Cooking with Linux - My Desktop Lies over the Ocean

Because being there is open to interpretation.

The other option is an e-mail invitation, which is essentially the same thing, except the connection details are sent via e-mail rather than read over the phone. The only catch here is that you are sending the means to access your system via e-mail during that one-hour period. If you choose this option, you'll receive a warning about plain-text e-mail over the Internet and the wisdom of encrypting said e-mail. Click Continue to get past the warning, and a KMail message appears (with instructions on how to connect), ready for you to click Send. If no one answers the invitation, it disappears within an hour.

Before we move on, click Close to get past all those invitations, and we'll have a look at another means of providing access—uninvited connections (that's our mysterious Configure button). If sending an e-mail invitation presents interesting security concerns, a wide-open, permanent invitation should ring additional bells. Nevertheless, in an office environment, it also may be the sanest method of giving yourself access. Click the Configure button to bring up the Configure dialog from the KDE Control Centre (Figure 3). Yes, that is correct. This configuration dialog also is available by running the KDE Control Centre from the K menu (or by using the kcontrol command name) and looking under the Internet & Network menu for Desktop Sharing.

Figure 3. Creating a persistent, uninvited connection adds convenience, but don't ignore security.

If you check the Allow uninvited connections box, you still have to assign a password for connecting. Furthermore, you have the opportunity to “Confirm uninvited connections before accepting”. You also can decide whether to give those uninvited connections the ability to control the desktop. If you don't check the latter, users can give you control at any time by selecting the desktop sharing icon that appears in their system tray.

On the GNOME side of things, there's a program called Remote Desktop Sharing. On a typical GNOME setup, click System on the top menu bar, then look under Preferences for Remote Desktop (if you like, you can run the command directly using /usr/lib/vino/vino-server). The Remote Desktop Preferences menu appears as shown in Figure 4. Needless to say, I love the name.

Figure 4. GNOME's remote desktop invitation is run by a command named vino-server. Suddenly, I'm thirsty.

Some of this is going to look very familiar, because many of the questions mirror those of the KDE Control Centre configuration for desktop sharing. If you simply want to show what your desktop is doing (and let somebody follow along), click the Allow other users to view your desktop check box. If you are looking for help, or you want to help the person on the other end, make sure the person sharing checks the Allow box, second from the top. Users who want to leave a sharing session open all the time may decide to check the Ask you for confirmation button, so that a remote user has to have their permission. Finally, if this is an unattended connection, you'll surely want to assign a password to allow this connection to happen. Although it may not seem apparent here, you also can generate an e-mail invitation by clicking the command listed under Users can view your desktop using this command.

To connect to a remote shared desktop, you can use any VNC client—the GNOME vino-server program suggests vncviewer as the command to use—including a Java-enabled browser. The invitation e-mail tells you how to do this. The slicker, desktop-oriented way to do this is by using the tools provided by your desktop environment. The KDE Remote Desktop Connection program (Krdc) can be started from the Internet K Menu, where you'll see it listed as Remote Desktop Connection. From the dialog that pops up, you can enter the host connection information as shown in Figure 5.

Figure 5. Connecting with the KDE remote connection program—note the :0 at the end of the address.

The connection program can be used simply by entering the sharing host's address and pressing Connect. Another window appears asking you to specify the quality of your connection—whether it be a fast LAN connection, a slow dial-up connection or something in between. When you do connect, what happens depends on how the invitation was created. If the confirm option was set, a warning message appears on the remote desktop asking for confirmation. On the client side, you then may be asked for a password.

______________________

White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState