Difference between revisions of "TightVNC"

From WPKG | Open Source Software Deployment and Distribution
Jump to: navigation, search
(Corrected uninstall switches)
Line 2: Line 2:
  
 
I install and manage TightVNC with the following XML package description:
 
I install and manage TightVNC with the following XML package description:
 
+
<pre>
  <package
+
  <package id="tightvnc" name="TightVNC server" revision="129" priority="50" reboot="false">
        id="tightvnc"
+
        name="TightVNC server"
+
        revision="129"
+
        priority="50"
+
        reboot="false">
+
+
 
         <check type="uninstall" condition="exists" path="TightVNC 1.2.9" />
 
         <check type="uninstall" condition="exists" path="TightVNC 1.2.9" />
 
 
         <install cmd="%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent"  />
 
         <install cmd="%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent"  />
 
         <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -reinstall" />
 
         <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -reinstall" />
 
         <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper" />
 
         <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper" />
 
         <install cmd='netsh firewall add allowedprogram program = %ProgramFiles%\TightVNC\WinVNC.exe name = "Launch TightVNC Server"' />
 
         <install cmd='netsh firewall add allowedprogram program = %ProgramFiles%\TightVNC\WinVNC.exe name = "Launch TightVNC Server"' />
         <upgrade cmd='%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent' >
+
         <upgrade cmd='%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent' > <exit code="0" reboot="true" /> </upgrade>
                <exit code="0" reboot="true" />
+
      <remove cmd='%ProgramFiles%\TightVNC\unins000.exe /silent' />
        </upgrade>
+
        <remove cmd='%ProgramFiles%\TightVNC\unins000.exe /silent' />
+
 
  </package>
 
  </package>
 
   
 
   
  <package
+
  <package id="tightvnc-settings" name="TightVNC server settings" revision="3" priority="5" reboot="false" execute="once">
        id="tightvnc-settings"
+
        name="TightVNC server settings"
+
        revision="3"
+
        priority="5"
+
        reboot="false"
+
        execute="once">
+
 
         <depends package-id="tightvnc"/>
 
         <depends package-id="tightvnc"/>
+
         <install cmd='cmd /c "%WPKGROOT%\packages\tightvnc.bat"' />
         <install cmd="%WPKGROOT%\packages\tightvnc.bat" />
+
         <upgrade cmd='cmd /c "%WPKGROOT%\packages\tightvnc.bat"' />
         <upgrade cmd="%WPKGROOT%\packages\tightvnc.bat" />
+
 
         <remove cmd='echo "nothing"' />
 
         <remove cmd='echo "nothing"' />
 
  </package>
 
  </package>
 +
</pre>
  
 
TightVNC is a simple batch script that setup TightVNC server and restart it:
 
TightVNC is a simple batch script that setup TightVNC server and restart it:
  
 +
<pre>
 
  :: start, restart or apply settings to tightvnc
 
  :: start, restart or apply settings to tightvnc
 
  ::
 
  ::
Line 50: Line 36:
 
  ::
 
  ::
 
  exit 0
 
  exit 0
 +
</pre>
  
 
tightvnc.reg contains the setup of the server, most notably the access password, i.e. I can use as a registry patch:
 
tightvnc.reg contains the setup of the server, most notably the access password, i.e. I can use as a registry patch:
  
REGEDIT4
+
<pre>
 +
Windows Registry Editor Version 5.00
 +
 
 +
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL]
  
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default]
+
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3]
"Password"=hex:11,22,33,44,55,66,77,88
+
"MSLogonRequired"=dword:00000001
"PasswordViewOnly"=hex:99,aa,bb,cc,dd,ee,ff,00
+
"NewMSLogon"=dword:00000001
 +
"ACL"=hex:02,00,08,00,00,00,00,00
 +
"ConnectPriority"=dword:00000002
 +
"LoopbackOnly"=dword:00000000
 +
"EnableHTTPDaemon"=dword:00000001
 +
"EnableURLParams"=dword:00000000
 +
"AllowLoopback"=dword:00000000
 +
"AuthRequired"=dword:00000001
 +
"DebugMode"=dword:00000000
 +
"DebugLevel"=dword:00000002
  
 +
[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default]
 +
"SocketConnect"=dword:00000001
 +
"AutoPortSelect"=dword:00000001
 +
"InputsEnabled"=dword:00000001
 +
"LocalInputsDisabled"=dword:00000000
 +
"IdleTimeout"=dword:00000000
 +
"LocalInputsPriorityTime"=dword:00000003
 +
"QuerySetting"=dword:00000002
 +
"QueryTimeout"=dword:0000001e
 +
"QueryAccept"=dword:00000000
 +
"QueryAllowNoPass"=dword:00000000
 +
"LockSetting"=dword:00000000
 +
"RemoveWallpaper"=dword:00000001
 +
"BlankScreen"=dword:00000000
 +
"EnableFileTransfers"=dword:00000001
 +
"PollUnderCursor"=dword:00000000
 +
"PollForeground"=dword:00000001
 +
"PollFullScreen"=dword:00000000
 +
"OnlyPollConsole"=dword:00000001
 +
"OnlyPollOnEvent"=dword:00000000
 +
"PollingCycle"=dword:0000012c
 +
"DontSetHooks"=dword:00000000
 +
"DontUseDriver"=dword:00000000
 +
"DriverDirectAccess"=dword:00000001
 +
"LocalInputsPriority"=dword:00000000
 +
"Password"=hex:e6,ee,26,ee,00,e2,e6,5b
 +
"PasswordViewOnly"=hex:38,9a,aa,ee,ef,63,ef,e5
 +
</pre>
 
