SUSE Linux includes its own system of allowing remote connections via the YaST2 Remote Administration module. This relies on TightVNC (VNC stands for Virtual Network Computing), a piece of software that simply mirrors the remote desktop on the local machine. This is less secure than running programs via ssh because, although the password is sent encrypted, the actual data isn't encrypted.
Remote Administration is also designed to be used by two people. The idea is that one person invites another to access his PC, perhaps to enact repairs. As such, each user must confirm the connection, so it's not ideal for those who simply want to access their PC while they're away from it.
To enable Remote Administration, you must first activate the service via YaST2. Start YaST2 and click Network Devices and Remote Administration. Click the radio button next to Allow Remote Administration, as shown in Figure 34-3.
Figure 34-3. Before inviting others to make a remote desktop connection, the service must be activated within YaST2.
The next step is to create an invitation, which will allow the other user to connect to your computer. Select K menu ® System ® Remote Access ® Desktop Sharing. You will then have a choice of creating a personal invitation or sending one by e-mail. In the case of a personal invitation, the IP address of your computer will be displayed alongside a randomly generated password. You can then pass these to the other user, perhaps by a phone call, and he can use the details to connect. Selecting the e-mail option sends these details by e-mail to an address that you specify.
Once the invitation has been set up, your computer is ready for another computer to connect. On the other machine, the other user will need to be running SUSE Linux to be able to hook up. He should select K menu ® System ® Remote Access ® Remote Desktop Connection. He will then need to fill in the IP address you supplied earlier. However, the address must be preceded by vnc://, like this:
Back at your machine, a dialog box will appear asking you to agree to the remote connection, as shown in Figure 34-4. Once this happens, the remote user will be invited to enter the password, and the connection will be made. He will then have joint control over the desktop and will be able to move the mouse cursor and enter data via the keyboard.
Figure 34-4. Before the remote user can connect, you'll need to agree to that user having access.