I've spent a lot of time trying different options for remote desktop solutions, and I've finally settled on NoMachine. It works great for controlling my desktop from within my home network. However, I want to access it remotely as well. I've set up port forwarding on my router for port 4000 to point to my desktop's internal IP. I'm concerned that this might make my system vulnerable. Is there a safer approach to do this? Thanks!
3 Answers
Another option is to use SSH tunneling for port forwarding. In this scenario, you'd only need to expose port 4000 on your server's localhost address after setting up SSH. But remember, security comes down to how well you manage the SSH access—most people don’t know how to secure it effectively.
I switched from NoMachine to Rust Desk and it’s been a much better experience for me. But I totally get that it can be tricky to get Rust Desk up and running. 😅 If you need help with it, I could share some tips!
You should be careful exposing port 4000 directly to the internet. It's generally safer to use a VPN, like WireGuard, to tunnel into your network before accessing your local ports. This way, you keep your setup more secure since you're not just leaving a port open for anyone to find. Also, I've noticed that NoMachine hasn’t had any updates for their flatpak in over a year, so you might want to consider alternatives too.
Related Questions
Fix Not Being Able To Add New Categories With Intuitive Category Checklist For Wordpress
Get Real User IP Without Installing Cloudflare Apache Module
How to Get Total Line Count In Visual Studio 2013 Without Addons
Install and Configure PhpMyAdmin on Centos 7
How To Setup PostfixAdmin With Dovecot and Postfix Virtual Mailbox
Dovecot Error Unknown database driver mysql