510:. To applications, Xvnc appears as an X "server" (i.e., it displays client windows), and to remote VNC users it is a VNC server. Applications can display themselves on Xvnc as if it were a normal X display, but they will appear on any connected VNC viewers rather than on a physical screen. Alternatively, a machine (which may be a workstation or a network server) with screen, keyboard, and mouse can be set up to boot and run the VNC server as a service or daemon, then the screen, keyboard, and mouse can be removed and the machine stored in an out-of-the way location.
27:
330:
35:
223:
In the normal method of operation a viewer connects to a port on the server (default port: 5900). Alternatively (depending on the implementation) a browser can connect to the server (default port: 5800). And a server can connect to a viewer in "listening mode" on port 5500. One advantage of listening
304:
In addition, the display that is served by VNC is not necessarily the same display seen by a user on the server. On Unix/Linux computers that support multiple simultaneous X11 sessions, VNC may be set to serve a particular existing X11 session, or to start one of its own. It is also possible to run
450:
from a network. For this reason it is recommended that a password of at least 8 characters be used. On the other hand, there is also an 8-character limit on some versions of VNC; if a password is sent exceeding 8 characters, the excess characters are removed and the truncated string is compared to
247:
order, and after the original full screen has been transmitted, transfers only rectangles that change. This encoding works very well if only a small portion of the screen changes from one frame to the next (as when a mouse pointer moves across a desktop, or when text is written at the cursor), but
488:
An additional security concern for the use of VNC is to check whether the version used requires authorization from the remote computer owner before someone takes control of their device. This will avoid the situation where the owner of the computer accessed realizes there is someone in control of
88:, or offering file transfer (not part of VNC proper), etc. Many are compatible (without their added features) with VNC proper in the sense that a viewer of one flavour can connect with a server of another; others are based on VNC code but not compatible with standard VNC.
278:, allowing easy connection through any Java-enabled web-browser. Different port assignments can be used as long as both client and server are configured accordingly. A HTML5 VNC client implementation for modern browsers (no plugins required) exists too.
164:
In 1999, AT&T acquired the lab, and in 2002 closed down the lab's research efforts. Following this, several members of the development team (including
Richardson, Harter, Weatherall and Hopper) formed RealVNC in order to continue working on
224:
mode is that the server site does not have to configure its firewall to allow access on port 5900 (or 5800); the duty is on the viewer, which is useful if the server site has no computer expertise and the viewer user is more knowledgeable.
239:(methods to determine the most efficient way to transfer these rectangles). The VNC protocol allows the client and server to negotiate which encoding they will use. The simplest encoding, supported by all clients and servers, is
465:
user accounts. However, use of such encryption plugins makes it incompatible with other VNC programs. RealVNC offers high-strength AES encryption as part of its commercial package, along with integration with Active
Directory.
457:
supports the use of an open-source encryption plugin which encrypts the entire VNC session including password authentication and data transfer. It also allows authentication to be performed based on
204:(or viewer) is the program that represents the screen data originating from the server, receives updates from it, and presumably controls it by informing the server of collected local input. The VNC
474:
patches for VNC. According to TightVNC, TightVNC is not secure as picture data is transmitted without encryption. To circumvent this, it should be tunneled through an SSH connection (see below).
900:
84:. Multiple clients may connect to a VNC server at the same time. There are a number of variants of VNC which offer their own particular functionality; e.g., some optimised for
533:. From Unix, TightVNC will connect to a Mac OS X session served by Apple Remote Desktop if the VNC option is enabled, or to a VNC server running on Microsoft Windows.
995:
301:(VPN) technologies to ease usage over the Internet, or as a LAN connection if VPN is used as a proxy, or through a VNC repeater (useful in presence of a NAT).
893:
77:. Popular uses for this technology include remote technical support and accessing files on one's work computer from one's home computer, or vice versa.
180:
has not led to compatibility problems because the RFB protocol is designed to be extensible. VNC clients and servers negotiate their capabilities with
886:
1144:
929:
498:
820:
248:
bandwidth demands get very high if a lot of pixels change at the same time (such as when scrolling a window or viewing full-screen video).
1139:
1149:
421:
313:
92:
525:" in versions 10.5 through 10.13) interoperates with VNC and will connect to a Unix user's current desktop if it is served with
305:
multiple VNC sessions from the same computer. On
Microsoft Windows the VNC session served is always the current user session.
355:
652:
297:
configuration such as port forwarding in order for the connection to go through. Users may establish communication through
763:
471:
196:
is the program on the machine that shares some screen (and may not be related to a physical display: the server can be
286:
264:
177:
161:
was commonly used as a synonym for a thin client; VNC is essentially a software-only (i.e. virtual) network computer.
