• Documentation
  • »
  • User Guide

Contents

About This Guide

Chapter 1: Introduction

Principles of VNC remote control

Getting the computers ready to use

Connectivity and feature matrix

What to read next

Chapter 2: Getting Connected

Step 1: Ensure VNC Server is running on the host computer

Step 2: Start VNC Viewer on the client computer

Step 3: Identify VNC Server running on the host computer

Step 4: Request an encrypted connection

Step 5: Connect to VNC Server

Troubleshooting connection

Chapter 3: Using VNC Viewer

Starting VNC Viewer

Starting Listening VNC Viewer

Configuring VNC Viewer before you connect

Connecting to a host computer

The VNC Viewer user experience

Using the toolbar

Using the shortcut menu

Using the VNC Viewer - Options dialog

Managing the current connection

Changing appearance and behavior

Restricting access to features

Chapter 4: Connecting From A Web Browser

Connecting to a host computer

The VNC Viewer for Java user experience

Working with VNC Viewer for Java

Chapter 5: Exchanging Information

Printing host computer files to a local printer

Transfering files between client and host computers

Copying and pasting text between client and host computers

Communicating securely using chat

Chapter 6: Setting Up VNC Server

Licensing VNC Server

Starting VNC Server

Running multiple instances of VNC Server

Working with VNC Server

Configuring ports

Notifying when users connect

Preventing connections to VNC Server

Restricting functionality for connected users

Stopping VNC Server

Chapter 7: Making Connections Secure

Authenticating connections to VNC Server

Relaxing the authentication rules

Bypassing the authentication rules

Changing the encryption rules

Preventing particular connections to VNC Server

Restricting features for particular connected users

Uniquely identifying VNC Server

Protecting privacy

Appendix A: Saving Connections

Saving connections to VNC Address Book

Using VNC Address Book to connect

Managing connections using VNC Address Book

Saving connections to desktop icons

Chapter 7, Making Connections Secure

VNC Server (Enterprise) and VNC Server (Personal) are designed to permit authenticated and encrypted connections between a host and any number of client computers out-of-the-box. This chapter explains how to configure VNC Server to relax the authentication and encryption rules if you consider it safe to do so. Conversely, you can tighten the encryption rules for VNC Server (Enterprise) if required.

Note: VNC Server (Free) can only authenticate connections. Upgrade the host computer to VNC Server (Enterprise) or VNC Server (Personal) if security is important to you.

This chapter also explains how to configure VNC Server to protect the host computer from accidental or malicious damage by particular connected users, either by restricting their access to RealVNC™ remote control features while connections are in progress, or by preventing them from connecting in the first place.

Contents

Authenticating connections to VNC Server

Relaxing the authentication rules

Bypassing the authentication rules

Changing the encryption rules

Preventing particular connections to VNC Server

Restricting features for particular connected users

Uniquely identifying VNC Server

Protecting privacy