This document is intended to answer the most Frequently-Asked Questions
(FAQ) about Echogent Systems' Kaboodle. This FAQ is a supplement to the
program's built-in online help. If you have not read the online help,
please do so before proceeding. It contains crucial information about
installing and configuring Kaboodle as well as helpful troubleshooting
information that can be used to resolve the most commonly asked about
technical issues.
This FAQ is constantly being updated as new versions of Kaboodle are
released and new questions arise. The most recent public version of
this FAQ can always be found on the Kaboodle web site at
http://www.kaboodle.org/help_faqs.html.
All product names and trademarks mentioned in this document are the
trademarks of their respective owners.
If you have a Kaboodle-related web site or mailing list you would like
listed here, please let us know by sending mail to kaboodle-faq@echogent.com.
B3. How does Kaboodle work with VNC?
To understand how Kaboodle works with VNC, you must first have an
understanding of how VNC works:
VNC uses a protocol called Remote Frame Buffer (RFB) to communicate
between clients (called "viewers" in VNC settings) and servers. The RFB
protocol is transmitted over TCP/IP packets on your network, just like
other protocols such as FTP and HTTP.
RFB, however, was never designed to be a secure protocol for use across
the Internet. It is possible for a malicious user on a network running
VNC to "sniff" the RFB packets to spy on other computers or gain
access to them.
Kaboodle joins the family of third-party products which secure VNC
by creating a cryptographically-secured connection and "tunneling"
(or sending) the RFB packets through it.
Beginning with Version 0.75, Kaboodle can secure VNC connections on
the same network, provided it is installed on the computers running
the VNC software. Future versions will extend this security to computers
running on different networks and across the Internet.
Table of Contents · Glossary
B4. How do I use VNC with Kaboodle?
It is easy to set up Kaboodle to work with VNC. First, Kaboodle is
installed on the VNC server. Next, it is installed on the VNC client.
Here are step-by-step instructions:
For the VNC Server:
- Install Kaboodle on the computer running the VNC server software.
- Start Kaboodle, and right-click on the icon representing your computer.
The Property Panel will appear.
- Click on the VNC Setup tab. The VNC Server Settings for
your computer will be displayed in the top half of the window.
- Check the Use Kaboodle to control the VNC Server box and
fill in the path and filename to the VNC Server on your computer. Typically,
this is C:\Program Files\RealVNC\WinVNC\WinVNC.EXE on computers running
Microsoft Windows and using RealVNC.
- Click on OK when finished, exit Kaboodle, and restart it for
the changes to take effect.
You have now successfully configured the server portion of Kaboodle!
Next, configure the client portion:
For VNC Clients:
- Install Kaboodle on the computer running the VNC client software.
- Start Kaboodle, and right-click on the icon representing your computer.
The Property Panel will appear.
- Click on the VNC Setup tab. The VNC Viewer Settings for
your computer will be displayed in the bottom half of the window.
- Check the Use VNC Viewer radio button and fill in the
path and filename to the VNC Client on your computer. Typically,
this is C:\Program Files\RealVNC\WinVNC\VNCViewer.EXE on computers running
Microsoft Windows.
- Click on OK when finished, exit Kaboodle, and restart it for
the changes to take effect.
You have now successfully configured the client part of Kaboodle and are
ready to begin using it!
Start Kaboodle on both the client and server computers. In the main
window on the client, the server will appear with both Kaboodle and
VNC badges on top of it. Right-click on the server icon to view its
properties, and click on the VNC Property tab. Click on the
Connect button to launch VNC. VNC will start as normal, with
all data being "tunneled" securely through Kaboodle's
encryption engine.
Table of Contents · Glossary
C1. What are the system requirements for the Windows version of Kaboodle?
The Windows version of Kaboodle requires one of the following operating
systems:
- Microsoft Windows 98 or 98SE
- Microsoft Windows Milennium Edition
- Microsoft Windows NT 4.0 with SP6 (or newer)
- Microsoft Windows 2000 Professional, Server, or Advanced Server
- Microsoft Windows XP Professional or Home
Kaboodle is neither tested or supported with Microsoft Windows 95.
A mouse or other Windows-compatible pointing device.
A 300MHz or faster processor. Using a faster CPU will result in
better performance.
A display capable of producing 800x600, 256-color is required,
with higher resolution and color-depths recommended.
A 56KBps or faster Internet connection.
Table of Contents · Glossary
C2. Can I get a computer virus from using Kaboodle?
You cannot get a virus just by running Kaboodle, however, Kaboodle does
allow you to use applications such as file-transfer and remote control,
which can spread computer viruses. You can get a computer virus (or other
malicious program) by running a file you have been sent, just as you can
with a file sent as an e-mail attachment, or on a disk.
Data files such as pictures (such as files ending in .BMP, .GIF, and .JPG),
and sounds (files ending in .MID, .MP3, and .WAV) are "inert" and
contain no computer program code which can be executed by the processor. As
such, they can be safely viewed without concern.
Program files (such as files ending in .BAT, .COM, or .EXE,) and some types of
documents (such as those ending in .DOC, .VBS, and .WSH) contain code which is
executed by your computer. These files can contain computer viruses.
There is no 100 percent way to protect yourself against computer viruses, but
here are some steps you can take to reduce the risk:
- Back up your hard disk drive on a regular basis.
- Update your anti-virus software frequently.
- Do not accept files from unknown sources.
- Check all files for computer viruses from known sources.
- Be especially wary of people who try to send you files and get
you to run them, or offer to send you "data" files with
extensions like .COM or .EXE.
Table of Contents · Glossary
REVISION HISTORY
Version 0.07 - 20030130 - revised Preface, A1, A9, A10, A11, B1, B2, B4, B5, B6 and Glossary
Version 0.06 - 20020126 - revised Preface, A4, A6, A9, A10, A11, B3, B4, B5, B6, C1, C4, C5, and Glossary
Version 0.05 - 20020125 - revised A1, A4, A6, A10, A11, B3, B4, C1, C4, C5, and Glossary
Version 0.04 - 20020125 - revised A10, B1, B2, B3, B4, B5, C1, C2, C3, C4, C5, C6, C7, and Glossary
Version 0.03 - 20020115 - revised A3
Version 0.02 - 20020110 - revised A1, A2, A3, A4, A5, A6, A7, A8, A9, A10, A11, A12, and Glossary
Version 0.01 - 20011201 - initial release
Copyright © 2001-2003 by Echogent, Inc. All
rights reserved. Permission is hereby granted to distribute this
FAQ provided no modifications are made and no fee is charged for
distribution. This FAQ is written and maintained by Aryeh Goretsky.
Please e-mail any comments or questions about this document to
kaboodle-faq@echogent.com.