On 2/26/2014 16:49, Patrick Dupre wrote:
Starting Nmap 6.01 ( http://nmap.org ) at 2014-02-26 22:47 CET
Initiating SYN Stealth Scan at 22:47
Scanning 193.49.194.19 [4 ports]
Completed SYN Stealth Scan at 22:47, 3.01s elapsed (4 total ports)
Nmap scan report for 193.49.194.19
Host is up.
PORT STATE SERVICE
5900/tcp filtered vnc
5901/tcp filtered vnc-1
5902/tcp filtered vnc-2
5903/tcp filtered vnc-3
This means that your firewall is blocking the ports or that your
vncserver isn't really running on the target system. You can determin
if it is by running nmap on the target system and substituting
"localhost" for the target IP like this:
nmap -v -n -P0 -p5900-5910 localhost
By the way, the IP address above appears to be public. You may want to
reconsider running a vncserver over the public Internet because the
session is not encrypted.
Tom
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org