Quote Originally Posted by Brandon Williams View Post
You can limit risk by limiting public access. For example, if all valid HTTP connections will come only from a small set of client IP addresses, then you can use iptables rules to drop incoming connections from unauthorized clients. For VNC, it's common to configure VNC so that it only listens on localhost, and then to connect to VNC through an SSH tunnel.
Thanks Brandon Williams, I had forgotten about the use of iptables, that is an excellent point and great advice.

akakingess