From: Adnan A. <cal...@ya...> - 2005-05-12 08:59:09
|
Thanks for your information and help. --- Steve Bostedor <sbo...@vn...> wrote: > Wow, that's pretty scary if you didn't install it > yourself. The server at > the very least needs to have a password set in order > to accept connections > unless it has been modified to accept no password. > Since the source code is > out there, it's pretty trivial to just let it use no > password and recompile. > > > VNC does get flagged as spyware and viruses and > there's another thread going > on right now discussing it. It is my opinion that > these anti-spyware > authors should accept certified binaries of software > before classifying well > known software as spyware. > > For example, the authors of TightVNC should be able > to submit the latest > build of the software to MS and get a checksum. > Their software should only > flag it if it doesn't match their checksum. > > > -----Original Message----- > > From: vnc...@li... > > > [mailto:vnc...@li...] > On Behalf > > Of Adnan Ali > > Sent: Wednesday, May 11, 2005 3:11 AM > > To: vnc...@li... > > Subject: RE: extra-light vnc > > > > Actually, last time I scanned my windows computer > with a > > spyware scanner, it came up with tightvnc which I > did not > > remember that I installed on it myself. > > > > [The spyware scanner though did not tag it as a > harmful > > application being a useful application otherwise]. > > > > I did not use tightvnc before this. So, I was > trying to find > > more about it. > > > > I think I have explained my reason and goal. Now, > the solution? > > > > Thanks, > > > > > > --- Steve Bostedor <sbo...@vn...> wrote: > > > What is it that you're trying to do? Perhaps > there is a solution > > > already out there but it depends on the goal. > > > > Discover Yahoo! Use Yahoo! to plan a weekend, have fun online and more. Check it out! http://discover.yahoo.com/ |