131:
owned the lab. Developers who worked on VNC while at the AT&T Research Lab include
Tristan Richardson (inventor),
340:
152:
151:
called the
Videotile, which also used the RFB protocol. The Videotile had an LCD display with pen input and a fast
112:
402:
359:
344:
1080:
374:
217:
1020:
924:
789:
598:
482:
298:
235:, so various methods have been devised to reduce the communication overhead. For example, there are various
205:
136:
381:
613:
212:) is very simple, based on transmitting one graphic primitive from server to client ("Put a rectangle of
965:
909:
232:
181:
281:
Although possible even on low bandwidth, using VNC over the
Internet is facilitated if the user has a
263:
is the display number (usually :0 for a physical display). Several implementations also start a basic
960:
514:
388:
351:
290:
166:
108:
100:
81:
20:
26:
1070:
975:
970:
618:
80:
VNC is platform-independent, with clients and servers for many GUI-based operating systems and for
1000:
294:
201:
193:
173:
Ltd claims the term "VNC" as a registered trademark in the United States and in other countries.
128:
123:
The
Olivetti & Oracle Research Lab (ORL) at Cambridge in the UK developed VNC at a time when
828:
370:
1106:
85:
62:
1025:
623:
573:
462:
252:
157:
74:
850:
945:
793:
507:
447:
197:
70:
522:
66:
1133:
1085:
1101:
1045:
1030:
872:
537:
478:
209:
54:
749:
513:
Users commonly deploy VNC as a cross-platform remote desktop system. For example,
878:
735:
656:
640:
395:
767:
669:
594:
329:
275:
228:
176:
The original GPLed source code has fed into several other versions of VNC. Such
148:
140:
132:
104:
1055:
1010:
985:
443:
267:
707:
485:
connection which would add an extra security layer with stronger encryption.
1050:
980:
950:
867:
806:
557:
541:
282:
693:
680:
1075:
1065:
1060:
1035:
1005:
553:
549:
530:
518:
467:
454:
435:
244:
124:
58:
627:
1015:
990:
955:
809:
TightVNC Frequently Asked
Questions. TightVNC.com Accessed Feb 23, 2018
561:
545:
309:
231:
to the client. In its simplest form, the VNC protocol can use a lot of
170:
96:
34:
1111:
1040:
641:
The VNC family of Remote
Control Applications: a list of VNC variants
526:
439:
184:
in order to use the most appropriate options supported at both ends.
95:
in
Cambridge, United Kingdom, whose developers subsequently created
721:
213:
33:
25:
536:
Other programs or software libraries which implement VNC include
1116:
458:
882:
323:
39:
285:
connection at both ends. However, it may require advanced
69:
input from one computer to another, relaying the graphical-
200:), and allows the client to share control of it. The VNC
169:
and commercial VNC software under that name. As of 2013,
53:) is a graphical desktop-sharing system that uses the
529:, or to a separate X11 session if one is served with
506:
is the Unix VNC server, which is based on a standard
103:
in the US and some other countries. The original VNC
1094:
938:
917:
593:Richardson, T.; Stafford-Fraser, Q.; Wood, K. R.;
434:By default, RFB is not a secure protocol. While
442:), cracking could prove successful if both the
996:Microsoft System Center Configuration Manager
894:
8:
358:. Unsourced material may be challenged and
901:
887:
879:
243:, which sends pixel data in left-to-right
875:: Original AT&T-Cambridge VNC website
790:"RealVNC Wayland developer preview email"
617:
422:Learn how and when to remove this message
227:The server sends small rectangles of the
216:data at the specified X,Y position") and
819:AT&T Laboratories Cambridge (1999).
155:connection to the network. At the time,
585:
653:"VNC Frequently Asked Questions (FAQ)"
489:their device without previous notice.
147:(VNC) originated with ORL's work on a
930:Comparison of remote desktop software
499:Comparison of remote desktop software
7:
356:adding citations to reliable sources
91:VNC was originally developed at the
851:"OnlineVNC Server for Windows OSes"
438:are not sent in plain-text (as in
145:Virtual Network Computer/Computing
93:Olivetti & Oracle Research Lab
55:Remote Frame Buffer protocol (RFB)
14:
764:"VNC® Wayland Developer Preview"
328:
107:and many modern derivatives are
16:Graphical desktop-sharing system
683:RealVNC. Accessed Feb 23, 2018.
