521:. To applications, Xvnc appears as an X "server" (i.e., it displays client windows), and to remote VNC users it is a VNC server. Applications can display themselves on Xvnc as if it were a normal X display, but they will appear on any connected VNC viewers rather than on a physical screen. Alternatively, a machine (which may be a workstation or a network server) with screen, keyboard, and mouse can be set up to boot and run the VNC server as a service or daemon, then the screen, keyboard, and mouse can be removed and the machine stored in an out-of-the way location.
38:
341:
46:
234:
In the normal method of operation a viewer connects to a port on the server (default port: 5900). Alternatively (depending on the implementation) a browser can connect to the server (default port: 5800). And a server can connect to a viewer in "listening mode" on port 5500. One advantage of listening
315:
In addition, the display that is served by VNC is not necessarily the same display seen by a user on the server. On Unix/Linux computers that support multiple simultaneous X11 sessions, VNC may be set to serve a particular existing X11 session, or to start one of its own. It is also possible to run
461:
from a network. For this reason it is recommended that a password of at least 8 characters be used. On the other hand, there is also an 8-character limit on some versions of VNC; if a password is sent exceeding 8 characters, the excess characters are removed and the truncated string is compared to
258:
order, and after the original full screen has been transmitted, transfers only rectangles that change. This encoding works very well if only a small portion of the screen changes from one frame to the next (as when a mouse pointer moves across a desktop, or when text is written at the cursor), but
499:
An additional security concern for the use of VNC is to check whether the version used requires authorization from the remote computer owner before someone takes control of their device. This will avoid the situation where the owner of the computer accessed realizes there is someone in control of
99:, or offering file transfer (not part of VNC proper), etc. Many are compatible (without their added features) with VNC proper in the sense that a viewer of one flavour can connect with a server of another; others are based on VNC code but not compatible with standard VNC.
289:, allowing easy connection through any Java-enabled web-browser. Different port assignments can be used as long as both client and server are configured accordingly. A HTML5 VNC client implementation for modern browsers (no plugins required) exists too.
175:
In 1999, AT&T acquired the lab, and in 2002 closed down the lab's research efforts. Following this, several members of the development team (including
Richardson, Harter, Weatherall and Hopper) formed RealVNC in order to continue working on
235:
mode is that the server site does not have to configure its firewall to allow access on port 5900 (or 5800); the duty is on the viewer, which is useful if the server site has no computer expertise and the viewer user is more knowledgeable.
250:(methods to determine the most efficient way to transfer these rectangles). The VNC protocol allows the client and server to negotiate which encoding they will use. The simplest encoding, supported by all clients and servers, is
476:
user accounts. However, use of such encryption plugins makes it incompatible with other VNC programs. RealVNC offers high-strength AES encryption as part of its commercial package, along with integration with Active
Directory.
468:
supports the use of an open-source encryption plugin which encrypts the entire VNC session including password authentication and data transfer. It also allows authentication to be performed based on
215:(or viewer) is the program that represents the screen data originating from the server, receives updates from it, and presumably controls it by informing the server of collected local input. The VNC
485:
patches for VNC. According to TightVNC, TightVNC is not secure as picture data is transmitted without encryption. To circumvent this, it should be tunneled through an SSH connection (see below).
95:. Multiple clients may connect to a VNC server at the same time. There are a number of variants of VNC which offer their own particular functionality; e.g., some optimised for
544:. From Unix, TightVNC will connect to a Mac OS X session served by Apple Remote Desktop if the VNC option is enabled, or to a VNC server running on Microsoft Windows.
911:
312:(VPN) technologies to ease usage over the Internet, or as a LAN connection if VPN is used as a proxy, or through a VNC repeater (useful in presence of a NAT).
88:. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa.
191:
has not led to compatibility problems because the RFB protocol is designed to be extensible. VNC clients and servers negotiate their capabilities with
1006:
904:
831:
259:
bandwidth demands get very high if a lot of pixels change at the same time (such as when scrolling a window or viewing full-screen video).
17:
897:
536:" in versions 10.5 through 10.13) interoperates with VNC and will connect to a Unix user's current desktop if it is served with
1155:
316:
multiple VNC sessions from the same computer. On
Microsoft Windows the VNC session served is always the current user session.
940:
509:
663:
308:
configuration such as port forwarding in order for the connection to go through. Users may establish communication through
774:
1150:
207:
is the program on the machine that shares some screen (and may not be related to a physical display: the server can be
172:
was commonly used as a synonym for a thin client; VNC is essentially a software-only (i.e. virtual) network computer.
