Categories
Remote access Smartwatch

Inovato Quadra Review, Part 5: Remote Access (or Not!) – Virtualization Review


Inovato Quadra Review, Part 5: Remote Access (or Not!)

Over the span of four previous articles, I’ve taken a close look at the Inovato Quadra, a low-cost ($29) alternative to the Raspberry Pi (RPi). In this article, I will test a use case for the Quadra that is not among those listed on Inovato’s web site — accessing remote virtual and physical desktops. To attempt this, I will see if I can install an RDP and Horizon client on it.

RDP Client
RDP is perhaps the most common method to connect to a remote Windows computer. There are clients for all of the major OSes, and all modern Windows systems come with an RDP one.

Linux has many different RDP clients, but I will be installing one that I have used and found very flexible in the past, Remmina, a very powerful tool that allows you to connect to other remote systems over various protocols such as SSH, VNC, FTP and, of course, RDP. I installed it by entering apt install remmina.

[Click on image for larger view.]

By default, Remmina only comes with SSH for connections and requires plugins for other remote protocols. I installed the RDP plug-in by entering apt install remmina-plugin-rdp. After doing this, I was able to connect to a Windows 10 system using RDP flawlessly from the Quadra.

[Click on image for larger view.]

Sharing Your Desktop
Once I found that I could access Windows systems from the Quadra, I wanted to see if I could allow remote access to my system. There are various methods and tools available to access Linux desktops remotely. Being that Linux was designed from the ground up to be a multi-user OS, you can access a new desktop or share an existing one on a system that a user has already logged in to. The most popular way to do this is by using VNC. There are many different VNC clients and servers, each with its own benefits and drawbacks.

To minimize issues, I will share my desktop — as opposed to having a new desktop created remotely — by using a VNC package called Vino. Instead of creating a new desktop session, Vino mirrors what is being displayed on the main session. To install Vino, I entered apt install vino.

Vino comes with a tool called gsettings to adjust its settings. To make things as straightforward as possible, I disabled all user confirmation, encryption and password requirements. I then started the server by entering:


gsettings set org.gnome.Vino prompt-enabled false
gsettings set org.gnome.Vino require-encryption false
gsettings set org.gnome.Vino authentication-methods “[‘none’]”
/usr/lib/vino/vino-server

From my laptop, I launched VNC Viewer for Google Chrome.

[Click on image for larger view.]

I entered the Quadra device’s IP address and was notified that I was going to have an unencrypted session.

[Click on image for larger view.]

After I selected Connect, it displayed the Quadra desktop that I was logged onto.

[Click on image for larger view.]

While the interactivity on the VNC screen was not as snappy as on the physical system, it was still usable.

I monitored the system while I was connected to it. During this time, I saw its CPU usage go up to 100 percent, with Firefox processes taking 33 percent, web content taking 27 percent and Vino taking 14 percent of the CPU cycles, respectively.

[Click on image for larger view.]

After a few minutes, the system overheated and shut down.

[Click on image for larger view.]

I proceeded to reset the device, restart the Vino server and connect to the system. I then monitored the system while working on a LibreOffice Writer document over the VNC connection. The CPU usage stayed below 6 percent, and the temperature stayed below 161 degrees. Upon reviewing the running processes, I saw that Vino was using 1 percent of the CPU cycles.

[Click on image for larger view.]

Attempting to Install the Horizon Client
VMware does have a Horizon client for ARM processors, which appears to have once been supported on generic ARM devices, but VMware now only supports it on ThinLinx Operating System (TLXOS) or Stratodesk NoTouch Operating System ARM systems. That said, other VMware products have been known to run on unsupported hardware, so I decided to attempt installing it on this device.

To download the Horizon client, I launched Firefox and navigated to: http://www.vmware.com/go/viewclients. Then, under VMware Horizon Client for Linux, I clicked VMware Horizon Client for 64-bit Linux.

