usually people trying to hide their legitmate port forwarding. Another reason is that many people download music/movies/etc. from torrents, emule, etc., and p2p protocols run on higher ports. For them to work correctly, these ports have to be forwarded. There are also some legitimate software applications that listen on high ports for seemingly no reason at all.

One of the best applicaitons for Windows password auditing and hacking is a commercial product called L0phtCrack, http://www.securityfocus.com/tools/1005. This can be run remotely and can crack a hard password (minimum of 8 characters with at least one alpha, one numeric and one non-alphanumeric character) in about thirty minutes (average). This same program, and many others just like it, are rampant on torrent sites and in other p2p sharing (emule, etc).

The worst part of all is that being hacked is almost never about what you have, but what they want to use your network connection for. Imagine this... you are hacked and the hacker downloads a bunch of child pornography to your computer, then uploads it to another hacked FTP server for distribution. When it comes down to it, if your IP address is traced, since you have no legitimate way to prove that you were hacked, you are now in trouble for downloading child pornography. And then distributing it. Or distributing copyrighted movies, music, software, etc. Does it really happen? Yup, all the time. For the first 6 years of my IT career I worked as a network administrator for three large Internet Service Providers. And I saw this exact scenario more than once, personally.

So if I were you I would just use LogMeIn, for free, and add the extra layer of security to your network. And check to see if UPNP is running on your Windows computers. Because if it is, and ports are being forwarded, you should find out what ports are being forwarded, and block them as well.

If you want to talk about it more, PM me, and we can discuss...

holo 06-03-2008 03:15 AM

Re: Remote Desktop
 
Quote:

Originally Posted by rainfreak (Post 302871)
Being in IT for over 12 years, I can tell you that any remote connectivity is a risky thing. I personally use LogMeIn for my home stuff just because it incorporates the computer/domain account logon as well as runs over SSL, for additional security. And it is not only very simple to setup and maintain, but it is also free. For my company's network, I use a two layer approach: VPN over SSL -> Remote Desktop.

As for changing the port number for which RDC is being forwarded on, that really doesn't matter. My area of expertise in IT has been network and infrastructure security for the last five years or so, and I have seen a lot of the tools that these "script kiddies" are using to hack into people's computers and networks. I have even used many of them, to get a better idea of how they work and what they are looking for, to ensure that my networks are as safe as possible. What I have found is that most of the port scanners that are typically used start at the higher port numbers anyway. Because these are the non-typical ports and are usually people trying to hide their legitmate port forwarding. Another reason is that many people download music/movies/etc. from torrents, emule, etc., and p2p protocols run on higher ports. For them to work correctly, these ports have to be forwarded. There are also some legitimate software applications that listen on high ports for seemingly no reason at all.

One of the best applicaitons for Windows password auditing and hacking is a commercial product called L0phtCrack, http://www.securityfocus.com/tools/1005. This can be run remotely and can crack a hard password (minimum of 8 characters with at least one alpha, one numeric and one non-alphanumeric character) in about thirty minutes (average). This same program, and many others just like it, are rampant on torrent sites and in other p2p sharing (emule, etc).

The worst part of all is that being hacked is almost never about what you have, but what they want to use your network connection for. Imagine this... you are hacked and the hacker downloads a bunch of child pornography to your computer, then uploads it to another hacked FTP server for distribution. When it comes down to it, if your IP address is traced, since you have no legitimate way to prove that you were hacked, you are now in trouble for downloading child pornography. And then distributing it. Or distributing copyrighted movies, music, software, etc. Does it really happen? Yup, all the time. For the first 6 years of my IT career I worked as a network administrator for three large Internet Service Providers. And I saw this exact scenario more than once, personally.

So if I were you I would just use LogMeIn, for free, and add the extra layer of security to your network. And check to see if UPNP is running on your Windows computers. Because if it is, and ports are being forwarded, you should find out what ports are being forwarded, and block them as well.

If you want to talk about it more, PM me, and we can discuss...

I've been in charge of security for 3 different internet providers in my >12 years of experience in IT, and I can say that there is VERY little security risk in forwarding a random port for remote desktop (although I admit I cannot say there is no security risk - but equivilent to logmein - read on). Although if there was a security risk shown for remote desktop, it would be possible to break into a machine, it would require A) the security risk to be a major risk involving remote access B) the person breaking in to not only be scanning for open machines, but to be looking specifically at the machine in question.

People do not routinely scan individual machines on all port numbers. If looking for a known security risk on a large number of machines, it is simply not efficient to scan all ports. This requires a large amount of time. It is much easier to check port 3389 on every machine, scanning all ports would require a large amount of time to check large networks.

If on the other hand, you had an enemy with a lot of knowledge really out to get you and watching your machine, it would not be unreasonable to expect them to discover the flaw and scan all ports on your machine, but with most security flaws it would be fixed within a few days. With windows update enabled this would generally be fixed before any enemy would have a chance to scan your entire machine and find the flaw and exploit it. But that would require them up on security knowledge, knowing you had remote desktop open, and scanning/checking security exploits every few days.

