It seems that first step is to authenticate the server followed by Windows 
authentication. I have
following questions:
 
1. Is it true that public key cryptography methodology is used for server 
authentication? 
 
2. What factor will determine a server to communicate to any arbitrary client 
communicating to it?
 
3. Will the windows authentication take place across the encrypted session ?
 
Regards,
Harjit Singh
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list

Reply via email to