{"id":749,"date":"2007-03-22T17:11:30","date_gmt":"2007-03-22T17:11:30","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm"},"modified":"2007-03-23T16:05:05","modified_gmt":"2007-03-23T16:05:05","slug":"secure-remote-administration-of-a-mac-os-x-computer-from-within-windows","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","title":{"rendered":"Secure, remote administration of a Mac OS X computer from within Windows"},"content":{"rendered":"<p>In a recent post about <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/multimedia-file-format-conversions-ripping-dvds-playback-and-more.htm\" rel=\"bookmark\" title=\"Multimedia file format conversions, ripping DVDs, playback and more\">multimedia file format conversions, ripping DVDs, playback and more<\/a>, I linked to a number of <a href=\"http:\/\/howto.diveintomark.org\/\">Mark Pilgrim&#8217;s &#8220;How To&#8221; articles<\/a>; however there was one which wasn&#8217;t relevant to that particular post &#8211; <a href=\"http:\/\/howto.diveintomark.org\/remote-mac\/\">how to use your Mac from anywhere<\/a> (although it is intended for remote control of a Mac the advice should be equally applicable to a Linux system, or even to a Windows Server with an SSH server installed).<\/p>\n<p>A few months back, I blogged about using <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/12\/quick-and-easy-way-to-create-ssl-vpn.htm\">creating an SSL VPN to access my network<\/a> but Mark&#8217;s video explains how to open a single firewall port and use SSH to provide a secure tunnel through which other protocols (in this case VNC) can be run for remote administration of a single computer. I tried it earlier and it&#8217;s very straightforward.  Best of all, the software involved is all freely available under open source licensing agreements!<\/p>\n<p>I recommend downloading Mark Pilgrim&#8217;s video for a full explanation but the notes below explain what is involved (some of the Unix concepts may be unfamiliar to those more used to a graphical environment and my <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/03\/quick-introduction-to-linux-for.htm\">quick introduction to Linux for Windows administrators<\/a> might be useful):<\/p>\n<ol>\n<li>Download and install the <a href=\"http:\/\/www.chiark.greenend.org.uk\/~sgtatham\/putty\/\">PuTTY, PuTTYgen, Pageant and Plink<\/a> SSH utilities on a Windows PC.<\/li>\n<li>Using <code>puttygen<\/code>, generate a public\/private key pair and protect it with a passphrase.  Save the private key to a file on the Windows PC and copy the public key to the remote computer (e.g. within a text file transmitted via e-mail or FTP).<\/li>\n<li>On the Mac, open a terminal session (either using the OS X Terminal application or an alternative such as <a href=\"http:\/\/iterm.sourceforge.net\/\">iTerm<\/a>) and enter the following commands from the home (~) directory:\n<ul>\n<li><code>mkdir .ssh<\/code>  (this was already present on my machine as I already had the SSH server running).<\/li>\n<li><code>chmod 700 .ssh<\/code> (again, I didn&#8217;t need to do this).<\/li>\n<li><code>chmod 600 <em>publickeyfilename<\/em><\/code> (the default permission set is 640).<\/li>\n<li><code>mv publickeyfilename .ssh\/authorized_keys<\/code><\/li>\n<li><code>sudo nano \/etc\/sshd_config<\/code> (non-admin users may need to <code>su -<\/code> to an admin account first as explained in my earlier post about <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/running-sudo-as-a-standard-user-in-mac-os-x.htm\">running sudo as a standard user<\/a>) and make the following edits:\n<ul>\n<li>Allow SSHtunnelling (also known as TCP forwarding or port forwarding) by changing <code>#AllowTcpForwarding yes<\/code> to <code>AllowTcpForwarding yes<\/code><\/li>\n<li>(Optionally) Prevent the use of usernames and passwords for login (the public\/private key pair and passphrase will provide the security for the connection) by changing <code>#PasswordAuthentication yes<\/code> to <code>PasswordAuthentication no<\/code><\/li>\n<li>(OS X 10.4 only) Disable pluggable authentication modules by changing <code>#UsePAM no<\/code> to <code>UsePAM no<\/code><\/li>\n<\/ul>\n<\/li>\n<li>Exit nano and save the changes to \/etc\/sshd_config (exit to the original shell if <code>su<\/code> was previously used to escalate privileges).<\/li>\n<li value=\"4\">Generate an SSH key fingerprint (to prevent man-in-the-middle attacks) using <code>ssh-keygen -l -f \/etc\/ssh_host_rsa_key.pub<\/code> and make a note of the fingerprint.<\/li>\n<\/ul>\n<\/li>\n<li>Open TCP port 22 on any firewalls\/routers between the Windows and Macintosh computers and enable port forwarding to the appropriate internal IP address (it may be necessary to apply a static IP address to the Mac but I prefer to use a DHCP reservation).<\/li>\n<li>If the external IP address for the network is not static (mine is) then use a dynamic DNS service to assign a DNS name so that it may be located on the Internet.<\/li>\n<li>Within the OS X System Preferences, Open Sharing and enable Remote Login (restart the service if it is already running in order to pick up the changes made earlier to \/etc\/sshd_config).  Because password authentication has been disabled, remote login (SSH) will only be possible from a machine with the appropriate private key.<\/li>\n<li>Although <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2006\/10\/remotely-controlling-mac-os-x-using.htm\">OS X includes Apple Remote Desktop, which is a VNC server<\/a>, alternatives such as <a href=\"http:\/\/www.redstonesoftware.com\/products\/vine\/server\/vineosx\/\">Vine Server (OSXvnc)<\/a> offer additional functionality.  