[Click on image for larger view.]

I selected 2206.1 from the Version drop-down menu and downloaded it. Then, I opened a terminal and installed the Horizon client by entering:


cd ~/Downloads ## Change to the current user’s Download directory
chmod 755 VMware-Horizon-Client* ## Make the file executable
./ VMware-Horizon-Client-2106.1-8.3.1-18435609.x64.bundle –console

The –console switch allowed me to install from the command line rather than within the GUI interface.

When I entered /usr/bin/vmware-view, I got a message that some libraries were missing, including libcairo-gobject and libgtmkmm.

[Click on image for larger view.]

I tried various methods to get the Horizon client to install and run, but I gave up after a couple hours.

Summary
I was able to use the Quadra to connect to a Windows system using RDP and was also able to connect to it using Vino and VNC. While I did encounter some heat issues when running Vino with Firefox also running on the device, I didn’t experience this issue when editing documents and found the Vino-server process CPU usage to be negligible.

In this series of articles, I’ve used the Inovato Quadra for its intended purposes and then attempted to push the device beyond those limits. I didn’t have any issues when using the device for what it was designed for, but sometimes when I pushed the device beyond that level it did occasionally overheat. However, the folks at Inovato stated that they were working on a fan for the device, which may help alleviate some of these heat issues.

For under $30, the Quadra is all-in-all quite a capable little device and I would highly recommend it to anyone looking for a low-cost, yet fairly powerful computer to experiment with or to use as a lightweight home system. If you are looking to use it as a production edge computing device, I would suggest making sure that your applications will not over-stress the CPU or overheat it.

About the Author


Tom Fenton has a wealth of hands-on IT experience gained over the past 25 years in a variety of technologies, with the past 15 years focusing on virtualization and storage. He currently works as a Technical Marketing Manager for ControlUp. He previously worked at VMware as a Senior Course Developer, Solutions Engineer, and in the Competitive Marketing group. He has also worked as a Senior Validation Engineer with The Taneja Group, where he headed the Validation Service Lab and was instrumental in starting up its vSphere Virtual Volumes practice. He’s on Twitter @vDoppler.

Categories
Remote access Smartwatch

AWS Launches Verified Access for VPN-less Secure Remote Access – TechDecisions

Amazon Web Services (AWS) is launching the preview of AWS Verified Access, a new secure connectivity service designed to allow employees to enable local or remote secure access for corporate applications without a VPN.

The company says Verified Access is built using the AWS Zero Trust Security principles and leverages multiple security inputs to grant access to applications, but only when users and their devices meet specified security requirements.

According to AWS, security inputs include things such as user identity, role or the device’s security posture. The security control validates each application request, regardless of user or network, before granting access. This allows Verified Access to adapt the security posture based on changing conditions, and the service will disable access to applications if devices fall out of compliance.

In a blog, the company says AWS Verified Access can help provide secure access while eliminating some management roadblocks and making it easier to diagnose issues. AWS lists three key benefits: ease of use for IT administrators via a single configuration point, an open ecosystem that allows organizations to retain existing identity providers and device management tools, and ease of user for end users.

AWS Verified Access is available in preview in 10 AWS Regions: US East (Ohio, N. Virginia), US West (N. California, Oregon), Asia Pacific (Sydney), Canada (Central), Europe (Frankfurt, Ireland, London), and South America (São Paulo).

Pricing is based on usage, with no upfront or fixed price. The company will charge per application per hour, with tiers depending on the number of applications. Prices start in US East (N. Virginia) Region at $0.27 per verified Access endpoint and per hour. This price goes down to $0.20 per endpoint per hour when there are more than 200 applications.

There is a charge of $0.02 per GB for data processed by Verified Access, and organizations can also incur standard AWS data transfer charges for all data transferred using Verified Access.

