This application is not intended for cracking or any other offensive
or unlawful activity. Use of this application requires authentication
and has no brute force password (auth hammering) extensibility.
There exists both network sniffing based VNC password crackers and
brute force VNC password cracking utilities. Installing VNC poses a risk
to workstations giving privileges to a Windows machine equal to that
of the console user (less physical access).
Traces of IPC$ and C$ access are left in the security event log. You
can erase these by binding IPC$, and using the Computer Management
MMC to access the remote target and clearing via GUI.
All components of the VNC core application have been developed by
AT&T research labs and modified by the developers at TridiaVNC. All
VNC components are copyrights of their respective owners. The
VNCPush application is a front-end for deploying the VNC application
on Windows NT based machines via native SMB and RPC mappoints, once
installed and connected, you are using 3rd party software.
VNCPush includes four Microsoft utilities necessary for it's
operation. These utilites are reg.exe, regini.exe, sc.exe, and
rmtshare.exe (optional). These components located in the \bin
directory are owned and copyrighted by Microsoft Corporation.