Knowledge (XXG)

VNC

Source 📝

510:. To applications, Xvnc appears as an X "server" (i.e., it displays client windows), and to remote VNC users it is a VNC server. Applications can display themselves on Xvnc as if it were a normal X display, but they will appear on any connected VNC viewers rather than on a physical screen. Alternatively, a machine (which may be a workstation or a network server) with screen, keyboard, and mouse can be set up to boot and run the VNC server as a service or daemon, then the screen, keyboard, and mouse can be removed and the machine stored in an out-of-the way location. 27: 330: 35: 223:
In the normal method of operation a viewer connects to a port on the server (default port: 5900). Alternatively (depending on the implementation) a browser can connect to the server (default port: 5800). And a server can connect to a viewer in "listening mode" on port 5500. One advantage of listening
304:
In addition, the display that is served by VNC is not necessarily the same display seen by a user on the server. On Unix/Linux computers that support multiple simultaneous X11 sessions, VNC may be set to serve a particular existing X11 session, or to start one of its own. It is also possible to run
450:
from a network. For this reason it is recommended that a password of at least 8 characters be used. On the other hand, there is also an 8-character limit on some versions of VNC; if a password is sent exceeding 8 characters, the excess characters are removed and the truncated string is compared to
247:
order, and after the original full screen has been transmitted, transfers only rectangles that change. This encoding works very well if only a small portion of the screen changes from one frame to the next (as when a mouse pointer moves across a desktop, or when text is written at the cursor), but
488:
An additional security concern for the use of VNC is to check whether the version used requires authorization from the remote computer owner before someone takes control of their device. This will avoid the situation where the owner of the computer accessed realizes there is someone in control of
88:, or offering file transfer (not part of VNC proper), etc. Many are compatible (without their added features) with VNC proper in the sense that a viewer of one flavour can connect with a server of another; others are based on VNC code but not compatible with standard VNC. 278:, allowing easy connection through any Java-enabled web-browser. Different port assignments can be used as long as both client and server are configured accordingly. A HTML5 VNC client implementation for modern browsers (no plugins required) exists too. 164:
In 1999, AT&T acquired the lab, and in 2002 closed down the lab's research efforts. Following this, several members of the development team (including Richardson, Harter, Weatherall and Hopper) formed RealVNC in order to continue working on
224:
mode is that the server site does not have to configure its firewall to allow access on port 5900 (or 5800); the duty is on the viewer, which is useful if the server site has no computer expertise and the viewer user is more knowledgeable.
239:(methods to determine the most efficient way to transfer these rectangles). The VNC protocol allows the client and server to negotiate which encoding they will use. The simplest encoding, supported by all clients and servers, is 465:
user accounts. However, use of such encryption plugins makes it incompatible with other VNC programs. RealVNC offers high-strength AES encryption as part of its commercial package, along with integration with Active Directory.
457:
supports the use of an open-source encryption plugin which encrypts the entire VNC session including password authentication and data transfer. It also allows authentication to be performed based on
204:(or viewer) is the program that represents the screen data originating from the server, receives updates from it, and presumably controls it by informing the server of collected local input. The VNC 474:
patches for VNC. According to TightVNC, TightVNC is not secure as picture data is transmitted without encryption. To circumvent this, it should be tunneled through an SSH connection (see below).
