>or else some rfb applications will be defined as viruses.
A virus is a program designed to spread from one computer to another.
AFAIK no RFB or VNC implementation is designed to do this. A worm is a
special kind of virus which spreads via networks (usually by exploiting a
security flaw).
A "trojan horse" OTOH is a program which pretends to be a legitimate
program but does something unexpected behind the scenes. I don't think VNC
falls into this category, even without the icon.
VNC could, however, be classified as "spyware" if used without the icon AND
there is no acceptable-use policy which explicitly states that "monitoring
software may be used at any time without warning".
If you want to be Big Brother, you must tell your users that or face the
consequences. The icon is a simple and inexpensive way of doing that, and
if you take proper precautions, VNC can be prevented from shutting down on
user request. You could also simply build a "don't shut down VNC" clause
into the AUP - users who have shut down VNC get a personal encounter with
some "sucker rod" [1].
[1] - See the syslogd(8) man page on most Linux systems.
--------------------------------------------------------------
from: Jonathan "Chromatix" Morton
mail: [EMAIL PROTECTED] (not for attachments)
big-mail: [EMAIL PROTECTED]
uni-mail: [EMAIL PROTECTED]
The key to knowledge is not to rely on people to teach you it.
Get VNC Server for Macintosh from http://www.chromatix.uklinux.net/vnc/
-----BEGIN GEEK CODE BLOCK-----
Version 3.12
GCS$/E/S dpu(!) s:- a20 C+++ UL++ P L+++ E W+ N- o? K? w--- O-- M++$ V? PS
PE- Y+ PGP++ t- 5- X- R !tv b++ DI+++ D G e+ h+ r++ y+(*)
-----END GEEK CODE BLOCK-----
---------------------------------------------------------------------
To unsubscribe, send a message with the line: unsubscribe vnc-list
to [EMAIL PROTECTED]
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------