<!–

–>

Categories
Remote access

VMware fixes three critical auth bypass bugs in remote access tool – BleepingComputer

VMware has released security updates to address three critical severity vulnerabilities in the Workspace ONE Assist solution that enable remote attackers to bypass authentication and elevate privileges to admin.

Workspace ONE Assist provides remote control, screen sharing, file system management, and remote command execution to help desk and IT staff remotely access and troubleshoot devices in real time from the Workspace ONE console.

The flaws are tracked as CVE-2022-31685 (authentication bypass), CVE-2022-31686 (broken authentication method), and CVE-2022-31687 (broken authentication control) and have received 9.8/10 CVSSv3 base scores.

Non-authenticated threat actors can exploit them in low-complexity attacks that don’t require user interaction for privilege escalation.

“A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application,” VMware describes the three security bugs.

Fixed in Workspace ONE Assist 22.10

The company patched them today with the release of Workspace ONE Assist 22.10 (89993) for Windows customers.

VMware also patched a reflected cross-site scripting (XSS) vulnerability (CVE-2022-31688) that enables attackers to inject javascript code in the target user’s window and a session fixation vulnerability (CVE-2022-31689) that allows authentication after obtaining a valid session token.

All vulnerabilities patched today have been found and reported to VMware by Jasper Westerman, Jan van der Put, Yanick de Pater, and Harm Blankers of REQON IT-Security.

In August, VMware warned admins to patch another critical authentication bypass security flaw in VMware Workspace ONE Access, Identity Manager, and vRealize Automation, enabling unauthenticated attackers to gain admin privileges.

One week later, the company revealed that proof-of-concept (PoC) exploit code was released online after the researcher who discovered and reported the vulnerability shared a PoC exploit.

In May, VMware patched an almost identical critical vulnerability, another authentication bypass (CVE-2022-22972) found by Bruno López of Innotec Security in Workspace ONE Access, VMware Identity Manager (vIDM), and vRealize Automation.

Source: https://news.google.com/__i/rss/rd/articles/CBMicmh0dHBzOi8vd3d3LmJsZWVwaW5nY29tcHV0ZXIuY29tL25ld3Mvc2VjdXJpdHkvdm13YXJlLWZpeGVzLXRocmVlLWNyaXRpY2FsLWF1dGgtYnlwYXNzLWJ1Z3MtaW4tcmVtb3RlLWFjY2Vzcy10b29sL9IBdmh0dHBzOi8vd3d3LmJsZWVwaW5nY29tcHV0ZXIuY29tL25ld3Mvc2VjdXJpdHkvdm13YXJlLWZpeGVzLXRocmVlLWNyaXRpY2FsLWF1dGgtYnlwYXNzLWJ1Z3MtaW4tcmVtb3RlLWFjY2Vzcy10b29sL2FtcC8?oc=5

Categories
Remote access Smartwatch

Remote Access Management Market Is Anticipated To Register Around 15.8% CAGR From 2022-2031 – Taiwan News

The Remote Access Management market is Likely to provide excellent returns among top industries worldwide right now that are on track to become the most profitable.

Report Highlights

Remote Access Management’s market report provides a comprehensive overview of key elements, including drivers, limitations, historical trends, current trends, technical development, and future growth. This report covers both system-dynamic approaches and technologies that will give business players an advantage over their competitors. This survey report covers the major market insights and industry approaches toward COVID-19 in the upcoming years.

SMART Objectives:

The relevant objective of this research aims to assist the user in understanding the market. It includes its definition, key-supply demand analysis, product specifications, production value, market segmentation (Type, Application, and Geographical), market potential, influential trends, and current market challenges. An extensive analysis of the projected market value for global Remote Access Management on the basic value and volume.


Categories
Remote access

Shieldoo. A zero-trust remote access tool with a peer-to-peer connection – PRUnderground

A new remote access tool comes on the market with a vision to be one the most exceptional tool with straightforward fees. As the company said, real usage-based pricing should not just save customers some needless expenses but also brings transparency into how users use remote access. Customers will only pay for users who were active in the actual month. It is built on technology from Slack and offers fast connection to servers and other devices remotely, thanks to peer-to-peer technology.