900: 84:. Multiple clients may connect to a VNC server at the same time. There are a number of variants of VNC which offer their own particular functionality; e.g., some optimised for 533:. From Unix, TightVNC will connect to a Mac OS X session served by Apple Remote Desktop if the VNC option is enabled, or to a VNC server running on Microsoft Windows. 995: 301:(VPN) technologies to ease usage over the Internet, or as a LAN connection if VPN is used as a proxy, or through a VNC repeater (useful in presence of a NAT). 893: 77:. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa. 180:
has not led to compatibility problems because the RFB protocol is designed to be extensible. VNC clients and servers negotiate their capabilities with
886: 1144: 929: 498: 820: 248:
bandwidth demands get very high if a lot of pixels change at the same time (such as when scrolling a window or viewing full-screen video).
1139: 1149: 421: 313: 92: 525:" in versions 10.5 through 10.13) interoperates with VNC and will connect to a Unix user's current desktop if it is served with 305:
multiple VNC sessions from the same computer. On Microsoft Windows the VNC session served is always the current user session.
355: 652: 297:
configuration such as port forwarding in order for the connection to go through. Users may establish communication through
763: 471: 196:
is the program on the machine that shares some screen (and may not be related to a physical display: the server can be
286: 264: 177: 161:
was commonly used as a synonym for a thin client; VNC is essentially a software-only (i.e. virtual) network computer.
131:
owned the lab. Developers who worked on VNC while at the AT&T Research Lab include Tristan Richardson (inventor),
340: 152: 151:
called the Videotile, which also used the RFB protocol. The Videotile had an LCD display with pen input and a fast
112: 402: 359: 344: 1080: 374: 217: 1020: 924: 789: 598: 482: 298: 235:, so various methods have been devised to reduce the communication overhead. For example, there are various 205: 136: 381: 613: 212:) is very simple, based on transmitting one graphic primitive from server to client ("Put a rectangle of 965: 909: 232: 181: 281:
Although possible even on low bandwidth, using VNC over the Internet is facilitated if the user has a
263:
is the display number (usually :0 for a physical display). Several implementations also start a basic
960: 514: 388: 351: 290: 166: 108: 100: 81: 20: 26: 1070: 975: 970: 618: 80:
VNC is platform-independent, with clients and servers for many GUI-based operating systems and for
1000: 294: 201: 193: 173:
Ltd claims the term "VNC" as a registered trademark in the United States and in other countries.
128: 123:
The Olivetti & Oracle Research Lab (ORL) at Cambridge in the UK developed VNC at a time when
828: 370: 1106: 85: 62: 1025: 623: 573: 462: 252: 157: 74: 850: 945: 793: 507: 447: 197: 70: 522: 66: 1133: 1085: 1101: 1045: 1030: 872: 537: 478: 209: 54: 749: 513:
Users commonly deploy VNC as a cross-platform remote desktop system. For example,
878: 735: 656: 640: 395: 767: 669: 594: 329: 275: 228: 176:
The original GPLed source code has fed into several other versions of VNC. Such
148: 140: 132: 104: 1055: 1010: 985: 443: 267: 707: 485:
connection which would add an extra security layer with stronger encryption.
1050: 980: 950: 867: 806: 557: 541: 282: 693: 680: 1075: 1065: 1060: 1035: 1005: 553: 549: 530: 518: 467: 454: 435: 244: 124: 58: 627: 1015: 990: 955: 809:
TightVNC Frequently Asked Questions. TightVNC.com Accessed Feb 23, 2018
561: 545: 309: 231:
to the client. In its simplest form, the VNC protocol can use a lot of
170: 96: 34: 1111: 1040: 641:
The VNC family of Remote Control Applications: a list of VNC variants
526: 439: 184:
in order to use the most appropriate options supported at both ends.
95:
in Cambridge, United Kingdom, whose developers subsequently created
721: 213: 33: 25: 536:
Other programs or software libraries which implement VNC include
1116: 458: 882: 323: 39: 285:
connection at both ends. However, it may require advanced
69:
input from one computer to another, relaying the graphical-
200:), and allows the client to share control of it. The VNC 169:
and commercial VNC software under that name. As of 2013,
53:) is a graphical desktop-sharing system that uses the 529:, or to a separate X11 session if one is served with 506:
is the Unix VNC server, which is based on a standard
103:
in the US and some other countries. The original VNC
