Am I Exposing My Desktop to Security Risks with NoMachine?

0
10
Asked By CoolCat42 On

I've spent a lot of time trying different options for remote desktop solutions, and I've finally settled on NoMachine. It works great for controlling my desktop from within my home network. However, I want to access it remotely as well. I've set up port forwarding on my router for port 4000 to point to my desktop's internal IP. I'm concerned that this might make my system vulnerable. Is there a safer approach to do this? Thanks!

3 Answers

Answered By SecureMike On

Another option is to use SSH tunneling for port forwarding. In this scenario, you'd only need to expose port 4000 on your server's localhost address after setting up SSH. But remember, security comes down to how well you manage the SSH access—most people don’t know how to secure it effectively.

Answered By ChillPanda On

I switched from NoMachine to Rust Desk and it’s been a much better experience for me. But I totally get that it can be tricky to get Rust Desk up and running. 😅 If you need help with it, I could share some tips!

Answered By TechSavvy101 On

You should be careful exposing port 4000 directly to the internet. It's generally safer to use a VPN, like WireGuard, to tunnel into your network before accessing your local ports. This way, you keep your setup more secure since you're not just leaving a port open for anyone to find. Also, I've noticed that NoMachine hasn’t had any updates for their flatpak in over a year, so you might want to consider alternatives too.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.