99:Ltd and claimed VNC and RFB as
446:key and encoded password were
30:Virtual Network Computing logo
1:
1145:Free network-related software
1095:Controversial Implementations
766:. 8 July 2014. Archived from
274:to provide a VNC viewer as a
694:"Frequently asked questions"
477:VNC may be tunneled over an
57:to remotely control another
599:"Virtual network computing"
287:network address translation
1166:
670:RealVNC Executive Profiles
496:
113:GNU General Public License
18:
1140:Virtual Network Computing
1081:Virtual Network Computing
868:RFB 3.8 Protocol Standard
825:Virtual Network Computing
51:Virtual Network Computing
1150:Remote desktop protocols
708:"UltraVnc Configuration"
681:Copyright and trademarks
1021:Remote Desktop Services
925:Remote desktop software
807:How secure is TightVNC?
606:IEEE Internet Computing
299:virtual private network
220:from client to server.
139:, James Weatherall and
137:Quentin Stafford-Fraser
736:"OpenWRT VNC repeater"
655:. 1999. Archived from
43:
31:
966:Chrome Remote Desktop
910:Remote administration
101:registered trademarks
37:
29:
961:Apple Remote Desktop
821:"X-based VNC server"
515:Apple Remote Desktop
352:improve this section
251:VNC by default uses
188:Design and operation
21:VNC (disambiguation)
19:For other uses, see
976:ConnectWise Control
971:Citrix Virtual Apps
628:10.1109/4236.656066
316:developer preview.
61:. It transmits the
1001:NetSupport Manager
659:on 15 August 2000.
135:(project leader),
129:Oracle Corporation
44:
32:
1125:
1124:
1107:Back Orifice 2000
432:
431:
424:
406:
86:Microsoft Windows
1157:
1026:Remote Utilities
903:
896:
889:
880:
855:
854:
847:
841:
840:
838:
836:
831:on 19 March 2007
827:. Archived from
816:
810:
804:
798:
797:
786:
780:
779:
777:
775:
760:
754:
753:
746:
740:
739:
732:
726:
725:
718:
712:
711:
704:
698:
697:
690:
684:
678:
672:
667:
661:
660:
649:
643:
638:
632:
631:
621:
603:
590:
463:Active Directory
427:
420:
416:
413:
407:
405:
364:
332:
324:
158:network computer
73:updates, over a
1165:
1164:
1160:
1159:
1158:
1156:
1155:
1154:
1130:
1129:
1126:
1121:
1090:
946:Absolute Manage
939:Implementations
934:
913:
907:
864:
859:
858:
849:
848:
844:
834:
832:
818:
817:
813:
805:
801:
794:freedesktop.org
788:
787:
783:
773:
771:
770:on 14 July 2014
762:
761:
757:
750:"uVNC repeater"
748:
747:
743:
734:
733:
729:
720:
719:
715:
706:
705:
701:
692:
691:
687:
679:
675:
668:
664:
651:
650:
646:
639:
635:
601:
592:
591:
587:
582:
570:
501:
495:
493:Implementations
428:
417:
411:
408:
365:
363:
349:
333:
322:
190:
121:
24:
17:
12:
11:
5:
1163:
1161:
1153:
1152:
1147:
1142:
1132:
1131:
1123:
1122:
1120:
1119:
1114:
1109:
1104:
1098:
1096:
1092:
1091:
1089:
1088:
1083:
1078:
1073:
1068:
1063:
1058:
1053:
1048:
1043:
1038:
1033:
1028:
1023:
1018:
1013:
1008:
1003:
998:
993:
988:
983:
978:
973:
968:
963:
958:
953:
948:
942:
940:
936:
935:
933:
932:
927:
921:
919:
915:
914:
908:
906:
905:
898:
891:
883:
877:
876:
870:
863:
862:External links
860:
857:
856:
842:
811:
799:
796:. 9 July 2014.
781:
755:
741:
727:
713:
699:
685:
673:
662:
644:
633:
619:10.1.1.17.5625
584:
583:
581:
578:
577:
576:
569:
566:
523:Back to My Mac
497:Main article:
494:
491:
472:AES encryption
451:the password.