142:
owned the lab. Developers who worked on VNC while at the AT&T Research Lab include
Tristan Richardson (inventor),
1160:
432:
324:
103:
370:
162:
called the
Videotile, which also used the RFB protocol. The Videotile had an LCD display with pen input and a fast
413:
385:
366:
800:
609:
246:, so various methods have been devised to reduce the communication overhead. For example, there are various
482:
392:
297:
275:
223:) is very simple, based on transmitting one graphic primitive from server to client ("Put a rectangle of
188:
163:
123:
292:
Although possible even on low bandwidth, using VNC over the
Internet is facilitated if the user has a
274:
is the display number (usually :0 for a physical display). Several implementations also start a basic
1091:
399:
629:
351:
228:
91:
VNC is platform-independent, with clients and servers for many GUI-based operating systems and for
1031:
935:
493:
355:
309:
216:
184:
Ltd claims the term "VNC" as a registered trademark in the United States and in other countries.
147:
134:
The
Olivetti & Oracle Research Lab (ORL) at Cambridge in the UK developed VNC at a time when
839:
381:
624:
976:
920:
243:
192:
971:
861:
525:
362:
301:
177:
119:
111:
92:
31:
8:
1081:
986:
981:
1011:
305:
212:
204:
139:
1117:
96:
73:
1036:
883:
634:
584:
473:
263:
168:
85:
37:
760:
524:
Users commonly deploy VNC as a cross-platform remote desktop system. For example,
956:
889:
804:
746:
667:
651:
518:
458:
406:
208:
81:
778:
680:
187:
The original GPLed source code has fed into several other versions of VNC. Such
533:
77:
1144:
1096:
718:
496:
connection which would add an extra security layer with stronger encryption.
878:
817:
1112:
1056:
1041:
704:
548:
489:
220:
65:
691:
605:
286:
239:
159:
151:
143:
115:
638:
1066:
1021:
996:
820:
TightVNC Frequently Asked
Questions. TightVNC.com Accessed Feb 23, 2018
454:
278:
242:
to the client. In its simplest form, the VNC protocol can use a lot of
1061:
991:
961:
652:
The VNC family of Remote
Control Applications: a list of VNC variants
568:
552:
293:
195:
in order to use the most appropriate options supported at both ends.
340:
106:
in
Cambridge, United Kingdom, whose developers subsequently created
1086:
1076:
1071:
1046:
1016:
603:
564:
560:
541:
529:
478:
465:
446:
255:
135:
69:
732:
1026:
1001:
966:
572:
556:
547:
Other programs or software libraries which implement VNC include
320:
181:
107:
1122:
1051:
829:
537:
450:
224:
45:
1127:
469:
296:
connection at both ends. However, it may require advanced
80:
input from one computer to another, relaying the graphical-
211:), and allows the client to share control of it. The VNC
180:
and commercial VNC software under that name. As of 2013,
50:
64:) is a graphical desktop-sharing system that uses the
540:, or to a separate X11 session if one is served with
517:
is the Unix VNC server, which is based on a standard
114:
in the US and some other countries. The original VNC
919:
604:Richardson, T.; Stafford-Fraser, Q.; Wood, K. R.;
1142:
445:By default, RFB is not a secure protocol. While
453:), cracking could prove successful if both the
1007:Microsoft System Center Configuration Manager
905:
369:. Unsourced material may be challenged and
912:
898:
254:, which sends pixel data in left-to-right
886:: Original AT&T-Cambridge VNC website
801:"RealVNC Wayland developer preview email"
628:
433:Learn how and when to remove this message
238:The server sends small rectangles of the
227:data at the specified X,Y position") and
830:AT&T Laboratories Cambridge (1999).
166:connection to the network. At the time,
44:
36:
198:
14:
1143:
664:"VNC Frequently Asked Questions (FAQ)"
500:their device without previous notice.
158:(VNC) originated with ORL's work on a
941:Comparison of remote desktop software
893:
510:Comparison of remote desktop software
367:adding citations to reliable sources
334:
102:VNC was originally developed at the
862:"OnlineVNC Server for Windows OSes"
24:
503:
449:are not sent in plain-text (as in
156:Virtual Network Computer/Computing
104:Olivetti & Oracle Research Lab
66:Remote Frame Buffer protocol (RFB)
25:
1172:
872:
775:"VNC® Wayland Developer Preview"
339:
118:and many modern derivatives are
27:Graphical desktop-sharing system
854:
823:
811:
793:
767:
753:
694:RealVNC. Accessed Feb 23, 2018.