Let's be realistic here as well, it's not realistic to suggest VPN to remote desktop for users, as they do not have an external server that will support a VPN connection in, and forwarding the proper ports/protocols (depending on the type of VPN connection) to their main machine would create as many security risks (or many more) as forwarding a random port to be used for remote desktop. Not only that but it is a huge PITA to set up anyways for a normal user.

All in all, remote desktop on a random port is as or more secure than logmein because not only are you not trusting a 3rd party with your information, you are not making it publicly known that you are allowing connections, and also logmein can be broken into by brute force (by trying all available passwords) just as easily as remote desktop (assuming they know you are running either).

Basically, unless you have someone seriously out to break into your machine that is willing to watch your machine and security mailing lists like a hawk, you are just as or more secure running remote desktop on a random port as you are running logmein, or forwarding VPN to your main machine (although, sure, having a seperate server for VPN would be better, it's definitely not feasible for an average user). There is little to no risk involved in running remote desktop on a random port for the average user.

I do, however, agree that UPNP should not be forwarding this port or any additional ports directly as it creates a security hole. Generally, however, UPNP will not forward any defaultly open ports, but remote desktop may be forwarded as this is something you open yourself.

edit: by the way l0phtcrack requires a windows password file to crack the password, so it's use being mentioned here means nothing unless you already have access to the windows password file of the machine in question. This is certainly not the case when using a remote desktop exploit, or trying to bruteforce a password over remote desktop (it takes FAR longer over the internet - we're talking months/years for an 8 character password and FAR longer for anything more, and l0phtcrack will not do this, on top of that they would have to guess your username too, so we're talking many many MANY years to guess all possible combinations). Changing the port number also does matter, as it means they have to be looking directly at your machine instead of scanning large networks as most/all 'script kiddies' do. You have to have someone seriously after you specifically as mentioned above to scan all ports on your machine. LogMeIn is no more secure in this regard as it is FAR more likely that they would discover your password by breaking into logmein than bruteforcing remotedesktop on your machine.

rainfreak 06-03-2008 09:45 AM

Re: Remote Desktop
 
I am not going to get into a debate but strongly disagree with holo on several of his points above. But frankly I am tired (network maintenance until 3:00am this morning) and not in a very good mood and don't want to come across rude or get into an IT pissing contest. Long story short... I agree to disagree.

calash 06-03-2008 11:53 AM

Re: Remote Desktop
 
In the end it is about acceptable risk. What is the amount of risk you are willing to accept for the convenience?

With the multitude and speed of the port scanners out there I do not think I would feel comfortable entrusting my system to a random number...at least not without some other layers of protection.

holo 06-03-2008 11:56 AM

Re: Remote Desktop
 
Quote:

Originally Posted by calash (Post 303371)
In the end it is about acceptable risk. What is the amount of risk you are willing to accept for the convenience?

With the multitude and speed of the port scanners out there I do not think I would feel comfortable entrusting my system to a random number...at least not without some other layers of protection.

You're not entrusting your system to a random number.... It's not like there is a known exploit for remote desktop and you need a username/password to log in...

calash 06-03-2008 12:04 PM

Re: Remote Desktop
 
How many end user systems have passwords on there primary user accounts? By default Windows makes them admin accounts.

I won't even start with how many have user names like "user" "Computer"

When the screen goes blank, will the end-user know what it means or what to do?

Remote desktop control is a big risk, just for the level of interaction it provides, and the amount of access that is gained.

holo 06-03-2008 12:07 PM

Re: Remote Desktop
 
Quote:

Originally Posted by calash (Post 303380)
How many end user systems have passwords on there primary user accounts? By default Windows makes them admin accounts.

I won't even start with how many have user names like "user" "Computer"

When the screen goes blank, will the end-user know what it means or what to do?

Remote desktop control is a big risk, just for the level of interaction it provides, and the amount of access that is gained.

If I remember correctly, windows will not even allow remote desktop to accounts without passwords by default.

calash 06-03-2008 12:13 PM

Re: Remote Desktop
 
I thought of that after I posted, testing it as I type now. That still does not eliminate the risk IMHO.

But, as I said, it is about what the acceptable risk your willing to take. If people are willing to have there two levels of security be a random number and username/password then more power to them.

Edit: Depending on Group Policy settings you are correct and it needs an account that has a password. This is the default setting when Windows is installed, so it would have to have been changed for it to open a risk.

orionsbuckle 07-05-2008 02:36 PM

Re: Remote Desktop
 
ok this is what i have been looking for. im at work but im going to test out this software over the weekend. i need to access my home computer. my phone doesnt have enough storage on it. im constantly having to save files to my email just so i can access them from my phone its annoying. plus i have a web cam setup in the living room so i can see everyone in there. it would be cool to be able to see that from my phone. i may need help but ill b back if i do

samshady 07-07-2008 02:39 PM

Re: Remote Desktop
 
I've been impressed with logmein. I'm not sure just how secure it is though. Its very easy to set up and works well on my Mogul and from my work computer.

