Super User is a question and answer site for computer enthusiasts and power users. It only takes a minute to sign up. Connect and share knowledge within a single location that is structured and easy to search. I'm very confused. I'm using Comodo Internet Security as a firewall and it is blocking requests from my mobile phone browser to my local webserver. If I disable Comodo firewall it works, and it's pretty obvious Comodo is actually blocking something because of the logs Comodo firewall port forwarding lost here and appreciate any guidance!
You will be asked to enter a password to access VNC if using any other user, then the above-mentioned user. We can now access the server using the VNC viewer from the client machine, use the following command to start VNC viewer with a secure connection,. This completes our tutorial, feel free to send your suggestions or queries using the comment box below. If you think we have helped you or just want to support us, please consider these Connect to us: Facebook Twitter Google Plus.
Thanks man, exactly what I needed. No need to set a passwd for vncuser, it can be left locked. Also I could not connect with realvnc client due to the security settings but it was okay with tigervnc client. Save my name, email, and website in this browser for the next time I comment. Stunnel is free software released under the GNU GPL2 so there are no commercial restrictions for usage although there can be restrictions on the security algorithms for certain regions.
See the stunnel license page for details. The VNC connection is configured so that instead of creating a direct unencrypted connection between the client and server, the client connects to a local stunnel instance. This stunnel then creates an encrypted connection to stunnel running on the system under test. The VNC connection is then tunneled through the encrypted connection and results in a further local connection on the server between the server stunnel and the VNC server.
The local port, , can be any free local port. The section name, e. Repeat for each SUT e. The above configuration uses all the default settings for stunnel. There are numerous options for security and using your own certificates etc. See the stunnel documentation and various articles on the web. An alternate method for secure connection tunneling is to use SSH.