In particular, VNC is insecure by default; however by selecting to only allow local connections (require SSH) and start the system server (i.e. run as a service, rather than in the context of a particular user), it is possible to run a secure VNC server each time the system is restarted.<\/li>\n<li>At this stage, it should be possible to create an SSH tunnel to the Mac.  On the Windows PC, run <code>pageant<\/code> which is a PuTTY helper application (SSH agent) to cache the passphrase for the private key, which adds a level of security if the PC is compromised but which would also become a nuisance if it needed to be repetitively entered.  Add a key using the private key file generated in step 2 and enter the passphrase that was used when created the key.<\/li>\n<li>Next, run <code>putty<\/code> and enter:\n<ul>\n<li>The <em>hostname<\/em>\/<em>ipaddress<\/em> in the basic session options.<\/li>\n<li>The auto-login <em>username<\/em> for the Macintosh for the connection data.<\/li>\n<li>The <em>privatekeyfilename<\/em> for SSH authentication.<\/li>\n<li>A new forwarded source port of <code>5900<\/code> and destination of <code>localhost:5900<\/code> for SSH port forwarding.<\/li>\n<\/ul>\n<\/li>\n<li>Save the session with an appropriate <code><em>sessionname<\/em><\/code> and open the connection.  On the first connection, the host key will be unknown; however the reported key can be compared with the one generated earlier to ensure that the host is the intended target computer.  Assuming that all is well and the connection is allowed to continue, then a <em>Welcome to Darwin!<\/em> greeting should be displayed, along with a shell prompt.\n<ul>\n<li>If the connection fails and there is a prompt for the private key then Pageant is not correctly configured.<\/li>\n<li>If there is a prompt for a password then \/etc\/sshd_config was not correctly edited.<\/li>\n<\/ul>\n<\/li>\n<li>Unless command line interaction with the Mac is required, the PuTTY window can be minimised.  In order to create the SSH tunnel automatically at login, a startup shortcut can be created with the target of <code>\"%programfiles%\\PuTTY\\pageant.exe\" <em>privatekeyfilename<\/em> -c \"%programfiles%\\PuTTY\\plink.exe\" <em>sessionname<\/em><\/code><\/li>\n<li>Finally, a graphical connection may be initiated with a VNC viewer such as <a href=\"http:\/\/ultravnc.sourceforge.net\/\">UltraVNC<\/a>.  The connection should be made to <code>localhost<\/code>; however because localhost:5900 has been defined as the forwarded port in the SSH tunnel, the request is securely transferred to the VNC server on the Mac.<\/li>\n<\/ol>\n<p>It&#8217;s worth noting that when I originally tried to test this configuration from a remote network I was unable to get past my employer&#8217;s firewall; however there are plenty of unsecured wireless networks around which I could use to test the connection!<\/p>\n<p>Note that the original information that provided inspiration for writing this post is licensed under a <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.5\/\">creative commons attribution sharealike 2.5<\/a> license and consequently so is the information contained in this post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent post about multimedia file format conversions, ripping DVDs, playback and more, I linked to a number of Mark Pilgrim&#8217;s &#8220;How To&#8221; articles; however there was one which wasn&#8217;t relevant to that particular post &#8211; how to use your Mac from anywhere (although it is intended for remote control of a Mac the &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Secure, remote administration of a Mac OS X computer from within Windows<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[35,3,33,53,43,39,16],"class_list":["post-749","post","type-post","status-publish","format-standard","hentry","tag-mac-os-x","tag-linux","tag-windows","tag-remote-access","tag-security","tag-useful-software","tag-useful-websites"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"In a recent post about multimedia file format conversions, ripping DVDs, playback and more, I linked to a number of Mark Pilgrim&#8217;s &#8220;How To&#8221; articles; however there was one which wasn&#8217;t relevant to that particular post &#8211; how to use your Mac from anywhere (although it is intended for remote control of a Mac the &hellip; Continue reading Secure, remote administration of a Mac OS X computer from within Windows\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2007-03-22T17:11:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-03-23T16:05:05+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Secure, remote administration of a Mac OS X computer from within Windows\",\"datePublished\":\"2007-03-22T17:11:30+00:00\",\"dateModified\":\"2007-03-23T16:05:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\"},\"wordCount\":1033,\"commentCount\":9,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Apple Mac OS X\",\"Linux\",\"Microsoft Windows\",\"Remote access\",\"Security\",\"Useful Software\",\"Useful Websites\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\",\"name\":\"Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2007-03-22T17:11:30+00:00\",\"dateModified\":\"2007-03-23T16:05:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2007\\\/03\\\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure, remote administration of a Mac OS X computer from within Windows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","og_locale":"en_GB","og_type":"article","og_title":"Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it","og_description":"In