5tryk3r 07-07-2008 02:56 PM

Re: Remote Desktop
 
I have not tried logmein from my phone but have used it on several computers. It works very well for me being able to troubleshoot other peoples computers with out having to be there since it is a very small file they have to download and in most cases they dont even need to download it they can run it from the website. For my network at home i have also used hamachi with ultravnc which has seemed to be pretty secure, once again dont know if that would work on the phone or not guess i will need to try it as soon as i get my new phone.

techwoman 07-07-2008 06:34 PM

Re: Remote Desktop
 
if using logmein, what would I need on my phone to be able to access my home computer from it?

I have a mogul.

Not sure if I would actually do this as of yet, but would like to know.

I usually use Windows Remote desktop to work on client computers remotely.

rainfreak 07-07-2008 06:38 PM

Re: Remote Desktop
 
If you go to www.logmein.com from your phone and login, it will prompt you to download the software needed to remotely access and control your desktop PCs. Very simple to use and a small one time download.

techwoman 07-07-2008 07:26 PM

Re: Remote Desktop
 
Quote:

Originally Posted by rainfreak (Post 339466)
If you go to www.logmein.com from your phone and login, it will prompt you to download the software needed to remotely access and control your desktop PCs. Very simple to use and a small one time download.

Thank you:)

techwoman 07-07-2008 08:31 PM

Re: Remote Desktop
 
Does anybody know if there is there a tight VNC for a windows mobile 6 device?

rainfreak 07-08-2008 12:11 AM

Re: Remote Desktop
 
I have seen a few around...

Open Source (Older): http://www.cs.utah.edu/~midgley/wince/vnc.html

Open Source (Newer): http://dotnetvnc.sourceforge.net/

Commercial ($20 USD): http://www.mochasoft.dk/vncce.htm

Hope one of these is helpful...

orionsbuckle 07-08-2008 12:34 AM

Re: Remote Desktop
 
hey guys i just checked out this logmein program and its freaking awesome...just what i was looking for...i mean i dont have anything important on my computer and it has deep freeze so i doubt anyone could do anything. but it works easy i didnt even have to set anything up. just run the setup and it does it by itself

timewaster 07-08-2008 10:46 AM

Re: Remote Desktop
 
my problem with logmein is that after i log out, i cannot log in again and i have to reboot the pc i am logging into :(
i have not been able to figure out what is causing this since i seem to be the only one with this problem.

techwoman 07-08-2008 02:57 PM

Re: Remote Desktop
 
Quote:

Originally Posted by rainfreak (Post 339895)
I have seen a few around...

Open Source (Older): http://www.cs.utah.edu/~midgley/wince/vnc.html

Open Source (Newer): http://dotnetvnc.sourceforge.net/

Commercial ($20 USD): http://www.mochasoft.dk/vncce.htm

Hope one of these is helpful...

Thank you rainfreak :)

My boyfriend is a network admin and he is a freak for tight vnc so I will have him look at them for me. I guess everyone has their preferences, we are both techies as well but he is way way above me! He drives me nuts ](*,)

qbunnie 07-08-2008 08:08 PM

Re: Remote Desktop
 
Remote desktop is relatively secure so long as your windows account is password protected. Some ports will always be open. Using AIM, playing games, log me in, all open up ports, mostly without you knowing it. So just because you open a port doesn't mean your credit card number will be immediately stolen. Just make sure you have to enter a password and you should be OK. Here's how I look at it:
Yes, a hacker can get into my computer easier than somebody who has all but the most essential ports firewalled.
That same hacker can get into SOOOO many other people's computer soooo much easier. Namely those people who don't have a firewall at all. Of which there are plenty, I'm sure.
So why would he waste his time hacking a mediocre security setting like a password?
Def. not for a challenge, there are bigger fish for that too.
Also, if you were wondering, the reason you have to open a port for remote desktop is because the signal to establish a connection is from the outside coming in. When you do all those other things, the signal to establish a connection is from the inside going out. Thus your router/firewall gets a signal from inside you network (which it by default considers secure) and automatically opens that port as long as you use it. Outside your network is considered not secure, and your router/firewall will ignore any signals unless you manually open a port.
Finally, a somewhat more secure method would be to put time restrictions on when the port is open, an option on many routers. Like while you are at work, so the port is closed when you are at home and don't need it.


All times are GMT -4. The time now is 11:05 PM.

Powered by vBulletin® ©2000 - 2025, Jelsoft Enterprises Ltd.
©2012 - PPCGeeks.com


Content Relevant URLs by vBSEO 3.6.0