110:Ltd and claimed VNC and RFB as
739:
725:
711:
697:
685:
674:
656:
645:
597:
457:key and encoded password were
41:Virtual Network Computing logo
13:
1:
1156:Free network-related software
1106:Controversial Implementations
777:. 8 July 2014. Archived from
590:
285:to provide a VNC viewer as a
705:"Frequently asked questions"
488:VNC may be tunneled over an
68:to remotely control another
7:
610:"Virtual network computing"
578:
330:
298:network address translation
10:
1177:
681:RealVNC Executive Profiles
507:
129:
124:GNU General Public License
29:
1151:Virtual Network Computing
1105:
1092:Virtual Network Computing
949:
928:
879:RFB 3.8 Protocol Standard
836:Virtual Network Computing
62:Virtual Network Computing
18:Virtual Network Computing
1161:Remote desktop protocols
719:"UltraVnc Configuration"
692:Copyright and trademarks
1032:Remote Desktop Services
936:Remote desktop software
818:How secure is TightVNC?
617:IEEE Internet Computing
310:virtual private network
231:from client to server.
150:, James Weatherall and
148:Quentin Stafford-Fraser
747:"OpenWRT VNC repeater"
666:. 1999. Archived from
54:
42:
977:Chrome Remote Desktop
921:Remote administration
112:registered trademarks
48:
40:
972:Apple Remote Desktop
832:"X-based VNC server"
526:Apple Remote Desktop
363:improve this section
262:VNC by default uses
199:Design and operation
32:VNC (disambiguation)
30:For other uses, see
987:ConnectWise Control
982:Citrix Virtual Apps
639:10.1109/4236.656066
327:developer preview.
72:. It transmits the
1012:NetSupport Manager
670:on 15 August 2000.
146:(project leader),
140:Oracle Corporation
55:
43:
1136:
1135:
1118:Back Orifice 2000
443:
442:
435:
417:
97:Microsoft Windows
16:(Redirected from
1168:
1037:Remote Utilities
914:
907:
900:
891:
890:
866:
865:
858:
852:
851:
849:
847:
842:on 19 March 2007
838:. Archived from
827:
821:
815:
809:
808:
797:
791:
790:
788:
786:
771:
765:
764:
757:
751:
750:
743:
737:
736:
729:
723:
722:
715:
709:
708:
701:
695:
689:
683:
678:
672:
671:
660:
654:
649:
643:
642:
632:
614:
601:
474:Active Directory
438:
431:
427:
424:
418:
416:
375:
343:
335:
169:network computer
84:updates, over a
21:
1176:
1175:
1171:
1170:
1169:
1167:
1166:
1165:
1141:
1140:
1137:
1132:
1101:
957:Absolute Manage
950:Implementations
945:
924:
918:
875:
870:
869:
860:
859:
855:
845:
843:
828:
824:
816:
812:
805:freedesktop.org
799:
798:
794:
784:
782:
781:on 14 July 2014
773:
772:
768:
761:"uVNC repeater"
759:
758:
754:
745:
744:
740:
731:
730:
726:
717:
716:
712:
703:
702:
698:
690:
686:
679:
675:
662:
661:
657:
650:
646:
612:
602:
598:
593:
581:
512:
506:
504:Implementations
439:
428:
422:
419:
376:
374:
360:
344:
333:
201:
132:
35:
28:
23:
22:
15:
12:
11:
5:
1174:
1164:
1163:
1158:
1153:
1134:
1133:
1131:
1130:
1125:
1120:
1115:
1109:
1107:
1103:
1102:
1100:
1099:
1094:
1089:
1084:
1079:
1074:
1069:
1064:
1059:
1054:
1049:
1044:
1039:
1034:
1029:
1024:
1019:
1014:
1009:
1004:
999:
994:
989:
984:
979:
974:
969:
964:
959:
953:
951:
947:
946:
944:
943:
938:
932:
930:
926:
925:
917:
916:
909:
902:
894:
888:
887:
881:
874:
873:External links
871:
868:
867:
853:
822:
810:
807:. 9 July 2014.
792:
766:
752:
738:
724:
710:
696:
684:
673:
655:
644:
630:10.1.1.17.5625
595:
594:
592:
589:
588:
587:
580:
577:
534:Back to My Mac
508:Main article:
505:
502:
483:AES encryption
462:the password.
