It seems that first step is to authenticate the server followed by Windows
authentication. I have
following questions:
1. Is it true that public key cryptography methodology is used for server
authentication?
2. What factor will determine a server to communicate to any arbitrary client
communicating to it?
3. Will the windows authentication take place across the encrypted session ?
Regards,
Harjit Singh
_______________________________________________
VNC-List mailing list
[email protected]
To remove yourself from the list visit:
http://www.realvnc.com/mailman/listinfo/vnc-list