NoMachine Support

Your questions answered

Knowledge Base

Searching in: Articles & FAQs
Filter the search results
Applies to:
Last update:
How to set up key based authentication with NX protocol

This article applies to NoMachine v. 4 or later. Support for key-based authentication with the NX protocol requires the public SSH key be added on the server side, in the user's home, to......

Id: AR02L00785 Applies to: NoMachine Software

Added on: 2014-02-21 Last modified: 2020-09-27

How to set up key based authentication with SSH protocol

This article applies to NoMachine v. 4 or later. Support for key-based authentication with the SSH protocol requires the public SSH key be added on the server side, in the user's home, to......

Id: AR06O00932 Applies to: NoMachine Software

Added on: 2017-06-12 Last modified: 2020-09-27

NoMachine USB forwarding limitations

Web cameras The current implementation of NoMachine USB forwarding doesn't support some models of web cameras which use an isochronous video stream: the Web Camera cannot be forwarded from......

Id: AR03R01080 Applies to: NoMachine Software

Added on: 2020-03-27 Last modified: 2020-09-23

Connecting to a Wayland-based desktop running in a Linux virtual machine

Many recent Linux operating systems (e.g. Fedora 31, OpenSUSE 15, Ubuntu 19.10 or later) provide support for desktop environments relying on Wayland compositor. These Wayland-based desktops......

Id: AR04R01083 Applies to: NoMachine Server

Added on: 2020-04-09 Last modified: 2020-09-22

Migrating NoMachine server configurations from one Linux machine to another

Before going on with this article please read https://www.nomachine.com/AR01F00497 for support entitlements when migrating to a different operating system or system. The SLA is also outlines what......

Id: AR05L00804 Applies to: NoMachine Server

Added on: 2014-05-22 Last modified: 2020-09-17

How to use NoMachine with Fail2ban for connections by NX protocol

Fail2ban is an utility, available for Linux and Mac, to scan log files and prevent brute force attacks and limit login attempts: https://www.fail2ban.org/wiki/index.php/Main_Page  ......

Id: AR05P00983 Applies to: NoMachine Software

Added on: 2018-05-31 Last modified: 2020-09-10

How to protect NoMachine connections against massive brute force attacks and DDoS

One of the possibility to protect your business or service from massive DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks, is to limit the number of concurrent connections......

Id: AR09R01096 Applies to: NoMachine Software

Added on: 2020-09-11 Last modified: 2020-09-10

Using two-factor authentication on Linux with NoMachine

NoMachine supports two-factor authentication since version 4.3. Authentication methods are usually grouped as:  1° group: 'something the user knows', e.g. a password. 2°......

Id: AR12L00828 Applies to: NoMachine Software

Added on: 2014-12-02 Last modified: 2020-09-09

A brief description of the NX protocol in version 4 or later

NoMachine (from version 4 and later) redesigns and extends the NX protocol used in version 3 to work as a generic transport layer for the suite of protocols used by various components. The redesign......

Id: AR11K00745 Applies to: NoMachine Software

Added on: 2013-11-14 Last modified: 2020-09-06

Reserved names for NoMachine programs

While NoMachine can integrate seamlessly in any of the supported environments, the 'nx' and 'NX' names are reserved and cannot be used on the system for different purposes than......

Id: AR01N00871 Applies to: NoMachine Software

Added on: 2016-01-21 Last modified: 2020-08-31

  • 1
    of 56
Follow Us
 
Home
Download
Enterprise
Support
Partners
Learn more
Features
Price & availability
Article & FAQs
Software updates
Resources
Forums
Installation guides
Feature requests
Trouble reports
Company
About us
Contact us
Become a partner
News