Shieldoo features a lightweight and seamless connectivity from anywhere in the world. Its plug-and-play design allows easy management without IT help. Users can maintain whole remote access with just a few clicks in the app.

High-level encryption and a suite of security solutions

Third-party app management and authentication are made easier with Single Sign-On (SSO). New users can access Shieldoo security tools using Google or Microsoft login credentials. Multi-factor authentication (MFA) confirms user login attempts across devices. Finally, Shieldoo reinforces security infrastructure with Zero Trust, granting the least privileged access to users through continuous authorisation.

Open-dev was the way

Shieldoo takes inspiration to deliver open-source, service provider-agnostic security from Slack Nebula. Simple and scalable, the security architecture is compatible even with legacy systems. In addition, Shieldoo upholds a no-log policy, where no user activity is seen or recorded. “Building a decentralised private network was one of the key goals we had in development,” commented Valdemar Zavadský, CTO of Shieldoo.

Launch accompanied by pirates

Shieldoo is coming to the market with a specific campaign to engage potential customers. The claim That´s the safe way connects the whole campaign and should embrace startups and small-medium businesses about the possibility of successfully managing their business security by themselves. “Shieldoo will ensure in this case that customers deal with secured remote access without any expensive external help,” added Zavadský.

 

You can learn more about Shieldoo at https://www.shieldoo.io

About Shieldoo

Decentralized zero-trust remote access tool for your business

Source: https://news.google.com/__i/rss/rd/articles/CBMib2h0dHBzOi8vd3d3LnBydW5kZXJncm91bmQuY29tL3NoaWVsZG9vLWEtemVyby10cnVzdC1yZW1vdGUtYWNjZXNzLXRvb2wtd2l0aC1hLXBlZXItdG8tcGVlci1jb25uZWN0aW9uLzAwMjc5MzEyL9IBc2h0dHBzOi8vd3d3LnBydW5kZXJncm91bmQuY29tL3NoaWVsZG9vLWEtemVyby10cnVzdC1yZW1vdGUtYWNjZXNzLXRvb2wtd2l0aC1hLXBlZXItdG8tcGVlci1jb25uZWN0aW9uLzAwMjc5MzEyL2FtcC8?oc=5

Categories
Remote access Smartwatch

VMware fixes three critical auth bypass bugs in remote access tool – BleepingComputer

VMware has released security updates to address three critical severity vulnerabilities in the Workspace ONE Assist solution that enable remote attackers to bypass authentication and elevate privileges to admin.

Workspace ONE Assist provides remote control, screen sharing, file system management, and remote command execution to help desk and IT staff remotely access and troubleshoot devices in real time from the Workspace ONE console.

The flaws are tracked as CVE-2022-31685 (authentication bypass), CVE-2022-31686 (broken authentication method), and CVE-2022-31687 (broken authentication control) and have received 9.8/10 CVSSv3 base scores.

Non-authenticated threat actors can exploit them in low-complexity attacks that don’t require user interaction for privilege escalation.

“A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application,” VMware describes the three security bugs.

Fixed in Workspace ONE Assist 22.10

The company patched them today with the release of Workspace ONE Assist 22.10 (89993) for Windows customers.

VMware also patched a reflected cross-site scripting (XSS) vulnerability (CVE-2022-31688) that enables attackers to inject javascript code in the target user’s window and a session fixation vulnerability (CVE-2022-31689) that allows authentication after obtaining a valid session token.

All vulnerabilities patched today have been found and reported to VMware by Jasper Westerman, Jan van der Put, Yanick de Pater, and Harm Blankers of REQON IT-Security.

In August, VMware warned admins to patch another critical authentication bypass security flaw in VMware Workspace ONE Access, Identity Manager, and vRealize Automation, enabling unauthenticated attackers to gain admin privileges.