'''NOTE''' that passwords are crypted, but this is no a paranoid setup, someone can easily have access to the registry patch and try to decrypt the password.
 
'''NOTE''' that passwords are crypted, but this is no a paranoid setup, someone can easily have access to the registry patch and try to decrypt the password.
  
 
[[Category:Silent Installers]]
 
[[Category:Silent Installers]]

Revision as of 13:39, 25 May 2007

I prefer TightVNC over UltraVNC, essentially because they have viewers also for other operating systems and I'm not stuck on browser/java viewer under my preferred OS.

I install and manage TightVNC with the following XML package description:

 <package id="tightvnc" name="TightVNC server" revision="129" priority="50" reboot="false">
        <check type="uninstall" condition="exists" path="TightVNC 1.2.9" />
        <install cmd="%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent"  />
        <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -reinstall" />
        <install cmd="%ProgramFiles%\TightVNC\WinVNC.exe -servicehelper" />
        <install cmd='netsh firewall add allowedprogram program = %ProgramFiles%\TightVNC\WinVNC.exe name = "Launch TightVNC Server"' />
        <upgrade cmd='%SOFTWARE%\WPKG\tightvnc-1.2.9-setup.exe /sp- /verysilent' > <exit code="0" reboot="true" /> </upgrade>
       <remove cmd='%ProgramFiles%\TightVNC\unins000.exe /silent' />
 </package>
 
 <package id="tightvnc-settings" name="TightVNC server settings" revision="3" priority="5" reboot="false" execute="once">
        <depends package-id="tightvnc"/>
        <install cmd='cmd /c "%WPKGROOT%\packages\tightvnc.bat"' />
        <upgrade cmd='cmd /c "%WPKGROOT%\packages\tightvnc.bat"' />
        <remove cmd='echo "nothing"' />
 </package>

TightVNC is a simple batch script that setup TightVNC server and restart it:

 :: start, restart or apply settings to tightvnc
 ::
 net stop "VNC Server"
 regedit /s %WPKGROOT%\packages\tightvnc.reg
 net start "VNC Server"
 
 :: For some unknown reason the servicehelper does not restart.
 ::
 %ProgramFiles%\TightVNC\WinVNC.exe -servicehelper
 :: we ignore errors...
 ::
 exit 0

tightvnc.reg contains the setup of the server, most notably the access password, i.e. I can use as a registry patch:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\ORL]

[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3]
"MSLogonRequired"=dword:00000001
"NewMSLogon"=dword:00000001
"ACL"=hex:02,00,08,00,00,00,00,00
"ConnectPriority"=dword:00000002
"LoopbackOnly"=dword:00000000
"EnableHTTPDaemon"=dword:00000001
"EnableURLParams"=dword:00000000
"AllowLoopback"=dword:00000000
"AuthRequired"=dword:00000001
"DebugMode"=dword:00000000
"DebugLevel"=dword:00000002

[HKEY_LOCAL_MACHINE\SOFTWARE\ORL\WinVNC3\Default]
"SocketConnect"=dword:00000001
"AutoPortSelect"=dword:00000001
"InputsEnabled"=dword:00000001
"LocalInputsDisabled"=dword:00000000
"IdleTimeout"=dword:00000000
"LocalInputsPriorityTime"=dword:00000003
"QuerySetting"=dword:00000002
"QueryTimeout"=dword:0000001e
"QueryAccept"=dword:00000000
"QueryAllowNoPass"=dword:00000000
"LockSetting"=dword:00000000
"RemoveWallpaper"=dword:00000001
"BlankScreen"=dword:00000000
"EnableFileTransfers"=dword:00000001
"PollUnderCursor"=dword:00000000
"PollForeground"=dword:00000001
"PollFullScreen"=dword:00000000
"OnlyPollConsole"=dword:00000001
"OnlyPollOnEvent"=dword:00000000
"PollingCycle"=dword:0000012c
"DontSetHooks"=dword:00000000
"DontUseDriver"=dword:00000000
"DriverDirectAccess"=dword:00000001
"LocalInputsPriority"=dword:00000000
"Password"=hex:e6,ee,26,ee,00,e2,e6,5b
"PasswordViewOnly"=hex:38,9a,aa,ee,ef,63,ef,e5

NOTE that passwords are crypted, but this is no a paranoid setup, someone can easily have access to the registry patch and try to decrypt the password.