1094: 938: 917: 593:Richardson, T.; Stafford-Fraser, Q.; Wood, K. R.; 434:By default, RFB is not a secure protocol. While 442:), cracking could prove successful if both the 996:Microsoft System Center Configuration Manager 894: 8: 358:. Unsourced material may be challenged and 901: 887: 879: 243:, which sends pixel data in left-to-right 875:: Original AT&T-Cambridge VNC website 790:"RealVNC Wayland developer preview email" 617: 422:Learn how and when to remove this message 227:The server sends small rectangles of the 216:data at the specified X,Y position") and 819:AT&T Laboratories Cambridge (1999). 155:connection to the network. At the time, 585: 653:"VNC Frequently Asked Questions (FAQ)" 489:their device without previous notice. 147:(VNC) originated with ORL's work on a 930:Comparison of remote desktop software 499:Comparison of remote desktop software 7: 356:adding citations to reliable sources 91:VNC was originally developed at the 851:"OnlineVNC Server for Windows OSes" 438:are not sent in plain-text (as in 145:Virtual Network Computer/Computing 93:Olivetti & Oracle Research Lab 55:Remote Frame Buffer protocol (RFB) 14: 764:"VNC® Wayland Developer Preview" 328: 107:and many modern derivatives are 16:Graphical desktop-sharing system 683:RealVNC. Accessed Feb 23, 2018. 99:Ltd and claimed VNC and RFB as 446:key and encoded password were 30:Virtual Network Computing logo 1: 1145:Free network-related software 1095:Controversial Implementations 766:. 8 July 2014. Archived from 274:to provide a VNC viewer as a 694:"Frequently asked questions" 477:VNC may be tunneled over an 57:to remotely control another 599:"Virtual network computing" 287:network address translation 1166: 670:RealVNC Executive Profiles 496: 113:GNU General Public License 18: 1140:Virtual Network Computing 1081:Virtual Network Computing 868:RFB 3.8 Protocol Standard 825:Virtual Network Computing 51:Virtual Network Computing 1150:Remote desktop protocols 708:"UltraVnc Configuration" 681:Copyright and trademarks 1021:Remote Desktop Services 925:Remote desktop software 807:How secure is TightVNC? 606:IEEE Internet Computing 299:virtual private network 220:from client to server. 139:, James Weatherall and 137:Quentin Stafford-Fraser 736:"OpenWRT VNC repeater" 655:. 1999. Archived from 43: 31: 966:Chrome Remote Desktop 910:Remote administration 101:registered trademarks 37: 29: 961:Apple Remote Desktop 821:"X-based VNC server" 515:Apple Remote Desktop 352:improve this section 251:VNC by default uses 188:Design and operation 21:VNC (disambiguation) 19:For other uses, see 976:ConnectWise Control 971:Citrix Virtual Apps 628:10.1109/4236.656066 316:developer preview. 61:. It transmits the 1001:NetSupport Manager 659:on 15 August 2000. 135:(project leader), 129:Oracle Corporation 44: 32: 1125: 1124: 1107:Back Orifice 2000 432: 431: 424: 406: 86:Microsoft Windows 1157: 1026:Remote Utilities 903: 896: 889: 880: 855: 854: 847: 841: 840: 838: 836: 831:on 19 March 2007 827:. Archived from 816: 810: 804: 798: 797: 786: 780: 779: 777: 775: 760: 754: 753: 746: 740: 739: 732: 726: 725: 718: 712: 711: 704: 698: 697: 690: 684: 678: 672: 667: 661: 660: 649: 643: 638: 632: 631: 621: 603: 590: 463:Active Directory 427: 420: 416: 413: 407: 405: 364: 332: 324: 158:network computer 73:updates, over a 1165: 1164: 1160: 1159: 1158: 1156: 1155: 1154: 1130: 1129: 1126: 1121: 1090: 946:Absolute Manage 939:Implementations 934: 913: 907: 864: 859: 858: 849: 848: 844: 834: 832: 818: 817: 813: 805: 801: 794:freedesktop.org 788: 787: 783: 773: 771: 770:on 14 July 2014 762: 761: 757: 750:"uVNC repeater" 748: 747: 743: 734: 733: 729: 720: 719: 715: 706: 705: 701: 692: 691: 687: 679: 675: 668: 664: 651: 650: 646: 639: 635: 601: 592: 591: 587: 582: 570: 501: 495: 493:Implementations 428: 417: 411: 408: 365: 363: 349: 333: 322: 190: 121: 24: 17: 12: 11: 5: 1163: 1161: 1153: 1152: 1147: 1142: 1132: 1131: 1123: 1122: 1120: 1119: 1114: 1109: 1104: 1098: 1096: 1092: 1091: 1089: 1088: 1083: 1078: 1073: 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1018: 1013: 1008: 1003: 998: 993: 988: 983: 978: 973: 968: 963: 958: 953: 948: 942: 940: 936: 935: 933: 932: 927: 921: 919: 915: 914: 908: 906: 905: 898: 891: 883: 877: 876: 870: 863: 862:External links 860: 857: 856: 842: 811: 799: 796:. 9 July 2014. 781: 755: 741: 727: 713: 699: 685: 673: 662: 644: 633: 619:10.1.1.17.5625 584: 583: 581: 578: 577: 576: 569: 566: 523:Back to My Mac 497:Main article: 494: 491: 472:AES encryption 451:the password. 