One week later, the company revealed that proof-of-concept (PoC) exploit code was released online after the researcher who discovered and reported the vulnerability shared a PoC exploit.

In May, VMware patched an almost identical critical vulnerability, another authentication bypass (CVE-2022-22972) found by Bruno López of Innotec Security in Workspace ONE Access, VMware Identity Manager (vIDM), and vRealize Automation.

Categories
Remote access

Raspberry Pi Grants Remote Access Via PCIe (Sort Of) – Hackaday

[Jeff] found a Raspberry Pi — well, the compute module version, anyway — in an odd place: on a PCI Express card. Why would you plug a Raspberry Pi into a PC? Well, you aren’t exactly. The card uses the PCI Express connector as a way to mount in the computer and connect to the PC’s ground. The Pi exposes its own network cable and is powered by PoE or a USB C cable. So what does it do? It offers remote keyboard, video, and mouse (KVM) services. The trick is you can then get to the PC remotely even if you need to access, say, the BIOS setup screen or troubleshoot an OS that won’t boot.

This isn’t a new idea. In fact, we’ve seen the underlying Pi-KVM software before, so if you don’t mind figuring out your mounting options for a Raspberry Pi, you probably don’t need this board. Good thing too. Judging by the comments, they are hard to actually buy — perhaps, due to the chip shortage.

While it seems seductive to have a remote solution that doesn’t depend on fiddly software — or even what operating system you are using — [Jeff] notes that latency is relatively high, so you probably won’t be happy with it for any gaming or video. But that’s not really what it is for.

It did make us think, though. The PCI Express has 12V and 3.3V power and ground connections. Some motherboards even provide 3.3V when the computer is off. What else could you mount inside the computer with one of these things? Or what else could you do with this Pi card? Networked USB maybe?

We’ve seen a Pi get surgery to include a PCI bus, too. Or, you can opt for the easier surgical method. While plugging one of these KVM boards into a modified Pi would be pointless, we also think it would be amusing.


Source: https://news.google.com/__i/rss/rd/articles/CBMiU2h0dHBzOi8vaGFja2FkYXkuY29tLzIwMjIvMDkvMjAvcmFzcGJlcnJ5LXBpLWdyYW50cy1yZW1vdGUtYWNjZXNzLXZpYS1wY2llLXNvcnQtb2Yv0gEA?oc=5

Categories
Remote access

The importance of remote access to value-based care – from home and the community – go.beckershospitalreview.com

Health organizations across the United States are starting to develop value-based care models as they work towards providing higher-quality care for their patients. With the right tools, remote care can enable health organizations to provide even more access to care at home and in the community. This webinar will discuss how remote primary care can impact value-based programs, increase top-line revenue, and improve performance and quality indicators.

Attendees will learn about:

Source: https://news.google.com/__i/rss/rd/articles/CBMifWh0dHBzOi8vZ28uYmVja2Vyc2hvc3BpdGFscmV2aWV3LmNvbS9jbGluaWNhbC90aGUtaW1wb3J0YW5jZS1vZi1yZW1vdGUtYWNjZXNzLXRvLXZhbHVlLWJhc2VkLWNhcmUtZnJvbS1ob21lLWFuZC10aGUtY29tbXVuaXR50gEA?oc=5

Categories
Remote access Smartwatch

Penguin Computing to Acquire Remote Access Software Assets from Colorado Code Craft – HPCwire

Checking if the site connection is secure



Enable JavaScript and cookies to continue

www.hpcwire.com needs to review the security of your connection before proceeding.

Categories
Remote access Smartwatch

Penguin Computing to Acquire Remote Access Software Assets from Colorado Code Craft – HPCwire

Checking if the site connection is secure



Enable JavaScript and cookies to continue

www.hpcwire.com needs to review the security of your connection before proceeding.