430:
429:
412:September 2024
336:
334:
327:
321:
318:
218:event messages
189:
186:
120:
117:
15:
13:
10:
9:
6:
4:
3:
2:
1162:
1151:
1148:
1146:
1143:
1141:
1138:
1137:
1135:
1128:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1100:
1099:
1097:
1093:
1087:
1086:NX technology
1084:
1082:
1079:
1077:
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1019:
1017:
1014:
1012:
1009:
1007:
1004:
1002:
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
947:
944:
943:
941:
937:
931:
928:
926:
923:
922:
920:
916:
911:
904:
899:
897:
892:
890:
885:
884:
881:
874:
871:
869:
866:
865:
861:
852:
846:
843:
830:
826:
822:
815:
812:
808:
803:
800:
795:
791:
785:
782:
769:
765:
759:
756:
751:
745:
742:
737:
731:
728:
723:
717:
714:
709:
703:
700:
695:
689:
686:
682:
677:
674:
671:
666:
663:
658:
654:
648:
645:
642:
637:
634:
629:
625:
620:
615:
611:
607:
600:
596:
589:
586:
579:
575:
572:
571:
567:
565:
563:
559:
555:
551:
547:
543:
539:
534:
532:
528:
524:
520:
516:
511:
509:
505:
500:
492:
490:
486:
484:
480:
475:
473:
469:
464:
460:
456:
452:
449:
445:
441:
437:
426:
423:
415:
404:
401:
397:
394:
390:
387:
383:
380:
376:
373: –
372:
368:
367:Find sources:
361:
357:
353:
347:
346:
342:
337:This section
335:
331:
326:
325:
319:
317:
315:
311:
308:In July 2014
306:
302:
300:
296:
292:
288:
284:
279:
277:
273:
270:on port 5800+
269:
266:
262:
258:
254:
249:
246:
242:
238:
234:
230:
225:
221:
219:
215:
211:
207:
203:
199:
195:
187:
185:
183:
179:
174:
172:
168:
162:
160:
159:
154:
150:
146:
142:
138:
134:
130:
126:
118:
116:
114:
110:
106:
102:
98:
94:
89:
87:
83:
78:
76:
72:
68:
64:
60:
56:
52:
48:
41:
36:
28:
22:
1127:
1102:Back Orifice
1046:Secure Shell
1031:RescueAssist
873:AT&T VNC
845:
833:. Retrieved
829:the original
824:
814:
802:
784:
772:. Retrieved
768:the original
758:
744:
730:
716:
702:
688:
676:
665:
657:the original
647:
636:
609:
605:
588:
538:Libvncserver
535:
512:
503:
502:
487:
476:
453:
433:
418:
409:
399:
392:
385:
378:
366:
350:Please help
338:
312:published a
307:
303:
280:
271:
260:
256:
250:
241:raw encoding
240:
236:
226:
222:
210:RFB protocol
191:
175:
163:
156:
144:
122:
90:
79:
50:
46:
45:
276:Java applet
229:framebuffer
182:handshaking
167:open-source
149:thin client
143:. The name
141:Andy Hopper
133:Andy Harter
109:open source
105:source code
1134:Categories
1056:TeamViewer
1011:pcAnywhere
986:IBM BigFix
595:Hopper, A.
580:References
444:encryption
382:newspapers
198:"headless"
111:under the
1051:Splashtop
981:Crossloop
951:AetherPal
614:CiteSeerX
612:: 33–38.
558:VirtualGL
542:PocketVNC
470:released
436:passwords
339:does not
283:broadband
237:encodings
233:bandwidth
1076:UltraVNC
1071:Timbuktu
1066:TightVNC
1061:ThinLinc
1036:RustDesk
1006:NinjaOne
912:software
835:24 March
597:(1998).
568:See also
554:TightVNC
550:TigerVNC
531:TightVNC
519:Mac OS X
508:X server
468:Workspot
455:UltraVNC
320:Security
291:firewall
259:, where
253:TCP port
245:scanline
206:protocol
192:The VNC
125:Olivetti
63:keyboard
59:computer
1016:RealVNC
991:LogMeIn
956:AnyDesk
918:General
774:10 July
722:"noVNC"
562:Vinagre
546:Remmina
448:sniffed
396:scholar
360:removed
345:sources
314:Wayland
310:RealVNC
289:(NAT),
178:forking
171:RealVNC
119:History
97:RealVNC
75:network
38:VNC in
1112:NetBus
1041:scrcpy
616:
560:, and
527:x11vnc
521:(and "
440:telnet
398:
391:
384:
377:
369:
295:router
268:server
202:client
194:server
71:screen
602:(PDF)
574:SPICE
403:JSTOR
389:books
371:"VNC"
255:5900+
214:pixel
67:mouse
1117:Sub7
837:2007
776:2014
517:for
504:Xvnc
461:and
459:NTLM
375:news
343:any
341:cite
293:and
265:HTTP
127:and
82:Java
65:and
624:doi
483:VPN
481:or
479:SSH
354:by
153:ATM
47:VNC
42:3.1
40:KDE
1136::
823:.
792:.
622:.
608:.
604:.
564:.
556:,
552:,
548:,
544:,
540:,
115:.
902:e
895:t
888:v
853:.
839:.
778:.
752:.
738:.
724:.
710:.
696:.
630:.
626::
610:2
425:)
419:(
414:)
410:(
400:·
393:·
386:·
379:·
362:.
348:.
272:N
261:N
257:N
208:(
49:(
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.