[WriteLog] IT WORKS!!![WriteLog]Anyone using WinVNC or PC Anywhere with WriteLog?

GilBaronW0MN gbaron@charter.net
Sun, 10 Mar 2002 10:32:23 -0600


> -----Original Message-----
> From: writelog-admin@contesting.com
> [mailto:writelog-admin@contesting.com]On Behalf Of Marty Tippin
> Sent: Sunday, March 10, 2002 10:20
> To: Don Hill AA5AU; WriteLog Reflector
> Subject: Re: [WriteLog] IT WORKS!!![WriteLog]Anyone using WinVNC or PC
> Anywhere with WriteLog?
>
>
> At 09:35 AM 3/10/2002, Don Hill AA5AU wrote:
> > From any PC connected to the Internet, I go to a
> >web browser and enter the IP address of my router.  My router has
> >been set up to allow a certain port to access a particular PC.
>
> For anyone running this kind of software from an always-on broadband
> internet connection (cable, DSL, ISDN, whatever), make absolutely
> sure you
> understand all of the security features that the software
> provides, change
> your password regularly and just generally be careful - putting remote
> control software on a computer connected to the public internet is just
> inviting hackers to come have a look around your computer. Once
> they get on
> your computer, they can get to any other computer in your home
> network. And
> then the fun begins.
>
> If WinVNC is a new program and/or a shareware program, you can expect the
> hackers to be working on ways to get into it and around it.
> PCAnywhere has
> been around long enough that the known exploits have mostly been
> found and
> fixed. I haven't seen WinVNC so can't say much about it.

I must add that you better be careful. The program is free but the data
traffic after connection is NOT ENCRYPTED, it is NOT  a VPN, so anyone that
intercepts the traffic sees it all.
BE CAREFUL what you send.
If anyone gets your passwords and signs on as you, they can do ANYTHING to
your machine INCLUDING sending you a TROJAN.





.
>
> But it has been common practice for hackers to interrogate every PC they
> can find to see if PCAnywhere is running on it (they check to see
> if the PC
> is listening on the appropriate port). Once a target is identified, they
> start trying to get in. You'd be surprised how many people run that
> software with absolutely NO security of any kind....
>
> I would advise restricting incoming access to the remote control software
> from a specific IP address or domain if possible.
>
> No need for paranoia, but just be aware of the risks and make
> sure you take
> appropriate precautions. Or that person working all the DX as AA5AU might
> just be someone else...
>
> -Marty NW0L
>   martyt@pobox.com
>
>
> _______________________________________________
> WriteLog mailing list
> WriteLog@contesting.com
> http://lists.contesting.com/mailman/listinfo/writelog