-
Wa
chevron_right
Holy Guacamole!
pubsub.slavino.sk / warlord0blog · Friday, 18 November - 11:29 edit
- label
-
chevron_right
11 Best Tools to Access Remote Linux Desktop
GadgeteerZA · news.movim.eu / gadgeteerza-tech-blog · Wednesday, 9 February, 2022 - 17:09
-
chevron_right
DDoSers are abusing Microsoft RDP to make attacks more powerful
Dan Goodin · news.movim.eu / ArsTechnica · Saturday, 23 January, 2021 - 16:23
Accessing a remote desktop computer is made possible by the remote desktop protocol (RDP), a proprietary protocol developed by Microsoft. It gives a user a graphical interface to connect to another/remote computer over a network connection. FreeRDP is a free implementation of the RDP.
RDP works in a client/server model, where the remote computer must have RDP server software installed and running, and a user employs RDP client software to connect to it, to manage the remote desktop computer. In this article, they share a list of software (not all open source) for accessing a remote Linux desktop: the list starts off with VNC applications.
VNC (Virtual Network Computing) is a server-client protocol that allows user accounts to remotely connect and control a distant system by using the resources provided by the Graphical User Interface (GUI).
See https://www.tecmint.com/best-remote-linux-desktop-sharing-software/

Enlarge / Hacker attacking server or database. Network security, Database secure and personal data protection (credit: Getty Images)
DDoS-for-hire services are abusing the Microsoft Remote Desktop Protocol to increase the firepower of distributed denial-of-service attacks that paralyze websites and other online services, a security firm said this week.
Typically abbreviated as RDP, Remote Desktop Protocol is the underpinning for a Microsoft Windows feature that allows one device to log into another device over the Internet. RDP is mostly used by businesses to save employees the cost or hassle of having to be physically present when accessing a computer.
As is typical with many authenticated systems, RDP responds to login requests with a much longer sequence of bits that establish a connection between the two parties. So-called booter/stresser services, which for a fee will bombard Internet addresses with enough data to take them offline, have recently embraced RDP as a means to amplify their attacks, security firm Netscout said .