441:
440:
423:September 2024
347:
345:
338:
332:
329:
229:event messages
200:
197:
131:
128:
26:
9:
6:
4:
3:
2:
1173:
1162:
1159:
1157:
1154:
1152:
1149:
1148:
1146:
1139:
1129:
1126:
1124:
1121:
1119:
1116:
1114:
1111:
1110:
1108:
1104:
1098:
1097:NX technology
1095:
1093:
1090:
1088:
1085:
1083:
1080:
1078:
1075:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1053:
1050:
1048:
1045:
1043:
1040:
1038:
1035:
1033:
1030:
1028:
1025:
1023:
1020:
1018:
1015:
1013:
1010:
1008:
1005:
1003:
1000:
998:
995:
993:
990:
988:
985:
983:
980:
978:
975:
973:
970:
968:
965:
963:
960:
958:
955:
954:
952:
948:
942:
939:
937:
934:
933:
931:
927:
922:
915:
910:
908:
903:
901:
896:
895:
892:
885:
882:
880:
877:
876:
863:
857:
841:
837:
833:
826:
819:
814:
806:
802:
796:
780:
776:
770:
762:
756:
748:
742:
734:
728:
720:
714:
706:
700:
693:
688:
682:
677:
669:
665:
659:
653:
648:
640:
636:
631:
626:
622:
618:
611:
607:
600:
596:
586:
583:
582:
576:
574:
570:
566:
562:
558:
554:
550:
545:
543:
539:
535:
531:
527:
522:
520:
516:
511:
501:
497:
495:
491:
486:
484:
480:
475:
471:
467:
463:
460:
456:
452:
448:
437:
434:
426:
415:
412:
408:
405:
401:
398:
394:
391:
387:
384: –
383:
379:
378:Find sources:
372:
368:
364:
358:
357:
353:
348:This section
346:
342:
337:
336:
328:
326:
322:
319:In July 2014
317:
313:
311:
307:
303:
299:
295:
290:
288:
284:
281:on port 5800+
280:
277:
273:
269:
265:
260:
257:
253:
249:
245:
241:
236:
232:
230:
226:
222:
218:
214:
210:
206:
196:
194:
190:
185:
183:
179:
173:
171:
170:
165:
161:
157:
153:
149:
145:
141:
137:
127:
125:
121:
117:
113:
109:
105:
100:
98:
94:
89:
87:
83:
79:
75:
71:
67:
63:
59:
52:
47:
39:
33:
19:
1138:
1113:Back Orifice
1057:Secure Shell
1042:RescueAssist
884:AT&T VNC
856:
844:. Retrieved
840:the original
835:
825:
813:
795:
783:. Retrieved
779:the original
769:
755:
741:
727:
713:
699:
687:
676:
668:the original
658:
647:
620:
616:
599:
549:Libvncserver
546:
523:
514:
513:
498:
487:
464:
444:
429:
420:
410:
403:
396:
389:
377:
361:Please help
349:
323:published a
318:
314:
291:
282:
271:
267:
261:
252:raw encoding
251:
247:
237:
233:
221:RFB protocol
202:
186:
174:
167:
155:
133:
101:
90:
61:
57:
56:
287:Java applet
240:framebuffer
193:handshaking
178:open-source
160:thin client
154:. The name
152:Andy Hopper
144:Andy Harter
120:open source
116:source code
1145:Categories
1067:TeamViewer
1022:pcAnywhere
997:IBM BigFix
606:Hopper, A.
591:References
455:encryption
393:newspapers
209:"headless"
122:under the
1062:Splashtop
992:Crossloop
962:AetherPal
625:CiteSeerX
623:: 33–38.
569:VirtualGL
553:PocketVNC
481:released
447:passwords
350:does not
294:broadband
248:encodings
244:bandwidth
1087:UltraVNC
1082:Timbuktu
1077:TightVNC
1072:ThinLinc
1047:RustDesk
1017:NinjaOne
923:software
846:24 March
608:(1998).
579:See also
565:TightVNC
561:TigerVNC
542:TightVNC
530:Mac OS X
519:X server
479:Workspot
466:UltraVNC
331:Security
302:firewall
270:, where
264:TCP port
256:scanline
217:protocol
203:The VNC
136:Olivetti
74:keyboard
70:computer
1027:RealVNC
1002:LogMeIn
967:AnyDesk
929:General
785:10 July
733:"noVNC"
573:Vinagre
557:Remmina
459:sniffed
407:scholar
371:removed
356:sources
325:Wayland
321:RealVNC
300:(NAT),
189:forking
182:RealVNC
130:History
108:RealVNC
86:network
49:VNC in
1123:NetBus
1052:scrcpy
627:
571:, and
538:x11vnc
532:(and "
451:telnet
409:
402:
395:
388:
380:
306:router
279:server
213:client
205:server
82:screen
613:(PDF)
585:SPICE
414:JSTOR
400:books
382:"VNC"
266:5900+
225:pixel
78:mouse
1128:Sub7
848:2007
787:2014
528:for
515:Xvnc
472:and
470:NTLM
386:news
354:any
352:cite
304:and
276:HTTP
138:and
93:Java
76:and
635:doi
494:VPN
492:or
490:SSH
365:by
164:ATM
58:VNC
53:3.1
51:KDE
1147::
834:.
803:.
633:.
619:.
615:.
575:.
567:,
563:,
559:,
555:,
551:,
126:.
913:e
906:t
899:v
864:.
850:.
789:.
763:.
749:.
735:.
721:.
707:.
641:.
637::
621:2
436:)
430:(
425:)
421:(
411:·
404:·
397:·
390:·
373:.
359:.
283:N
272:N
268:N
219:(
60:(
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.