Remote into GDM on RHEL

Posted on 2010-01-02
Last Modified: 2012-05-08
I am looking for a tool that will allow me to do a graphical remote control of GDM on RHEL. I have VNC installed but it has issues not allowing connections. What are some other options?
Question by:Aeroquinn
    LVL 35

    Accepted Solution

    Well, there is also TightVNC, for instance:

    I assume, however, that basically you are quite likely to run into similar issues with whatever tool you try unless you manage to resolve the permission issues with VNC. Are you sure you configured it correctly?
    Please check out some guides:

    Author Comment

    I have seen all these articles before and none of these configurations are working. I am running RHEL 5.1 and downloaded and installed the latest version of VNC. For example, I can run vncserver in a terminal windows and it starts and showing the session is ready to accept connections. However, it I follow any of the articles, they are listing  service vncserver start. Well, the server responds the service does not exist. I only have one login account and that would be root. I should not have any permission issues or firewalls on. I have already looked at the logs for VNC and the solutions are all over the board. What is are the exact steps to configure VNC on a clean install of RHEL. I guess I am just used to installing it on Windows and it just works.

    Author Closing Comment

    I did overlook one key piece of information. I did not look under Preferences, Remote Control and allow access. I guess this was security related. It is now working. Thanks again.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
    Join Greg Farro and Ethan Banks from Packet Pushers ( and Greg Ross from Paessler ( for a discussion about smart network …
    Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
    Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now