430: 429: 412:September 2024 336: 334: 327: 321: 318: 218:event messages 189: 186: 120: 117: 15: 13: 10: 9: 6: 4: 3: 2: 1162: 1151: 1148: 1146: 1143: 1141: 1138: 1137: 1135: 1128: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1100: 1099: 1097: 1093: 1087: 1086:NX technology 1084: 1082: 1079: 1077: 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1029: 1027: 1024: 1022: 1019: 1017: 1014: 1012: 1009: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 947: 944: 943: 941: 937: 931: 928: 926: 923: 922: 920: 916: 911: 904: 899: 897: 892: 890: 885: 884: 881: 874: 871: 869: 866: 865: 861: 852: 846: 843: 830: 826: 822: 815: 812: 808: 803: 800: 795: 791: 785: 782: 769: 765: 759: 756: 751: 745: 742: 737: 731: 728: 723: 717: 714: 709: 703: 700: 695: 689: 686: 682: 677: 674: 671: 666: 663: 658: 654: 648: 645: 642: 637: 634: 629: 625: 620: 615: 611: 607: 600: 596: 589: 586: 579: 575: 572: 571: 567: 565: 563: 559: 555: 551: 547: 543: 539: 534: 532: 528: 524: 520: 516: 511: 509: 505: 500: 492: 490: 486: 484: 480: 475: 473: 469: 464: 460: 456: 452: 449: 445: 441: 437: 426: 423: 415: 404: 401: 397: 394: 390: 387: 383: 380: 376: 373: –  372: 368: 367:Find sources: 361: 357: 353: 347: 346: 342: 337:This section 335: 331: 326: 325: 319: 317: 315: 311: 308:In July 2014 306: 302: 300: 296: 292: 288: 284: 279: 277: 273: 270:on port 5800+ 269: 266: 262: 258: 254: 249: 246: 242: 238: 234: 230: 225: 221: 219: 215: 211: 207: 203: 199: 195: 187: 185: 183: 179: 174: 172: 168: 162: 160: 159: 154: 150: 146: 142: 138: 134: 130: 126: 118: 116: 114: 110: 106: 102: 98: 94: 89: 87: 83: 78: 76: 72: 68: 64: 60: 56: 52: 48: 41: 36: 28: 22: 1127: 1102:Back Orifice 1046:Secure Shell 1031:RescueAssist 873:AT&T VNC 845: 833:. Retrieved 829:the original 824: 814: 802: 784: 772:. Retrieved 768:the original 758: 744: 730: 716: 702: 688: 676: 665: 657:the original 647: 636: 609: 605: 588: 538:Libvncserver 535: 512: 503: 502: 487: 476: 453: 433: 418: 409: 399: 392: 385: 378: 366: 350:Please help 338: 312:published a 307: 303: 280: 271: 260: 256: 250: 241:raw encoding 240: 236: 226: 222: 210:RFB protocol 191: 175: 163: 156: 144: 122: 90: 79: 50: 46: 45: 276:Java applet 229:framebuffer 182:handshaking 167:open-source 149:thin client 143:. The name 141:Andy Hopper 133:Andy Harter 109:open source 105:source code 1134:Categories 1056:TeamViewer 1011:pcAnywhere 986:IBM BigFix 595:Hopper, A. 580:References 444:encryption 382:newspapers 198:"headless" 111:under the 1051:Splashtop 981:Crossloop 951:AetherPal 614:CiteSeerX 612:: 33–38. 558:VirtualGL 542:PocketVNC 470:released 436:passwords 339:does not 283:broadband 237:encodings 233:bandwidth 1076:UltraVNC 1071:Timbuktu 1066:TightVNC 1061:ThinLinc 1036:RustDesk 1006:NinjaOne 912:software 835:24 March 597:(1998). 568:See also 554:TightVNC 550:TigerVNC 531:TightVNC 519:Mac OS X 508:X server 468:Workspot 455:UltraVNC 320:Security 291:firewall 259:, where 253:TCP port 245:scanline 206:protocol 192:The VNC 125:Olivetti 63:keyboard 59:computer 1016:RealVNC 991:LogMeIn 956:AnyDesk 918:General 774:10 July 722:"noVNC" 562:Vinagre 546:Remmina 448:sniffed 396:scholar 360:removed 345:sources 314:Wayland 310:RealVNC 289:(NAT), 178:forking 171:RealVNC 119:History 97:RealVNC 75:network 38:VNC in 1112:NetBus 1041:scrcpy 616:  560:, and 527:x11vnc 521:(and " 440:telnet 398:  391:  384:  377:  369:  295:router 268:server 202:client 194:server 71:screen 602:(PDF) 574:SPICE 403:JSTOR 389:books 371:"VNC" 255:5900+ 214:pixel 67:mouse 1117:Sub7 837:2007 776:2014 517:for 504:Xvnc 461:and 459:NTLM 375:news 343:any 341:cite 293:and 265:HTTP 127:and 82:Java 65:and 624:doi 483:VPN 481:or 479:SSH 354:by 153:ATM 47:VNC 42:3.1 40:KDE 1136:: 823:. 792:. 622:. 608:. 604:. 564:. 556:, 552:, 548:, 544:, 540:, 115:. 902:e 895:t 888:v 853:. 839:. 778:. 752:. 738:. 724:. 710:. 696:. 630:. 626:: 610:2 425:) 419:( 414:) 410:( 400:· 393:· 386:· 379:· 362:. 348:. 272:N 261:N 257:N 208:( 49:( 23:.

Index

VNC (disambiguation)


KDE
Remote Frame Buffer protocol (RFB)
computer
keyboard
mouse
screen
network
Java
Microsoft Windows
Olivetti & Oracle Research Lab
RealVNC
registered trademarks
source code
open source
GNU General Public License
Olivetti
Oracle Corporation
Andy Harter
Quentin Stafford-Fraser
Andy Hopper
thin client
ATM
network computer
open-source
RealVNC
forking
handshaking

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.