Dan Stromberg wrote:
Hi David.
Would you be willing to write up what you had to do to get NX to work?
I'm extremely interested in this... Especially since I'm finding
zebedee+VNC increasingly unreliable.
I don't suppose you've compared NX with LBX?
On Fri, 2005-01-21 at 14:05 +1100, david kwok
Hi
We are starting to integrate an LTSP environment in a company. I've already
installed an LTSP-Server(4.1) for testing with debian without any Problems.
Thanks for the good documentation!
Now to my question:
Is it possible to encrypt the traffic of X11 (vpn/ssh tunnel/etc.)? I've tried
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Am Donnerstag, 20. Januar 2005 13:22 schrieb Mischa:
Hi
We are starting to integrate an LTSP environment in a company. I've already
installed an LTSP-Server(4.1) for testing with debian without any Problems.
Thanks for the good documentation!
I've added just enough stuff to LTSP 4.1 to get it doing secure VNC (via
zebedee), rather than native X11. However, for endusers it will require
some kind of easier way of starting up an Xvnc with zebedee remotely.
Also, I understand someone on the list has been working on NX support
for LTSP,
Does anyone out there have some advice they could share with me on
security? My first real exposure to linux was this summer when we decided
to go all out and run all our school's dorm computers as LTSP stations...
Specifically my concern is this: On all our the PCs (yes, I'm paranoid,
and
At 11:13 21-9-02 -0400, you wrote:
big snip
Appreciate any pointers, even on security in general. T.I.A.
David M. Leuser, II
Assistant Network Administrator
New Hampton School
(603) 744-3182 x121
[EMAIL PROTECTED]
Hi David,
What I found very useful
Thank you for your detailed reply, I especially like #4! No worries, I
had no plans to chmod /etc...
The kids are 14 to 19years-- and I try not to underestimate them-- I'm
practically still a kid myself, and I know bmany/b personally at other
schools that have gained priveleges that they
David,
You have a tough job. Guarding against outside attacks is tough.
Guarding against untrusted users is tougher. Guarding against malicious
users is really tough!
You will find most of the available documentation relates to guarding
against outside attacks - i.e. firewalls, securing
On Sat, 21 Sep 2002, Jim Wildman wrote:
1) monitor
2) backups
3) prestaged
4) hire (viz. co-optinf jujitsu)
5) different root
6) Change password
7) Firewall
8) Complacency is your enemy.
hmmm ... I would add (it might be called part of 8, but lets
make it express):
9) Study all