a recent post about multimedia file format conversions, ripping DVDs, playback and more, I linked to a number of Mark Pilgrim&#8217;s &#8220;How To&#8221; articles; however there was one which wasn&#8217;t relevant to that particular post &#8211; how to use your Mac from anywhere (although it is intended for remote control of a Mac the &hellip; Continue reading Secure, remote administration of a Mac OS X computer from within Windows","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","og_site_name":"markwilson.it","article_published_time":"2007-03-22T17:11:30+00:00","article_modified_time":"2007-03-23T16:05:05+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Secure, remote administration of a Mac OS X computer from within Windows","datePublished":"2007-03-22T17:11:30+00:00","dateModified":"2007-03-23T16:05:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm"},"wordCount":1033,"commentCount":9,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Apple Mac OS X","Linux","Microsoft Windows","Remote access","Security","Useful Software","Useful Websites"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm","name":"Secure, remote administration of a Mac OS X computer from within Windows - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2007-03-22T17:11:30+00:00","dateModified":"2007-03-23T16:05:05+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-mac-os-x-computer-from-within-windows.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Secure, remote administration of a Mac OS X computer from within Windows"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":752,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/ssh-addendum.htm","url_meta":{"origin":749,"position":0},"title":"SSH addendum","author":"Mark Wilson","date":"Sunday 25 March 2007","format":false,"excerpt":"Since my recent posts about using SSH to securely remote administer Mac OS X, Linux and Windows computers, a couple of extra points have come up that are probably worth noting: To use the console interactively, it may be better to use PuTTY (putty) than PuTTY Link (plink). In seems\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":751,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-windows-computer.htm","url_meta":{"origin":749,"position":1},"title":"Secure, remote administration of a Windows computer","author":"Mark Wilson","date":"Saturday 24 March 2007","format":false,"excerpt":"I was going to call this post \"secure, remote administration of a Windows computer from within Windows\" but that sounds a bit odd, unless you realise that the last two posts have been \"secure, remote administration of a Linux computer from within Windows\" and \"secure, remote administration of a Mac\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":750,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/03\/secure-remote-administration-of-a-linux-computer-from-within-windows.htm","url_meta":{"origin":749,"position":2},"title":"Secure, remote administration of a Linux computer from within Windows","author":"Mark Wilson","date":"Friday 23 March 2007","format":false,"excerpt":"Yesterday I wrote about using SSH to securely connect to a Mac from a Windows PC. At the time, I suggested that the advice should be equally applicable to a Linux system, or even to a Windows Server with an SSH server installed and I've since tested it with a\u2026","rel":"","context":"In \"Linux\"","block_context":{"text":"Linux","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/linux"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":767,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/04\/running-vmware-server-console-on-a-mac.htm","url_meta":{"origin":749,"position":3},"title":"Running VMware Server Console on a Mac","author":"Mark Wilson","date":"Tuesday 10 April 2007","format":false,"excerpt":"Last year, I bought a 20\" wide-screen monitor which I run at a resolution of 1680x1050 pixels. Working with all that screen space is fantastic (especially with 4 virtual desktops), except that I've got so used to it that the standard 1024x768 pixels on the notebook PC that I use\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":654,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/10\/remotely-controlling-mac-os-x-using.htm","url_meta":{"origin":749,"position":4},"title":"Remotely controlling Mac OS X using VNC","author":"Mark Wilson","date":"Tuesday 24 October 2006","format":false,"excerpt":"I frequently control my Windows computers remotely from other Windows, Linux or Mac OS X computers using a remote desktop protocol (RDP) client; however there is no RDP server built into Mac OS X (not surprisingly, as RDP is a Microsoft protocol) and Apple's remote control product (Apple Remote Desktop)\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1015,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/03\/some-more-on-using-active-directory-for-linuxmac-os-x-user-authentication.htm","url_meta":{"origin":749,"position":5},"title":"Some more on using Active Directory for Linux\/Mac OS X user authentication","author":"Mark Wilson","date":"Thursday 13 March 2008","format":false,"excerpt":"Last year I wrote a post about using Microsoft Active Directory (AD) to authenticate users on a Red Hat Enterprise Linux (RHEL) computer (and a few weeks back I followed it up for Mac OS X). This week, I've been re-visiting that subject, as I built a new FTP server\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=749"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/749\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}